, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6e, &(0x7f0000000100), 0x0, 0x0, 0xffffffffffffff8d}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000002d00)={0x12, 0x1, &(0x7f0000001700)=ANY=[@ANYBLOB="00000000f62e0000"], &(0x7f0000001740)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x1a, [], 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000001880), 0x8, 0x10, &(0x7f00000018c0)={0x3, 0x0, 0x22}, 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x10000000000037, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000002c40)='./file0\x00'}, 0x10) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x96, &(0x7f00000005c0)=""/150, 0x41100, 0x0, [], 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000740)={0x3, 0x1, 0xffffffff, 0x100}, 0x10, 0xc8fe}, 0x78) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x8}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(r1, &(0x7f0000002c00)={&(0x7f0000001780)=@qipcrtr={0x2a, 0x0, 0x1}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000001800)="86885ac81aa02ba5ba821d00b46c786284eef3babb59f79f17991a3119bc74ea339e189e01957ce4fbcaf4a6b0243d451a1ce0dda4b97bac1444b6c0d984d33d64eb596121ebe4f788d64e4614", 0x4d}, {&(0x7f0000002980)="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", 0xfc}, {&(0x7f0000001900)="dcea83bd20b827af27cf996c83f80dc95e6699bb02973de49922790c87da713b932e45987f8fac692004c570e2efb91dd45acd9872ce363a251d05fd88a9fb93cd4bb2bb217cf3583f2c151ee37e21d9ff7615ef834714305302a6ce98d0d3dfca12987a296b2282fbbda483692b5d7cca8f7bfd", 0x74}, {&(0x7f0000000500)="9f306f85767339b11d52be05cfa2781a75f0d97e8c32b324c93f4df5ee1835f5eae3552d9c8a43abe3aea168c05dbaf8d6a398aebf7c2d288a", 0x39}, {&(0x7f0000002a80)="ba46bd66bb1c8e94d910ca0012b8176aa3b027cfce5b4cb5f280aab1be47e216c3624bf406e43dc3896d28c8053c0ffee13ce3857522eb34f90232ccd15e0c6cdc8d07db85e1339cccda6c84a75787f573cfd511a293d82a83c48122dbfa64444bd7c0e4cc6aa9ed9920f071704e4d5953765b8eddfc333cab26444e5c6f3147e39a150b9065ebf96b21062cfe38f03baa3c2b49e34e69d3c6d70d7c38f7b8a413dc0c61eae1167b5c32706b1ed31e4352d981025ce5eaaecd192d497db49befc6381a3319b81db2000cb17c44cdce2bfe08f1bca2df40b9bb78a0a410e8a2e10422e809137b", 0xe6}], 0x5}, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001640)={r6, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={0x3, 0x8, 0xd7c4, 0x5}, &(0x7f0000001500), 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001680)={0x2, 0x5, &(0x7f0000000100)=@raw=[@exit, @ldst={0x0, 0x1, 0x6, 0x0, 0x5, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x4f}, @map={0x18, 0x8, 0x1, 0x0, r7}], 0x0, 0x2, 0x1000, &(0x7f0000001980)=""/4096, 0x41000, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x6, 0x59487a83}, 0x10, r8, r6}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x19, 0xf, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffd}, [@map={0x18, 0x4, 0x1, 0x0, r4}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x5}, @map={0x18, 0x7, 0x1, 0x0, r5}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @map, @jmp={0x5, 0x0, 0x2, 0x6, 0x0, 0x100, 0xfffffffffffffffc}]}, &(0x7f0000000380)='GPL\x00', 0x6, 0x1000, &(0x7f0000000540)=""/4096, 0x41100, 0x14, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000001540)={0x2}, 0x8, 0x10, &(0x7f0000001580)={0x4, 0x0, 0x0, 0x6}, 0x10, r8}, 0x78) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000200)=r3, 0x4) [ 318.492194] bond25 (uninitialized): Released all slaves 12:41:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6e, &(0x7f0000000100), 0x0, 0x0, 0xffffffffffffff8d}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000002d00)={0x12, 0x1, &(0x7f0000001700)=ANY=[@ANYBLOB="00000000f62e0000"], &(0x7f0000001740)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x1a, [], 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000001880), 0x8, 0x10, &(0x7f00000018c0)={0x3, 0x0, 0x22}, 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x10000000000037, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000002c40)='./file0\x00'}, 0x10) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x96, &(0x7f00000005c0)=""/150, 0x41100, 0x0, [], 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000740)={0x3, 0x1, 0xffffffff, 0x100}, 0x10, 0xc8fe}, 0x78) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x8}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(r1, &(0x7f0000002c00)={&(0x7f0000001780)=@qipcrtr={0x2a, 0x0, 0x1}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000001800)="86885ac81aa02ba5ba821d00b46c786284eef3babb59f79f17991a3119bc74ea339e189e01957ce4fbcaf4a6b0243d451a1ce0dda4b97bac1444b6c0d984d33d64eb596121ebe4f788d64e4614", 0x4d}, {&(0x7f0000002980)="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", 0xfc}, {&(0x7f0000001900)="dcea83bd20b827af27cf996c83f80dc95e6699bb02973de49922790c87da713b932e45987f8fac692004c570e2efb91dd45acd9872ce363a251d05fd88a9fb93cd4bb2bb217cf3583f2c151ee37e21d9ff7615ef834714305302a6ce98d0d3dfca12987a296b2282fbbda483692b5d7cca8f7bfd", 0x74}, {&(0x7f0000000500)="9f306f85767339b11d52be05cfa2781a75f0d97e8c32b324c93f4df5ee1835f5eae3552d9c8a43abe3aea168c05dbaf8d6a398aebf7c2d288a", 0x39}, {&(0x7f0000002a80)="ba46bd66bb1c8e94d910ca0012b8176aa3b027cfce5b4cb5f280aab1be47e216c3624bf406e43dc3896d28c8053c0ffee13ce3857522eb34f90232ccd15e0c6cdc8d07db85e1339cccda6c84a75787f573cfd511a293d82a83c48122dbfa64444bd7c0e4cc6aa9ed9920f071704e4d5953765b8eddfc333cab26444e5c6f3147e39a150b9065ebf96b21062cfe38f03baa3c2b49e34e69d3c6d70d7c38f7b8a413dc0c61eae1167b5c32706b1ed31e4352d981025ce5eaaecd192d497db49befc6381a3319b81db2000cb17c44cdce2bfe08f1bca2df40b9bb78a0a410e8a2e10422e809137b", 0xe6}], 0x5}, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001640)={r6, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={0x3, 0x8, 0xd7c4, 0x5}, &(0x7f0000001500), 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001680)={0x2, 0x5, &(0x7f0000000100)=@raw=[@exit, @ldst={0x0, 0x1, 0x6, 0x0, 0x5, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x4f}, @map={0x18, 0x8, 0x1, 0x0, r7}], 0x0, 0x2, 0x1000, &(0x7f0000001980)=""/4096, 0x41000, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x6, 0x59487a83}, 0x10, r8, r6}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x19, 0xf, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffd}, [@map={0x18, 0x4, 0x1, 0x0, r4}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x5}, @map={0x18, 0x7, 0x1, 0x0, r5}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @map, @jmp={0x5, 0x0, 0x2, 0x6, 0x0, 0x100, 0xfffffffffffffffc}]}, &(0x7f0000000380)='GPL\x00', 0x6, 0x1000, &(0x7f0000000540)=""/4096, 0x41100, 0x14, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000001540)={0x2}, 0x8, 0x10, &(0x7f0000001580)={0x4, 0x0, 0x0, 0x6}, 0x10, r8}, 0x78) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000200)=r3, 0x4) 12:41:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:47 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x3, 0x5, 0x0, 0x3c43, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x43, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/pid\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = gettid() tkill(r2, 0x7) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x80, 0x0, 0x7f, 0x3, 0x0, 0x4, 0x110, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd56, 0x1, @perf_config_ext={0x9, 0x101}, 0x50001, 0x2, 0x1, 0x2, 0x9, 0x5, 0x2255}, r2, 0xb, r0, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x2, 0x70, 0x3, 0x3f, 0x1, 0x7, 0x0, 0x8, 0x20, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f39, 0x2, @perf_config_ext={0x9, 0x8}, 0x40000, 0xa86, 0x7fff, 0x5, 0x5, 0x5}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)) openat$cgroup_subtree(r3, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x4, 0x3cf0ffff}, {0x6, 0x0, 0x2}]}) 12:41:47 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 318.664417] bond25 (uninitialized): Released all slaves 12:41:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:47 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:47 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 318.820174] bond25 (uninitialized): Released all slaves 12:41:47 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x104) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x126, 0x0, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xaa, 0xcf, &(0x7f0000000280)="526e15e16251130fca2c3c65b233c2b545b61fc8720ff10c16254ec38382808596064981ba257f99f73b8a54c666c510b4483c5ab85d720557cc259a2b1424cb67856418a95609b949162ba5fdadde43c7a4080727370fd4e208846e4c78d338ff8c755a7e75456fb9d99f1fe998b59593ff701ff1dc7df016acbb2aa9e56964149d4114c7834fde07d3566fb3ccaa8827fa3090c134097709d736d3043b30acb0e2331f7e61b5fe1ba3", &(0x7f0000000380)="1b5879a8993c24dc400c4568f6fb52dc0d540eb90ee2f7cc40f6da4f5112c9f67c818a9b97627550497e315f6ca2d07089f3e3ea11d72e89b3a891968c07066e00b26fe07c9df3f0f406edbdb095de91c625027f9b5594e11cd0b621493134fde1593444705cc4009275be60bb6a5f2a043221340aa328838ea8eaa75edb4a4d74149526596d9f203f27f57d7fb99791f6f4d1c9e5f02f1ab2cfddac1ab48230d11a01515940f09bc75596bacc05244472d93434160aa9e9760e2e1f5c4a4671ce5c832c58da12d7280803dcf66d56"}, 0x48) 12:41:47 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:47 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:47 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:47 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:47 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:47 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3000002, 0x12, r0, 0x0) socketpair(0x9, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) pwritev(r2, &(0x7f00000014c0)=[{&(0x7f0000000080)="d6", 0x8800000}], 0x1, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) 12:41:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:47 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:48 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0206008002"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) accept$inet(r0, 0x0, &(0x7f0000000200)) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xd845b6f932) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB="c87959c02a7fae6d36cd34130e85a6bb90c7a5acd91c4992365db6b49ba1b033f8c9549ff64281fc2323e9f1688f5b1383c1614ffbc42272ce042b8f77d445bc54ccbac920d285d45658e545f8e4676e122056be259214ea4880eaf8ba3fac4e6be0757699525b5342a8e509fa66e91a449d706155895e9abab4a0e3ec9d9125b501c2ffd2619689d798007ef0b23d32fd6f956a8d514b4d08310e359ccbe45e31af6f0ed2eb058329f6a4c29b1b2f929e75f3eba0694e77e512b37f708fa2da148b3cdeb5d8e2ea012f81433e891df34f"], 0x2) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x7cd39e5f6d3fec94) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x1c, 0x1f, 0x4, 0x2, 0x0, 0x10000, 0x14408, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x779, 0x4, @perf_config_ext={0xade, 0x3ff}, 0x4, 0xe748, 0x6, 0x9, 0x101, 0x1, 0x8}, r1, 0x1, r4, 0xb) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000280)=0x2, r2, &(0x7f00000002c0)=0x6, 0x0, 0x2) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r5, &(0x7f0000000040)=ANY=[], 0x12) write$P9_RREADDIR(r5, &(0x7f0000000540)=ANY=[@ANYBLOB="00d98bea2e18b3d643d92c3e8b0a42b4bb97a93910bd0729d35c47b36e9a2a27db01c2d7990efe2c9351d638b933adbdfd81dfdea6e927eceabddec6d942a3265dc6f95471192f6a1966218d39a0771ea7c34ce3dfb54d9c4ca654bca68f3840bfcdd0f9198b77d6de45df008d4c813ae72d7f6169723468d0e5ed52fcba8ef2c112edfabfd9000000000000000084aa79c6782cfb3b4b"], 0x2) sendto$inet(r5, &(0x7f0000000300)="6016487417342dd203ef1a022a12300d58d3d062b15ef83b6a557985a3a6eca20ee69697b2856d3ce6fdf2f5b1ffb637ccc1d2171927be860db30664f9fc543f0509036f5f48b927c89e2890b52a885ba4b6413cd7db94d1e9e13efadf865fdf22", 0x61, 0x880, &(0x7f0000000180)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x22}}, 0x10) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r5, 0x0) 12:41:48 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:48 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:48 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:48 executing program 0: socket$netlink(0x10, 0x3, 0x8000000004) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xaa495, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xb, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r2, 0x0, 0x0, 0xaad57c81b7a27570, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) 12:41:48 executing program 0: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000c00), &(0x7f00000001c0)=0xc) open(&(0x7f0000000180)='./file0\x00', 0x404040, 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000c00), &(0x7f00000000c0)=0xc) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x20020008) rename(0x0, 0x0) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x8) io_setup(0x45a, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f00000002c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000100)='D', 0x1, 0x4}]) fallocate(r3, 0x20, 0x0, 0x102000000) fallocate(r3, 0x8, 0x0, 0x102000000) 12:41:48 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = getegid() sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000a80)=ANY=[@ANYBLOB="5001000010001307ebff40041200000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008000a0010000000250012000800010076657468"], 0x200}}, 0x0) r2 = socket(0x10, 0x800000000080002, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000200)='fuse\x00', 0x40, &(0x7f0000000440)=ANY=[@ANYBLOB="01013d", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB=',default_permissions,fowner<', @ANYRESDEC=0xee00, @ANYBLOB="2c7063723d30303030303030303030303030303030303033322c686173682c7365636c6162656c2c617070726169ff652c657569643e", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0, 0x0}, &(0x7f0000000980)=0xc) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000ac0)="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", 0x2000, &(0x7f0000002b00)={&(0x7f0000000080)={0x76, 0x0, 0x8, {0x7, 0x21, 0xf5, 0x6000, 0x8000, 0x6, 0x6, 0x4ed}}, &(0x7f00000001c0)={0x18, 0xfffffffffffffff5, 0x7, {0xfff}}, &(0x7f0000000200)={0x18, 0xfffffffffffffffe, 0x9, {0x9}}, &(0x7f0000000240)={0x18, 0xffffffffffffffda, 0x1, {0x4}}, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x3f}}, &(0x7f00000002c0)={0x28, 0x0, 0x1, {{0x7, 0xb52b, 0x2}}}, &(0x7f0000000300)={0x60, 0x0, 0x120135b1, {{0xffffffffd9219c1e, 0x3, 0x3, 0x20, 0x10000, 0x8}}}, &(0x7f00000004c0)={0x18, 0xfffffffffffffff5, 0x25}, &(0x7f0000000500)={0x11, 0xfffffffffffffff5, 0x1, {'\x00'}}, &(0x7f0000000540)={0x20, 0x0, 0x9, {0x0, 0x18}}, &(0x7f0000000640)={0x78, 0x0, 0x6, {0x80000001, 0x7fff, 0x0, {0x1, 0x7ff, 0x3, 0x4, 0x5, 0xc1d, 0x8001, 0x0, 0x9ea8, 0xa000, 0x7, 0xee00, 0x0, 0x7fff, 0x3f}}}, &(0x7f00000006c0)={0x90, 0x0, 0x100000000, {0x0, 0x1, 0x7d9f, 0x401, 0x81, 0x5, {0x6, 0x2, 0x145, 0x80000000, 0xfffffffffffffff7, 0x2, 0x5, 0x401, 0x1, 0x2000, 0x7, 0x0, 0x0, 0x9, 0x8}}}, &(0x7f00000007c0)={0xc8, 0x0, 0x20, [{0x5, 0x2, 0x9, 0xffffffc0, '[{%\',**[{'}, {0x1, 0x4, 0x0, 0x5}, {0x5, 0x3, 0x5, 0x0, ':$\\:)'}, {0x1, 0xfffffffffffffff9, 0x1, 0x8a, '}'}, {0x3, 0x1ff, 0x1, 0x3, '&'}, {0x6, 0x0, 0x0, 0xf2fb}]}, &(0x7f00000008c0)={0xb8, 0x0, 0x3f, [{{0x5, 0x3, 0x1, 0xfffffffffffffff9, 0x1f, 0x6, {0x1, 0x9, 0x8, 0x7, 0x5, 0x1, 0x1, 0x0, 0x1, 0xa000, 0x9, 0xee01, 0x0, 0x0, 0x8}}, {0x0, 0x10000, 0x9, 0x40, '+\\^(*.)+\''}}]}, &(0x7f00000009c0)={0xa0, 0x0, 0x0, {{0x800000003, 0x2, 0xffffffff, 0x6, 0x7, 0x80, {0x1, 0xb295, 0x80000001, 0x5, 0x4, 0x101, 0x0, 0x332, 0x6, 0x4000, 0x3, 0xffffffffffffffff, r4, 0x800, 0x25c}}, {0x0, 0xc}}}, &(0x7f0000002ac0)={0x20, 0x24, 0x3, {0x2, 0x4, 0x3, 0x6}}}) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x6815, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492a3e, 0x0) prctl$PR_GET_SECCOMP(0x15) bind$packet(0xffffffffffffffff, 0x0, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) r6 = getpid() setgid(0x0) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000002b80)="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", 0x2000, &(0x7f0000005400)={&(0x7f0000004b80)={0x50, 0x0, 0xfffffffffffffffc, {0x7, 0x21, 0x0, 0xc017d8ba61f06587, 0x9, 0x8000, 0x4020, 0x2}}, &(0x7f0000004c00)={0x18, 0x0, 0x3, {0x5}}, &(0x7f0000004c40)={0x18, 0x0, 0x1, {0xc4}}, &(0x7f0000004c80)={0x18, 0x0, 0x3, {0x80}}, &(0x7f0000004cc0)={0x18, 0x0, 0x3}, &(0x7f0000004d00)={0x28, 0x0, 0x7, {{0x8, 0x1ff, 0x1}}}, &(0x7f0000004d40)={0x60, 0x0, 0x0, {{0x5, 0x942b, 0x4, 0x3, 0x1, 0x1, 0x6, 0x9}}}, &(0x7f0000004dc0)={0x18, 0x0, 0x2206, {0x20}}, &(0x7f0000004e00)={0x11, 0x0, 0x4, {'\x00'}}, &(0x7f0000004e40)={0x20, 0xfffffffffffffffe, 0xffff, {0x0, 0x4}}, &(0x7f0000004e80)={0x78, 0xfffffffffffffff5, 0x3, {0x8ed4, 0x8, 0x0, {0x3, 0x65adbe5f, 0x8, 0x100000000, 0x3, 0x8000, 0x82e, 0x5, 0x0, 0x1000, 0x8, 0x0, r1, 0xffffffff, 0x4}}}, &(0x7f0000004f00)={0x90, 0x2f, 0x2259, {0x2, 0x2, 0x1000, 0x8, 0x9101, 0x4, {0x5, 0x1ff, 0x80, 0x80000001, 0x3, 0x10, 0x99, 0xe1, 0x9, 0x8000, 0xfffffffa, r3, r1, 0x8, 0x8}}}, &(0x7f0000004fc0)={0x58, 0x0, 0x214, [{0x2, 0x3ff, 0x9, 0x0, '[{%\',**[{'}, {0x1, 0xffffffffffffffff, 0x5, 0x7ff, 'fuse\x00'}]}, &(0x7f0000005040)={0x298, 0x0, 0x8ff7, [{{0x4, 0x0, 0x8e, 0x80, 0x1, 0xffffff56, {0x5, 0xff, 0xff, 0x7f, 0x1000, 0x0, 0x7, 0x8, 0x1, 0x4000, 0x88c, 0x0, 0x0, 0x1}}, {0x1, 0x7fff, 0x5, 0x7fff, 'fuse\x00'}}, {{0x4, 0x0, 0x7929bd4d, 0x1, 0x9, 0x6, {0x6, 0x1, 0x8001, 0x96, 0x3e, 0x1, 0x7ff, 0x5a0, 0x2, 0x4000, 0xb7, 0x0, 0xee01, 0x2ce, 0xcc43}}, {0x4, 0x41, 0x9, 0x80000001, '+\\^(*.)+\''}}, {{0x6, 0x2, 0x3, 0x7fff, 0xffff8001, 0xcf, {0x1, 0x5, 0x100000000, 0x8000, 0xfffffffffffffffc, 0x7, 0x5, 0x3, 0x61, 0x4000, 0xffffff01, 0x0, r4, 0x1, 0x13}}, {0x2, 0x7fff, 0x4, 0xffff, ').(\xce'}}, {{0x0, 0x3, 0x662, 0x1, 0xfffffffd, 0x8, {0x1, 0x0, 0x1, 0x4, 0x0, 0x4, 0x1, 0x5, 0x10000, 0xb000, 0x4, 0x0, r1, 0x401, 0x3f}}, {0x2, 0x80000000, 0x3, 0x7, '#{&'}}]}, &(0x7f0000005300)={0xa0, 0xfffffffffffffff5, 0x5, {{0x5, 0x1, 0x8, 0x80000000, 0x3f, 0x100, {0x6, 0x8, 0x3, 0x3, 0x9, 0x40, 0x40, 0x3, 0x9, 0xc000, 0xfffffffb, r3, 0x0, 0x34b70328, 0x6}}, {0x0, 0x2}}}, &(0x7f00000053c0)={0x20, 0x0, 0x9, {0x7, 0x0, 0xff, 0x8001}}}) getsockname(r2, &(0x7f0000000440)=@nl=@proc, &(0x7f0000000380)=0x80) sched_setscheduler(0x0, 0x5, &(0x7f0000000600)=0x7ff) sched_setaffinity(r6, 0x8, &(0x7f0000000180)=0x9) getpeername$unix(r2, &(0x7f00000003c0), &(0x7f0000000780)=0x6e) 12:41:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 320.459988] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.2'. [ 320.474436] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.2'. [ 320.545692] IPv6: ADDRCONF(NETDEV_UP): veth3: link is not ready [ 320.620353] team0: Port device veth3 added 12:41:49 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r1, &(0x7f00000006c0)='./file0\x00') 12:41:49 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:49 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 12:41:49 executing program 2: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:49 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:49 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) vmsplice(r1, &(0x7f0000000100)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="82bb7102cc6509f63760ce03f12c2bb3577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856797718767a3c2b54706cf1b9fd7326716e2cff2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4ba7560f29500352543b498fccba20bcae2b6f577b36b79f72f77e153f55e4fa00"/152, 0x98}], 0x4, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ptrace$cont(0x7, r0, 0x4, 0x0) 12:41:49 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 12:41:49 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r1, &(0x7f00000006c0)='./file0\x00') 12:41:49 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:50 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 12:41:50 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r1, &(0x7f00000006c0)='./file0\x00') 12:41:50 executing program 2: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 12:41:50 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:52 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:52 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:52 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:52 executing program 2: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 12:41:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:52 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 324.286624] bond34 (uninitialized): Released all slaves 12:41:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:52 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 12:41:52 executing program 2: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 12:41:52 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:52 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 324.633889] bond34 (uninitialized): Released all slaves 12:41:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:53 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:53 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 324.925327] bond34 (uninitialized): Released all slaves 12:41:53 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000080)={0x1000, 0x2000}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x6, 0x4801, 0x2000, &(0x7f000077c000/0x2000)=nil}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x101002, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x4c, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:41:53 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 325.111207] bond34 (uninitialized): Released all slaves 12:41:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:53 executing program 2: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:53 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:53 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 325.468043] bond34 (uninitialized): Released all slaves 12:41:53 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:54 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 325.761628] bond34 (uninitialized): Released all slaves 12:41:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:54 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:54 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:54 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 326.108036] bond34 (uninitialized): Released all slaves 12:41:54 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 326.228936] bond34 (uninitialized): Released all slaves 12:41:54 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:54 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:54 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r1, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:54 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 326.488756] bond34 (uninitialized): Released all slaves 12:41:55 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:55 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r1, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:55 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:55 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:55 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r1, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:55 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:55 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:55 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:55 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:55 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:55 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:55 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:56 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 12:41:56 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:56 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x28, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="c40000000306f10000ff7f0000000000000004000700010006"], 0x1}}, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x42400, 0x0) readv(r3, &(0x7f00000015c0)=[{&(0x7f00000001c0)=""/38, 0x26}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/188, 0xbc}, {&(0x7f00000012c0)=""/137, 0x89}, {&(0x7f0000001380)=""/160, 0xa0}, {&(0x7f0000001440)=""/89, 0x59}, {&(0x7f00000014c0)=""/241, 0xf1}], 0x7) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2c6) splice(r1, 0x0, r4, 0x0, 0x8c3717, 0x0) 12:41:56 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:56 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:56 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 12:41:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 328.142795] netlink: 156 bytes leftover after parsing attributes in process `syz-executor.2'. 12:41:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0xc000, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000200)="7cbed255e93c3534d3607dd04200a24533a8760b8dad58e2cdcb56d80ed6163b7ca6cc528438d712d67dc3a8ea4fb2e1fc3ecbaea87bf665c7ee60fd3ddbdf4c1c231cb5b2232165f6491e68ccb620d4894a6002cc3c304c5ef76f52c60910c17e1996699b344ef12a2f44", 0x6b}, {&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000000300)="f077b0ba48333d33486523463f25dc6a87ee5a59e8ef796b161d53310aeef2e79d8378072a2f19f1eb9c046bbc916c3a5a226f3bbf5e5b9d03f7e8135067a9eec9e4b799c2e0b7ce57b427f44d3b8c1dec620552beb289ddb20f6bf62d6585ef964c1e87e155869f4c60311db9de2441df2dd7fea867099b3c5ba53ae4996d76c9ee36e4596caa915ede23c305ce9bc5390f9b2c730632b6616e6b526b1350f3963264ec6f698ed7a5b0a333bdcea4e62ad0d0d0ad8c21c8dad9455da420d1d545c975bb89a3", 0xc6}, {&(0x7f0000000400)="395eb4cf492c92dc0f92567ed4a00f0099cbb2be49d54353de7337ffa93f5916613ed4f628bab8f21c447f7cad087c8e1a9d4ebcc1e60f33cc8b8926a8820cc67b55214af1da325fc42522a7ac577b5854debd5fd19993decd31e50e900cadd2db15a48aaf29172cd5671b0feccec9c2b156ef63f3a47afe2a20bc2291ebea3634420f2500f533fc249f31dbc82ec08cc487e3d9e6e0a51adf442fbe2b38951283cba751dd35085a3f8ef0", 0xab}, {&(0x7f0000000140)="e7df3c9166302dcaa4246640bbf74a157fa393cbd99b8439b2b077ec9f", 0x1d}, {&(0x7f00000004c0)="849fd50b87524f22be7741ccb6c16ad8948e70ab7448a22f5bb9130d1886f94a1f3f6c0681f037753ce2cd6c26f058be972094f6d924517ab679a05b815a0336af931bbdc8fc6e3d480ead1bd41d27f888493f6aaa1d6db8633a3df1341f35a315c62ae771d6c64e06a3856e75cfd6a7eb9d33413e83b5a4e1dd02b87be1bdef2056e95de0975d78e94e2ec4f11408d23a196729a12bb4778eb37eadf484dc4e68f39bfb1f599a0e1a16186249a254038cd96188c0028cf89fe082a2022092f8f528bf84f97978c7e5abaddee86519fc7625af0bc608b550679474382c1e37974fb265b5d69544c5d38c", 0xea}], 0x6, &(0x7f00000016c0)=ANY=[@ANYBLOB="b00000ab26aad1d08695bd9454cb04000000000002010000040000006725da93a1ff1a530700778ca71c41447203976811af7f322b4239c7ca59c3df6d0e207d948b694b478ba4fa66d8dacd92c5a7d79bee6d0d01967f708ac05f1479556ab9cb158df9f4faf3c5ceda7391c743a5af85b4ee0595948eb7dec29697337658a9da8edb4fde59f7b492d6bdc6695ea5407bac78d773561b02f19e82c5e291e65f558ae9c253bd421ee4c19b5ab49d0000002807166e200000003a000000de000000d2d4e41ae7ea00f7ca6c27b5"], 0xd8}, 0x34004054) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x32, 0x0, 0x7) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) socketpair(0x23, 0x5, 0x2, &(0x7f0000000040)) perf_event_open(&(0x7f00000005c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24c, 0x4010, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x80, 0x1, 0x0, 0x9, 0x401, 0x10001, 0x800}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 12:41:56 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 328.366870] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 328.406472] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.415971] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.530707] device bridge0 entered promiscuous mode 12:41:56 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:57 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') [ 328.637348] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 12:41:57 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') [ 328.750328] netlink: 156 bytes leftover after parsing attributes in process `syz-executor.2'. 12:41:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:57 executing program 2: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = socket$l2tp6(0xa, 0x2, 0x73) sendto$inet6(r1, &(0x7f0000000080)="d81344b22a9819d2b13544b77cff1544372b28f93075b61ef98ad87e5f4482557651eb4ee78ee8e9996f798630068e9d4dd4d310af784a58922728edb4ae3f2d3ec6b4cd8f8c328d7322303dbb934a7f7394a7b38c73c3bfe3603b6122ad90e07d6f297b7c9b094123abef4ba0da28bf27609a3348c280bf44940f", 0x7b, 0x0, &(0x7f0000000100)={0xa, 0x4e23, 0x8, @private0, 0x1be6}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_trie\x00') sendfile(r0, r2, 0x0, 0xedc0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xfffffcaa) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x44) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000556000/0x2000)=nil, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file0', [{0x20, '-,U:#-(/,/:\\{*!!\xea'}, {0x20, '*-]/('}], 0xa, "b6d27977e77a8a0676c94d8f040c9895a8d5d80373873d1328813af78b19cfc273a52de62b4b41dfdc791adcceb6a02082d3876e3c214611541dfd53b11f38b2b219c3c0e7fc04043ac6acfd3d9214f3f86753cc2e586ac26803443fe38c11e8419fdde2314ac29e6fe006fbb283318d7a18fa0c5cb566902dbf806ad2ca04452b86127671d132df1a61b53e48e4bac91e5df92c60e14749db4847c5a3567eac41febca2b33b9b5ae6294c268a3744f0bc09a3fff106a12f871fe4e3166370fcd5c4ab59"}, 0xe7) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) fallocate(r3, 0x2, 0x10000, 0x9) 12:41:57 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 328.895690] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 12:41:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) r3 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x81000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r3, 0x80089419, &(0x7f00000001c0)) write(r4, &(0x7f0000000100)="9807dd830f9c59fe21636f31c5280b2224c8a3ae2654a6b97f0ae11740b8f3fe9ee934c1503d009e42eecb9e60ce1d01be964208f37652e22ae349cd77fd1a790a883bc80b5ed96b54da3a6e96290fbd602e5a9a7bebfbb1fa017c79c5c5d97dc3ff57226624266803c58992cec6958038edb88cf1193e696832815c1268ae22ee38cbf861c9cc7d3235c8f539c7332f6bc94a447fb4867f04cfdce0e0d5d53787d8a52b2b026a", 0xa7) r5 = dup3(r3, r3, 0x0) ioctl$KVM_GET_API_VERSION(0xffffffffffffffff, 0xae00, 0x0) ioctl$BTRFS_IOC_QGROUP_LIMIT(r3, 0x8030942b, &(0x7f00000000c0)={0x4, {0x4, 0x8, 0xc2b2, 0x7fffffff, 0x7}}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)="347562860192d02276370788c2237b4d1b116c9748a746dc62653c9b3c2726363b3909dd04d73b0f73ed9db79f9dbaf5", 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66a, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, r2) 12:41:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:57 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000740)=@in6={0xa, 0x4e24, 0x0, @local, 0x9}, 0x80, 0x0}, 0x8000) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) sendmsg$kcm(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000200)="1df3491658c111affba7183e241be6503466b3eed8", 0x15}, {&(0x7f0000000340)="749a81b78c0c619eb9bd572005869f3823e58c1a2ffcd7df4bd109f58ca5ca9dac98bbc0e4fc8e13ef712889fe807ed2e59d3d2b0bed2a0c4ea965ea3572b4f268a02409815992db", 0x48}, {&(0x7f0000000580)}, {&(0x7f00000008c0)="a4193e0e44a78b932b69a6d438d763b30066b43156d14b77676e40e7bbb4f0f535637232662f018f57a3677df508b5818974af30b7d178c8d34a9fa0c3544caae906a49ad7b21565e1d5bf499147ab5f2954a6d47d71af9760579cd80f0f02fef13e76f74b9d6aaff1e713af002dbde993d056c24909eb5cbde04119c2547dbaa5825e1c10b5c31a0dec781a43241f8a37ecee9ec1", 0x95}, {&(0x7f0000000c40)="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", 0x1000}, {&(0x7f0000000980)="383a835eb9afd7ea7bca07adf486f118578d576bd39f51bbb8e84974227c53c87bd8ccbd26b23e5c539f82784fb225c60b8ebb35be524ef56ba8c5f2dfce9cdbf39a4b909689bd93c6bf00da32af0be9ca2149e4747942c7e7f13468b480853f533485e08e32fbcd72ba996cc3ec64d72587ca950042cbea87ba53fa7785abae4c56510caddd5053bbac5fd9c911387e534fdde379afa85f61ca93f3f30e2c31e08e44e946e6462f94a6838728362a6f0e83c005b9a9996a7fa0c306bbc88439042da2cd7d049a4dda4817679fff6fbf036d84d2", 0xd4}], 0x6}, 0x40000) r3 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0x12, &(0x7f00000000c0)=r3, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)=',', 0x1}, {&(0x7f00000007c0)="9fec0442fbd8be341ad84a08f12ec70b3a4e14ee8b90fda7c83e1886ca79b8eabfabe5db251265521891d68723d90c9062df76eb043302f1d8bed56da3f18a986e5817ce0112b21d2e8a0c26d097e4b2ab58f7f5ea4e8d297859cc1f4400b17ef05c11d850d8a9d631c69785", 0x6c}], 0x2, &(0x7f0000000440)=[{0x10, 0x1, 0x1f}], 0x10}, 0x1) r4 = getpid() r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', r5}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r4, r0, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x9, 0x9, 0x5, 0x0, 0x0, 0x2bb, 0x45501, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x5, @perf_bp={&(0x7f00000002c0), 0x2}, 0x0, 0x0, 0x7ff, 0x0, 0x7fffffff, 0x0, 0x9}, 0x0, 0xf, 0xffffffffffffffff, 0x9) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000bc0)=""/38, 0xb9, 0x26}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000880), 0x8) sendmsg(0xffffffffffffffff, 0x0, 0x7ffff) 12:41:57 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:57 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:57 executing program 2: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = socket$l2tp6(0xa, 0x2, 0x73) sendto$inet6(r1, &(0x7f0000000080)="d81344b22a9819d2b13544b77cff1544372b28f93075b61ef98ad87e5f4482557651eb4ee78ee8e9996f798630068e9d4dd4d310af784a58922728edb4ae3f2d3ec6b4cd8f8c328d7322303dbb934a7f7394a7b38c73c3bfe3603b6122ad90e07d6f297b7c9b094123abef4ba0da28bf27609a3348c280bf44940f", 0x7b, 0x0, &(0x7f0000000100)={0xa, 0x4e23, 0x8, @private0, 0x1be6}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_trie\x00') sendfile(r0, r2, 0x0, 0xedc0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xfffffcaa) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x44) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000556000/0x2000)=nil, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file0', [{0x20, '-,U:#-(/,/:\\{*!!\xea'}, {0x20, '*-]/('}], 0xa, "b6d27977e77a8a0676c94d8f040c9895a8d5d80373873d1328813af78b19cfc273a52de62b4b41dfdc791adcceb6a02082d3876e3c214611541dfd53b11f38b2b219c3c0e7fc04043ac6acfd3d9214f3f86753cc2e586ac26803443fe38c11e8419fdde2314ac29e6fe006fbb283318d7a18fa0c5cb566902dbf806ad2ca04452b86127671d132df1a61b53e48e4bac91e5df92c60e14749db4847c5a3567eac41febca2b33b9b5ae6294c268a3744f0bc09a3fff106a12f871fe4e3166370fcd5c4ab59"}, 0xe7) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) fallocate(r3, 0x2, 0x10000, 0x9) [ 329.236795] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 12:41:57 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r1, &(0x7f00000006c0)='./file0\x00') 12:41:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 329.474667] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 12:41:57 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000740)=@in6={0xa, 0x4e24, 0x0, @local, 0x9}, 0x80, 0x0}, 0x8000) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) sendmsg$kcm(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000200)="1df3491658c111affba7183e241be6503466b3eed8", 0x15}, {&(0x7f0000000340)="749a81b78c0c619eb9bd572005869f3823e58c1a2ffcd7df4bd109f58ca5ca9dac98bbc0e4fc8e13ef712889fe807ed2e59d3d2b0bed2a0c4ea965ea3572b4f268a02409815992db", 0x48}, {&(0x7f0000000580)}, {&(0x7f00000008c0)="a4193e0e44a78b932b69a6d438d763b30066b43156d14b77676e40e7bbb4f0f535637232662f018f57a3677df508b5818974af30b7d178c8d34a9fa0c3544caae906a49ad7b21565e1d5bf499147ab5f2954a6d47d71af9760579cd80f0f02fef13e76f74b9d6aaff1e713af002dbde993d056c24909eb5cbde04119c2547dbaa5825e1c10b5c31a0dec781a43241f8a37ecee9ec1", 0x95}, {&(0x7f0000000c40)="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", 0x1000}, {&(0x7f0000000980)="383a835eb9afd7ea7bca07adf486f118578d576bd39f51bbb8e84974227c53c87bd8ccbd26b23e5c539f82784fb225c60b8ebb35be524ef56ba8c5f2dfce9cdbf39a4b909689bd93c6bf00da32af0be9ca2149e4747942c7e7f13468b480853f533485e08e32fbcd72ba996cc3ec64d72587ca950042cbea87ba53fa7785abae4c56510caddd5053bbac5fd9c911387e534fdde379afa85f61ca93f3f30e2c31e08e44e946e6462f94a6838728362a6f0e83c005b9a9996a7fa0c306bbc88439042da2cd7d049a4dda4817679fff6fbf036d84d2", 0xd4}], 0x6}, 0x40000) r3 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0x12, &(0x7f00000000c0)=r3, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)=',', 0x1}, {&(0x7f00000007c0)="9fec0442fbd8be341ad84a08f12ec70b3a4e14ee8b90fda7c83e1886ca79b8eabfabe5db251265521891d68723d90c9062df76eb043302f1d8bed56da3f18a986e5817ce0112b21d2e8a0c26d097e4b2ab58f7f5ea4e8d297859cc1f4400b17ef05c11d850d8a9d631c69785", 0x6c}], 0x2, &(0x7f0000000440)=[{0x10, 0x1, 0x1f}], 0x10}, 0x1) r4 = getpid() r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', r5}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r4, r0, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x9, 0x9, 0x5, 0x0, 0x0, 0x2bb, 0x45501, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x5, @perf_bp={&(0x7f00000002c0), 0x2}, 0x0, 0x0, 0x7ff, 0x0, 0x7fffffff, 0x0, 0x9}, 0x0, 0xf, 0xffffffffffffffff, 0x9) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="99be6784621166b9b653b82a5a6177cf891dd3752c7157000000d2d1f836bf57871ddebb3cd75aa807cb15efdae39b6e7b67be642d0d8948971304034eac355eb6b04ce31eff27f0756127a9e310109d24e5e0c67d204a50125bb053c39e245259ed4978071f1a5162cf677ab62f74cc813c0b8946744331a154a7330b1854354367694877e1117a7322f53e00e212eb4427334ef4317d04a930631eb43f8551a06d16a48c0d85cc151dcf45d9e1766851ab67fc73906a3938ca14e62c0cd684c835a89176249169bbc2a17875648fd394c64701282ec3d2823ae67329f495b9cc9f87c8524f37af8d2d12d97383cb07f1be96d7d454e90e44e7bd08a25f17019285bc950b9eb20ac37c68a2ebbc084f163c1939333a417d9a32391dd86d8258091d052247ecf07914"], &(0x7f0000000bc0)=""/38, 0xb9, 0x26}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000880), 0x8) sendmsg(0xffffffffffffffff, 0x0, 0x7ffff) 12:41:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:58 executing program 2: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 12:41:58 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r1, &(0x7f00000006c0)='./file0\x00') [ 329.862196] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 12:41:58 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:58 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:58 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c00010062"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 330.050757] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 12:41:58 executing program 2: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 12:41:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800009, 0x12, r3, 0x8004000) r4 = socket$vsock_stream(0x28, 0x1, 0x0) preadv(r4, &(0x7f0000000200)=[{&(0x7f0000000100)=""/117, 0x75}], 0x1, 0x6, 0x5) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x51602) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000280)) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'hsr0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x48, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r6}, @IFLA_HSR_SLAVE2={0x8, 0x2, r1}, @IFLA_HSR_VERSION={0x5}]}}}]}, 0x48}}, 0x0) [ 330.204983] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 12:41:58 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r1, &(0x7f00000006c0)='./file0\x00') 12:41:58 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r1, &(0x7f00000006c0)='./file0\x00') 12:41:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c00010062"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c00010062"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:59 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:59 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:59 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:59 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000340)='/dev/video1\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000380)={0xa0, 0xff, 0x1, 0x9, 0x3, 0x3f}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r0, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x3, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffb}}, &(0x7f0000000400)='syzkaller\x00', 0x5, 0xbf, &(0x7f0000000440)=""/191, 0x41100, 0x15, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000500)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0x5, 0xc, 0x4, 0x2}, 0x10}, 0x78) r5 = dup(0xffffffffffffffff) ioctl$KVM_HAS_DEVICE_ATTR(r5, 0x4018aee3, &(0x7f00000000c0)={0x0, 0x9, 0x0, &(0x7f0000000040)=0x7}) dup2(r0, r4) preadv(r3, &(0x7f0000000300)=[{&(0x7f0000000100)=""/178, 0xb2}, {&(0x7f00000001c0)=""/139, 0x8b}, {&(0x7f0000000280)=""/123, 0x7b}], 0x3, 0x8, 0x0) [ 330.953161] 8021q: adding VLAN 0 to HW filter on device bond34 [ 330.960822] bond0: Enslaving bond34 as an active interface with an up link 12:41:59 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) r2 = gettid() tkill(r2, 0x7) syz_open_procfs(r2, &(0x7f0000000040)='net/stat\x00') setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f00000000c0)=0xfffffffc, 0x4) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r1, 0x400000001ffffffd) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket$inet6_sctp(0xa, 0x1, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) sendmmsg(r4, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x8, 0x80, 0xfa, 0x0, 0x0, 0x5, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x100000001, 0x8}, 0x0, 0x0, r0, 0x0) sendmsg$inet6(r3, 0x0, 0x1c801) 12:41:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:41:59 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:59 executing program 2: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:59 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:41:59 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 331.527480] 8021q: adding VLAN 0 to HW filter on device bond35 [ 331.553104] bond0: Enslaving bond35 as an active interface with an up link 12:42:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:00 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:00 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) r2 = gettid() tkill(r2, 0x7) syz_open_procfs(r2, &(0x7f0000000040)='net/stat\x00') setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f00000000c0)=0xfffffffc, 0x4) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r1, 0x400000001ffffffd) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket$inet6_sctp(0xa, 0x1, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) sendmmsg(r4, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x8, 0x80, 0xfa, 0x0, 0x0, 0x5, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x100000001, 0x8}, 0x0, 0x0, r0, 0x0) sendmsg$inet6(r3, 0x0, 0x1c801) 12:42:00 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:00 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:00 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='hugG=alwaYs']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f0000000400)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) ftruncate(r0, 0xcf01) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) close(r1) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKROSET(r3, 0x125d, 0x0) [ 332.218810] 8021q: adding VLAN 0 to HW filter on device bond36 [ 332.233469] bond0: Enslaving bond36 as an active interface with an up link 12:42:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c00020008"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 332.483470] tmpfs: Bad mount option hugG [ 332.642706] audit: type=1804 audit(1617108121.013:61): pid=21569 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir090958255/syzkaller.m1NYG7/188/bus/bus" dev="sda1" ino=14752 res=1 12:42:01 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 332.771332] Bluetooth: hci5 command 0x0406 tx timeout 12:42:01 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='hugG=alwaYs']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f0000000400)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) ftruncate(r0, 0xcf01) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) close(r1) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKROSET(r3, 0x125d, 0x0) 12:42:01 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:01 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 332.942721] 8021q: adding VLAN 0 to HW filter on device bond37 [ 332.963626] bond0: Enslaving bond37 as an active interface with an up link [ 332.968555] tmpfs: Bad mount option hugG 12:42:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c00020008"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:01 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = getpid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x401) process_vm_writev(r1, &(0x7f0000000240)=[{&(0x7f0000000100)=""/88, 0x58}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/111, 0x6f}, {&(0x7f00000003c0)=""/206, 0xce}], 0x2, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x3}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f00000001c0)=@usbdevfs_connect={0xbd}) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f0000000380)) [ 333.098105] audit: type=1804 audit(1617108121.463:62): pid=21628 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir090958255/syzkaller.m1NYG7/189/bus/bus" dev="sda1" ino=14688 res=1 12:42:01 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = getpid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x401) process_vm_writev(r1, &(0x7f0000000240)=[{&(0x7f0000000100)=""/88, 0x58}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/111, 0x6f}, {&(0x7f00000003c0)=""/206, 0xce}], 0x2, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x3}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f00000001c0)=@usbdevfs_connect={0xbd}) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f0000000380)) 12:42:01 executing program 2: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x52, 0x1, 0x9, 0x1f8000000000, 0x2, 0x3, 0x0, 0x330, 0x40, 0x2a2, 0x1f, 0xff, 0x38, 0x1, 0x5, 0x1, 0x1d}, [], "8f91a2439869ffada5cce33354ddaa9045e346dd1a7f3869b59e083d3617004102c83187ee95cbf979e4c6133af7aadbd2576b6ecc5c5bf6b25342a004a005dd975b7dd7c44e7c14754d4ef9e040deefbf0e8db1746c190f4634adf1289e931cca7feb73da8a4fcd7ce912d2d07d119221994c533d7728ecd11adfc87bd8682bd22801f50830568292eee1ada44e6a056c92c72efb9980244bbe23e550bc5353d4930ae9bcee7e87857c727bbec1cf2bf594c4e064da5d2e0ab295d7d56ad2db8c11cb54addd34a151"}, 0x109) r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x40001, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000040)) 12:42:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x8, 0x2, [0x7, 0x9]}, 0xc) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480), 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) quotactl(0x1, 0x0, 0xffffffffffffffff, &(0x7f00000004c0)="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") setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x578105da3973c6ec) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) 12:42:01 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:01 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:01 executing program 2: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 333.428829] 8021q: adding VLAN 0 to HW filter on device bond38 [ 333.447692] bond0: Enslaving bond38 as an active interface with an up link 12:42:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c00020008"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:01 executing program 0: prlimit64(0x0, 0x1, &(0x7f0000000280)={0x9, 0x8f}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=""/149, 0x95}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, 0x0, 0x24044010) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x2c}, 0x1, 0x0, 0x0, 0x20040000}, 0x48) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000001880)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 12:42:02 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 333.653750] 8021q: adding VLAN 0 to HW filter on device bond39 [ 333.662458] bond0: Enslaving bond39 as an active interface with an up link 12:42:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c000200080001"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:02 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:02 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 333.918027] 8021q: adding VLAN 0 to HW filter on device bond40 [ 333.925477] bond0: Enslaving bond40 as an active interface with an up link 12:42:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c000200080001"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:02 executing program 2: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:02 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 334.217741] 8021q: adding VLAN 0 to HW filter on device bond41 12:42:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c000200080001"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 334.258044] bond0: Enslaving bond41 as an active interface with an up link 12:42:02 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) unshare(0x20600) unshare(0x22000000) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r1, &(0x7f00000006c0)='./file0\x00') 12:42:02 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:02 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:02 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c00020008000100"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 334.572861] 8021q: adding VLAN 0 to HW filter on device bond42 [ 334.601866] bond0: Enslaving bond42 as an active interface with an up link 12:42:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fchown(r0, 0xffffffffffffffff, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f00000002c0)=0xc) fcntl$setown(r2, 0x8, r3) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$IOCTL_VMCI_VERSION(r1, 0x79f, &(0x7f00000000c0)=0xa0000) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='cpuset\x00') mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETLINK(r5, 0x400454cd, 0x322) preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000140)=""/57, 0x39}], 0x1, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000000080)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x8}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000300000000200000004", 0x45, 0x1600}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB="80"]) preadv(r4, &(0x7f0000000440)=[{&(0x7f0000000300)=""/194, 0xc2}, {&(0x7f0000000400)=""/37, 0x25}], 0x2, 0x40, 0xb9) 12:42:03 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) unshare(0x20600) unshare(0x22000000) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r1, &(0x7f00000006c0)='./file0\x00') [ 334.971714] 8021q: adding VLAN 0 to HW filter on device bond43 12:42:03 executing program 0: r0 = syz_mount_image$vxfs(&(0x7f00000042c0)='vxfs\x00', &(0x7f0000004300)='./file1\x00', 0x0, 0x0, &(0x7f0000004340), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="6560bbf7720d59b10c51ed9505217992218760be5b52fede9726c2b20eb4349e5ebef52e897b301743cea2acb393839caeeb5364409bcdc296e40a09f0a48e2b9bd24ae1d7bcedd795e9463acd285d89d4a3d75c74a479bcf0e43caf3be9b687294301d4de05b615f47c017df3f85bf7d8b66045016b4e625856d61c0314df143a1e643ddcd961b329345346ae8bc6daf226896c6f0200efc1d1e2ea44092b70c7e0", @ANYRESDEC=0xee00, @ANYBLOB="2c736d61636b6673666c6f6f723d2c7375636c616206000000"]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000c00)={0x0, 0x0}, &(0x7f0000000c40)=0xc) r4 = syz_mount_image$affs(&(0x7f0000000180)='affs\x00', &(0x7f00000001c0)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200), 0x0, 0x9}], 0x800808, &(0x7f0000000280)={[{'uname'}, {':'}, {'uname'}], [{@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r3}}, {@subj_type={'subj_type', 0x3d, 'uname'}}]}) mknodat(r4, &(0x7f0000000300)='./file1\x00', 0x800, 0x10001) mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='9p\x00', 0x10000, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@nodevmap='nodevmap'}, {@uname={'uname'}}, {@afid={'afid', 0x3d, 0x2}}, {@cache_fscache='cache=fscache'}, {@dfltgid={'dfltgid'}}], [{@fowner_lt={'fowner<', 0xee00}}, {@euid_gt={'euid>'}}, {@dont_hash='dont_hash'}]}}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000003c0)={r1}) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000400)='bbr\x00', 0x4) name_to_handle_at(r0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000340)={0x24, 0x9, "7961601004f4e8da3d8226d5400cabdda44c015fa4a2f6b83c5374f4"}, &(0x7f0000000380), 0x1000) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={0x9, {{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4e21, @empty}}}, 0x108) 12:42:03 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 335.013210] bond0: Enslaving bond43 as an active interface with an up link 12:42:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c00020008000100"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:03 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r1, &(0x7f00000006c0)='./file0\x00') 12:42:03 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:03 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c00020008000100"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 335.286363] 8021q: adding VLAN 0 to HW filter on device bond44 [ 335.299241] bond0: Enslaving bond44 as an active interface with an up link 12:42:03 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) unshare(0x20600) unshare(0x22000000) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r1, &(0x7f00000006c0)='./file0\x00') 12:42:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c00020008000100"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:03 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:04 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r1, &(0x7f00000006c0)='./file0\x00') [ 335.600214] 8021q: adding VLAN 0 to HW filter on device bond45 [ 335.615126] bond0: Enslaving bond45 as an active interface with an up link 12:42:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 335.801592] 8021q: adding VLAN 0 to HW filter on device bond2 [ 335.823882] device bond2 entered promiscuous mode [ 335.854590] bond0: Enslaving bond2 as an active interface with an up link 12:42:04 executing program 1: mkdir(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 335.973620] nla_parse: 2 callbacks suppressed [ 335.973643] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 12:42:04 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:04 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r1, &(0x7f00000006c0)='./file0\x00') 12:42:04 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x128, r0, 0x10, 0x70bd27, 0x25dfdbfd, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x80}, {0x6, 0x11, 0xfff}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x6}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0xfffffff8}, {0x6, 0x11, 0x5}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x11, 0x8}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0xfffffffd}, {0x6, 0x11, 0x4}}]}, 0x128}, 0x1, 0x0, 0x0, 0x40000000}, 0x4049) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='thread_pool=0x0200000000']) 12:42:04 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 336.189883] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 336.225621] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 1 transid 7 /dev/loop2 12:42:04 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 336.256538] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 336.272419] BTRFS error (device loop2): open_ctree failed 12:42:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:04 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 336.419806] bond46 (uninitialized): Released all slaves 12:42:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x70, 0x1, 0x9, 0xff, 0x4, 0x0, 0x28f, 0x100, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0xcc, 0x8}, 0x100, 0x15, 0x1c0, 0x6, 0x3, 0xfffffe00, 0xffff}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0xb) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0x81, 0x8, 0x9, 0x40, 0x0, 0x0, 0x41, 0xa, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x3, 0x4}, 0x10008, 0x1ff, 0x7, 0x5, 0x5, 0x8c34, 0x3}, r1, 0xffffffffffffffff, r0, 0x10) chdir(&(0x7f0000000380)='./bus\x00') r2 = creat(&(0x7f0000000240)='./bus\x00', 0x27) r3 = open(&(0x7f0000000000)='./bus\x00', 0x58103e, 0x100) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) ftruncate(r3, 0xcf01) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r5 = dup2(r3, r2) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x403, 0x0) sendfile(r5, r6, &(0x7f0000000180)=0x7f, 0xb2e0) r7 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) sendfile(r4, r7, &(0x7f00000001c0)=0x9, 0x80) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r4, 0x0) [ 336.565651] bond46 (uninitialized): Released all slaves 12:42:05 executing program 1: mkdir(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x70, 0x1, 0x9, 0xff, 0x4, 0x0, 0x28f, 0x100, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0xcc, 0x8}, 0x100, 0x15, 0x1c0, 0x6, 0x3, 0xfffffe00, 0xffff}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0xb) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0x81, 0x8, 0x9, 0x40, 0x0, 0x0, 0x41, 0xa, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x3, 0x4}, 0x10008, 0x1ff, 0x7, 0x5, 0x5, 0x8c34, 0x3}, r1, 0xffffffffffffffff, r0, 0x10) chdir(&(0x7f0000000380)='./bus\x00') r2 = creat(&(0x7f0000000240)='./bus\x00', 0x27) r3 = open(&(0x7f0000000000)='./bus\x00', 0x58103e, 0x100) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) ftruncate(r3, 0xcf01) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r5 = dup2(r3, r2) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x403, 0x0) sendfile(r5, r6, &(0x7f0000000180)=0x7f, 0xb2e0) r7 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) sendfile(r4, r7, &(0x7f00000001c0)=0x9, 0x80) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r4, 0x0) [ 336.638816] audit: type=1804 audit(1617108125.003:63): pid=22304 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir585260122/syzkaller.UG0k50/313/bus" dev="sda1" ino=14467 res=1 12:42:05 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 336.697296] audit: type=1804 audit(1617108125.063:64): pid=22311 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir585260122/syzkaller.UG0k50/314/bus" dev="sda1" ino=14759 res=1 12:42:05 executing program 2: setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000000)=ANY=[@ANYRESDEC]) stat(0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='cpu&0!&!\t\x00\x01\x00\x00\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-i\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00') syz_mount_image$nfs(0x0, 0x0, 0x0, 0x7, &(0x7f0000000cc0)=[{&(0x7f00000004c0)="7a6872d6ac247220cc0d68ba58a099f9c63784118d0d693a4d8a3dd7e238a7d64a65990925ff51255050c3e09b477c0353f5f82085e666c626da9b15039606c128fbe3d6e24274d935f905fc582fe1c84cdff47ffe08610c3bd4967b3668f26cd53cb6138e9d84282029999eca38fc4d8e52d3124adc18241472cb56c59ea4ec83db01462c", 0x85, 0x6}, {0x0, 0x0, 0x576}, {&(0x7f0000000600)="d9a321178a95eb48837d735bb1edd38bf6f2c4cebdf5977548995177b0b18e93fd6721bd5e8ed679d89e1132df2d98ddae13cff85cc82a5ad3a44f4869f8dec074572f8dbc40260cbf67d8d86b1a099703bfa9b2fdcd3fe835e4a3f43e79edef45e17e121480dcf70706663260efa668a92019364edf", 0x76}, {&(0x7f0000000680), 0x0, 0x2}, {&(0x7f00000006c0)="501b4d0ed15563dda50333851c55f845fefa68f18addc0e97f8ed91fa2f62c18243e6f9b497ed1", 0x27}, {0x0}, {0x0, 0x0, 0xfffffffffffff663}], 0x0, &(0x7f0000000380)={[{'ext4\x00'}, {}, {'wlan1\x00'}, {'wlan1\x00'}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@fowner_gt={'fowner>', 0xee01}}, {@measure='measure'}]}) 12:42:05 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$key(0xf, 0x3, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x2040, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000980), 0x10a9) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x46000) lseek(r3, 0x4200, 0x0) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) open(0x0, 0x0, 0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000000), 0x10000}]) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r6, 0x0, 0x8400fffffffb) [ 336.792831] BTRFS error (device loop2): open_ctree failed [ 336.820910] bond46 (uninitialized): Released all slaves 12:42:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:05 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 336.962962] print_req_error: I/O error, dev loop2, sector 0 [ 336.984263] audit: type=1804 audit(1617108125.353:65): pid=22343 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir585260122/syzkaller.UG0k50/315/bus" dev="sda1" ino=14385 res=1 12:42:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 337.274558] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 12:42:05 executing program 1: mkdir(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:05 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 337.427354] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 12:42:05 executing program 2: mkdir(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:05 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:06 executing program 0: mkdir(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:06 executing program 0: mkdir(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:06 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:06 executing program 2: mkdir(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c000000100085060000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:06 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:06 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:06 executing program 0: mkdir(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 338.352512] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 12:42:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c000000100085060000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c000000100085060000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 338.499145] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 12:42:07 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r2 = gettid() tkill(r2, 0x7) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x9, 0x5, 0xb5, 0x17, 0x0, 0x3bfb, 0x40, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xfffffffffffffff9, 0x5, 0x9, 0x199, 0x1, 0x4}, r2, 0xb, r0, 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x3) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) 12:42:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 338.695390] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 12:42:07 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:07 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 338.833963] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 12:42:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:07 executing program 2: mkdir(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:07 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 339.026070] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 12:42:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff010000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 339.189704] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 12:42:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff010000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 339.329769] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 12:42:07 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:07 executing program 1: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:07 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff010000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:07 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:07 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff01000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff01000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff01000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:08 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:08 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) unshare(0x20600) unshare(0x22000000) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r1, &(0x7f00000006c0)='./file0\x00') 12:42:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x0, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:08 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:08 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:08 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x0, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:08 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) unshare(0x20600) unshare(0x22000000) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r1, &(0x7f00000006c0)='./file0\x00') 12:42:08 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000002c0)='NLBL_MGMT\x00', r0) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0)='NLBL_MGMT\x00', 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="f58b18bc", @ANYRES16=r1, @ANYBLOB="01002dbd7000fedbdf25040000001400050000000000000000000000ffff0000000006000b000b00000014000600fe8000000000000000000000000000bb08000700ffffffff06000b0009000000080002000300000006000b000500000008000c000300000014000500fe80000000000000000000000000003f"], 0x80}, 0x1, 0x0, 0x0, 0x800}, 0x40000c0) r2 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_SELECTION(r2, 0xc040565f, &(0x7f0000000000)={0x5, 0x1, 0x2, {0x8, 0x60, 0x1, 0x4}}) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x800001d, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004400)=[{&(0x7f0000002a80)=@file={0x1, './file0/file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000002cc0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x20, 0x20040000}], 0x1, 0x800) 12:42:09 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000003a40)=[{{&(0x7f0000000240)=@hci={0x1f, 0xffffffffffffffff, 0x2}, 0x80, &(0x7f0000000680)=[{&(0x7f00000002c0)}, {&(0x7f0000000300)="ff40efe5ebe0d91aada326c1e29c368f18708a98ca26a7a4e8f94ac969f115d88e8d02499536ae6eac729786a1dce6ec418487a13ce2fefc2f19131787b46adefaddd6aa68a205583626087274083141aae1c463d7c44b873a04f837af85d71d077074acd4730eba61e28f8a086a1b55c547cc8d8a3b40ab0e3ed50aa42e1ad57211dc8dae6a295c1f26f080fbcd1debac80fb70537c1acc140a994804021dfbced207c9781e135bd17e9548c09c1867b202dae5de726cbd14d1f890e406977097a5259b563fa8064380c0390561a9aa7f7fac7e5d21922d1425893c99187d64aaaee177e64e13d00240bf2b8d01afaa70", 0xf1}, {&(0x7f0000000400)="276c0e7434b7e134129b9fe63ea11740d2b5f1348a3037d1b6e1233d06623dd75d7a4dea3b272b5ad4fca9759def88bcfb8f7ce0c1b869c784d8a015218e28b9267bbb9cd17195ed40a11e58b0c0e34fbf71930138ecbe63d091b616beb7cae51441674aece83f096b49fa7d58a7f2e6928edf0d1bd778cb99213faaefeef483174419ba2d31d5067d8f6330c35153f9940010f237dd0a1c35c503dd3c93a3c903ab34d16da7", 0xa6}, {&(0x7f00000004c0)="84c57f0a47a25f10833cc6f67193b37caf204316f988cd86bdf0d78f1007be3678502ae90b4644f97e49bfab0593a9ab491a0efb83fd536226e9ac0774068aef9df81b82ae1940afaba1af237dbfaf040d1f3812bfeed47d748b23f2c59cbed8ca47a89c76c48a5ac362d947fcc0cf1a55f817e4a8321b594fb3", 0x7a}, {&(0x7f0000000540)="365c40e596ee6fa6b1eff28ba50c47c6e7aa56a47868f89fdd406d3be0536ae3c762f1acffbe24a45e36967c2af5e9998e5349fac9288c254206dbb3af968dc410be575a82b557ae9db6c6ee5b14ee12aa21a6a1d913ede23fbc0c3a32c70765a0e2bdaef9ce37f1", 0x68}, {&(0x7f00000005c0)="c5b2c62dc4b876e3637ba5b44bf28fdb93fd3f0c4af491d1a0a4feba133e0b6b09046bf77519d7b2acc57060cfab7a235c0a77caeea8423954cd27b48ba65c40957852b91e9b0f2951ce1671b598d080392958fe800f37d8c51e8d1fd711abbe8c8208d3f7f401580d88a49b7e1f6cbdc978b6b9bdc6c3b12108ee0b1a8867f391d05da2880e5c5af131faab775ca3fdc68176aa3f8da5d5b2c58fbc0a43895b0156f6ad61a13cbee990166d1b240f1084b9b931d00381c3d409", 0xba}], 0x6, &(0x7f0000000700)=[{0xb8, 0x10d, 0x10000, "5670e3b64a85a2a4f15faccbcda1eee9e108c9a46514bbcce739c6c496c7a07a9789179486fb3113d9963c196d7e1e4f167602769f3a4c891bf380712d24bb5ec31b5c5fab5e0576628437c3b2f91702bc2c65989ab2006f94362bcaaec52287b763b685f9524cd254f054367f8420ad291e1753b53d080269264e43ba426478febc15a90fbda15950a6848f25189e8d829167c5af2dd1902b6135089d45fddba3"}], 0xb8}}, {{&(0x7f00000007c0)=@rxrpc=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e22, @broadcast}}, 0x80, &(0x7f0000001e80)=[{&(0x7f0000000840)="6e274c704373d2651fe793e70f25e3685f6da94644d5aa1b1b05f2bb552246862c7c3ee938eeefc0c013b95da6af44ae5e6ab3eb91d9b60412c4875cd3bab133dc37f17f078ee30c1be205af94381aa5fea830e8e720ab4af3e7a840a549057d395c6d9ae8f6e700c5b1fcc0bf646ff988a1fd21d7ad36680630c8837887d620205d24c4c42396b80f16e0b70d752c", 0x8f}, {&(0x7f0000000c40)="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", 0x1000}, {&(0x7f0000000900)="01ff5d2be8088fc13c2900753b9e836ec1cc0c62cc14515fb4b1dc3fd5749acee5708d1ba4ca3a1e21638f1b43fb0e492e303bef33a839cbfe4e6f17c27b3c79a82a4c635b2d1154ed6e837d9af00e13f9bdedf50ae65280fba37a42f56878394e528235fdc4d759ddaea79004ecc9706d97cdc505bf85d23e5e6bc2f75c1e2046b79f9fc29cbc6c75896f9019e11eb650d81eb60516394b2291f6e68fab7ed4b695cf0772f7725bab39487803991136cadc710c8183e85d371ca3ca5e7ce19f510a947a38e2dd0d8c217ea0b33e7eccf3a8a9e34bf50b60507146d4685d4b374a0660d7fdfe", 0xe6}, {&(0x7f0000000a00)="ef31cd3c2aea2d07e938a2240da90a64722eee55f23c7087548354d88c33606d6eddfcc4f07ca8c714b0af1a9edfde32180a25b851292f95e694438171447b9d9264a07320fba63ffc5a81ba3368b5fad92f5afb003474a0e3a42d83e0c8a077633279b17f80db3677c4bdbc5bd2d009b0c1fce868ef2439d5f82eb18d5072f44e94fe52186bed96c7e2b348f00533a5a980557edbda9586eb00acd8a8427c011baf26f0d5c1c6b26f21d3f59edc8446b7ff4a7f", 0xb4}, {&(0x7f0000001c40)="e7a4e97e80ffa8f964469b627d312b2407c0acf8c92217b9e8af0de00c6e1e84f23b18ef43165d4e5258d371ce00aae139da0311ff7502e2b0a6cf98c1dc95ef8e38637fbdd6ffd096e7d82f2329aaee2f4182c6f9119c93db12bc74cb898f2bb5873c5be6abc34711f5132c7fbfcae885cf488fc622dbc7970ef42b142a131fe59d460938fe74f1fdb12c892a96e17cec8c43231c330cbdd484f4c6683f1f891a71d253ef83222bee98a70b6c8f8346d7b0", 0xb2}, {&(0x7f0000000ac0)="ffe3b99fa224a9", 0x7}, {&(0x7f0000001d00)="81da93a3adc64c1d0ef90926fd9a6cd6b1f04638c54203ed0524d08d6973ece6515d23e2877e820e269634c5c4508c2408c6c1db3455127340ca713271a22c4e69f0fed27c0106f3caf3ca359a3b8eca5b70d599f464d37fa39ddf8990cbf66a7a7789f6aabc", 0x66}, {&(0x7f0000001d80)="67903f11ccd5df8b1cbf011dafc9e89cacbe1acacded20f099d879c5aebbe2786b2036e979e093e6c7adee6995f72222618dce67daa1fe6183fe49f4be6b6d48cc248bbf0ddcbf5a072693bddecf09fa63b5c072a9605f1cf31a498172a43068e915aea86a92f707c88f8192fe445ec463438695e775ce2b824d6340228c94c0ad055231f0536c26735213f760998e879d1c87fcfea9000b9b5b0540d73a5f50277c9ee99a2cf02d968b43bd4ba52b4f26032fde4ec49c6b97858aba37877f8a988871008a6f93254db8a59cbae7380900c68fc1c48501c5ec6aee5f151eb2eba4fceae4f1220785e1b5bc8fd8d3d6fc7ab5c61e02", 0xf5}, {&(0x7f0000000b00)="3168034b", 0x4}], 0x9, &(0x7f0000000bc0)}}, {{0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001f40)="37e30141593d3e9bc2d4209fe8e5beeca66a65761c6cdac6f245e9b85be50ba08eb3d25fbaac6f638b40282f6b6bb69fdb927a8ab02b6f683df18768fcf04c9906c5062130f61316d52555f8d904972e2b60b1952016d7d33c1d5b5236268e73544298f6f62b48f67487e10eb8ad6f840082853f2c0e3f69fe14f5ac3b73aabf9164fd6d04135c52be206fd3697a1dba807e21adafadfaa223e0a07db14907bcc99285dae3ebcb62", 0xa8}, {&(0x7f0000002000)="5e1ca8b213ae4cd6cadd947cbcbf972801528d59752f4189f7dba9a7ee4344530f8c4ed940a9f8ad961f0b9520dd1226a1a8d2fc5048ccd97654b5f65ef8d8518dc9a69a2c57a4e218846282dbf6e1d006a1b2618ad8dca34a692e454e6fbb69447f9b52c88f88412424e0bbc1aae96b5564ac364b11af30265151c2ec39320f5bebcd8737eff8a4d13237ad75575533f36505a6446a37024f24a59042e7e08e67f18dbb4203813c9017dbb3b492ca8de537ebd16c0eb77c71973ec6a0bcd9ca1a6d01f47c9444dc7070bbda03d9ecf20144a1274f17e649322d95a4368b2075837ba34e4bbef3e7fbb6f9d1c8bf07ec935e2987f97ada", 0xf7}], 0x2, &(0x7f0000002140)=[{0x108, 0x10e, 0x6, "681be585a023645d70931aeb0c0dc413450bb514654c6f93c01b84fa6c88e874cf435bc3d65a1ccb338204f15961be3f2caccf6b00a9166c2eaf64b04329a4d0a5515367347b948d30be49ffce2cb240c71c843a6d5c42ae28074507d33580012627447329d52365cccefa53f2b57f25c15cb4d5f9c9c19ba3fab3e931e52570bc4cd79b9b15b066e09f25d70c45cfbeaa3f74d9598dc110804c54d0e8b98407d1f66e686b536f2745875bd2c045cd36f22605c396ce56767588b26975cbf6d878d6732e99dd7104b8e5a69125ff78a2832f66a4971cdf1f6544011c5e6cfb4103e29270fa5e9dfde12712897273c73c5411c4"}], 0x108}}, {{&(0x7f0000002280)=@in={0x2, 0x4e23, @private=0xa010101}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002300)="c8e707707b7ccc9747aab3dc7bcc6c5bd1f77429a4ba7c4913c791f540748bd892d5113136df32a7063340c8c8e9b76f8a53f2d75bd37e78c0abce7c1aada4b9", 0x40}, {&(0x7f0000002340)="e1618c30619a38d62d4b1f47f73f33b5a81c77dfc6ee13f24f1702d8fe6ebf2f475a618ff53167b03b4fd27c11a911210adf418fc0ceba0a4af5055ee178b521549103e176b988264df0500b0f5fb8", 0x4f}], 0x2}}, {{0x0, 0x0, &(0x7f0000003800)=[{&(0x7f0000002400)="4e218d5ebb0f9d06611c5a719b1b0fe0ae9ab9d19998", 0x16}, {&(0x7f0000002440)="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", 0x1000}, {&(0x7f0000003440)="14f481272fa58ae0af0b041dcca4eb1e28195ee9d6a7ee8c09f2b21834c7b4dcbb9e5a02eedbe5016184600373018de7f391257e72c944cf49e58703cb7106efcd4531f078163e950f345dccad1255bf22d478de3b34765d3cfccdafcf16528290afc250884452f77f6589b06dff3f70ff90bb86b7d3f23ea2c2d3de9c22d17c5f938c88c0c5858db7c2adfdb6fe16b8b2cbfcc43aadcda9871574cf83c5aca365b871a1e502bb657d3991975b672541444e5cf6cca4a15cbd88fede3f8d07c69d", 0xc1}, {&(0x7f0000003540)="7ca7145c0774eebf90fc6e2c5e17c307275c16ba2c3375a89ddc18c77107dc6b5a2da41f3a12d4e978f68368b099242c98c33a55a5745c4f181b85eb56e67ab21cae5297d00f50d18169d1b447", 0x4d}, {&(0x7f00000035c0)="54606c3aa7016c7d9089c181be44df8489827067d74dfc00f082cff5b0792a441fb728f6faff930e5c5a2d1c148c6ae1ace06f87e8c98c50ce178d1eaae4058953111521efe74936f6a496b7136b0d0f8fc95cd8648c9e0feadf59bbcfd68c8e4fc8690de2328a5f059154bb605fdeed7c07940b7bfa6f606a61b9b819caa90af3a6c541b0c3d67436b408a6db91702678e37aa44db84a28c9539751b5b180dc1917f1f5e004974a9c822c3c37e65628737693357c50ddccf0796ffcc00e2ff62ab367188108502fb0065b53ceaff656c8fb36499a849e9447ecff19461be2c7436fdd7024793199eb9aed1cf76f5c138360", 0xf2}, {&(0x7f00000036c0)="51b862fdac7f6bab458c42a16f86b370f14f1172c94378300a776c06c01b79550f6b8302aef9207813af6ce145d70e7d85d4a0a57f87f16657b32ac584a8a4e471a96f2aadd15382ccb98ef6f2f6850a5fddbdc407d9a2122b0b342fdef2c52cf40515dbe2c3bed17154e3b77d5566ca17a5d3d69fbb145929d97a6a34c9cb9243", 0x81}, {&(0x7f0000003780)="9379474d86dd51b7c0d6ddf003fe3bd2705087fd4bbb2220323bd5760e8f84868b742b7b5470ab5bef40b7a11b681a3f1bd52800770108206c0e705b6ab50549dcf22bcdf26c0dfc66b536f84f2f79eec1f6ce904d96f0bcaf401fdb2e06072e", 0x60}], 0x7, &(0x7f0000003880)=[{0x20, 0x10e, 0x0, "542259f48f65d1b7bcc8caffd55b"}, {0x38, 0x104, 0xebca, "bc765e8030f8f004731d15b89309eab5cc8e275eb1df0de1f6a290f4129ec81d7b47acca"}, {0x20, 0x0, 0x6, "9986641120516e4d97"}, {0x110, 0xdf1257e896abbd02, 0x1, "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"}], 0x188}}], 0x5, 0x8080) socketpair(0x8, 0x80000, 0x6, &(0x7f0000000080)) gettid() r2 = getpid() r3 = perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x80, 0x0, 0x2e, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x400, 0x2, @perf_config_ext={0x6, 0x10000}, 0x890, 0x40, 0x2, 0x4, 0x80, 0x6, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000003c00)={0x13, 0x1, &(0x7f00000002c0)=@raw=[@generic={0x0, 0x0, 0xd, 0x6, 0x800}], &(0x7f0000000bc0)='GPL\x00', 0x10, 0x0, 0x0, 0x41000, 0x18, [], 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000003b80)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000003bc0)={0x0, 0x7, 0xffffffff, 0x7f}, 0x10, 0xffffffffffffffff, r1}, 0x78) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x80, 0x4, 0x9, 0x1, 0x0, 0x1, 0x800, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x0, 0x4, 0x6, 0x9, 0x69, 0x37e15266, 0x5}, r2, 0x6, r3, 0xb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000c00)="480e003f0000007e5bc5795e8064", 0x0, 0x300, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 12:42:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x0, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:09 executing program 2: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49d8, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) unshare(0x44020000) r0 = semget$private(0x0, 0x0, 0x0) semtimedop(r0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) semop(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x120) semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000), 0x0, 0x0) r1 = semget(0x0, 0x3, 0x10) semop(r1, &(0x7f0000000080)=[{0x3, 0x7, 0x800}], 0x1) r2 = semget$private(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x0) semtimedop(r2, &(0x7f0000000000), 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 12:42:09 executing program 0: open(0x0, 0x141042, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x10041, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x7, 0x3, 0x40, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x10, 0x8003, 0x8020001) open(&(0x7f0000000140)='./bus\x00', 0x141142, 0x50) socket$inet(0x2, 0x2, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(0xffffffffffffffff, 0x942e, 0x0) 12:42:09 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:09 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) unshare(0x20600) unshare(0x22000000) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r1, &(0x7f00000006c0)='./file0\x00') 12:42:09 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:09 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 341.082666] IPVS: ftp: loaded support on port[0] = 21 12:42:09 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:09 executing program 4: mkdir(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:09 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:10 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:10 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:10 executing program 2: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49d8, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) unshare(0x44020000) r0 = semget$private(0x0, 0x0, 0x0) semtimedop(r0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) semop(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x120) semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000), 0x0, 0x0) r1 = semget(0x0, 0x3, 0x10) semop(r1, &(0x7f0000000080)=[{0x3, 0x7, 0x800}], 0x1) r2 = semget$private(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x0) semtimedop(r2, &(0x7f0000000000), 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 12:42:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:10 executing program 4: mkdir(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:10 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:10 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:10 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:11 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:11 executing program 4: mkdir(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:11 executing program 0: mkdir(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:11 executing program 2: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49d8, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) unshare(0x44020000) r0 = semget$private(0x0, 0x0, 0x0) semtimedop(r0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) semop(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x120) semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000), 0x0, 0x0) r1 = semget(0x0, 0x3, 0x10) semop(r1, &(0x7f0000000080)=[{0x3, 0x7, 0x800}], 0x1) r2 = semget$private(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x0) semtimedop(r2, &(0x7f0000000000), 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 12:42:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 343.021178] Bluetooth: hci4 command 0x0406 tx timeout 12:42:11 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:11 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:11 executing program 4: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:11 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x0, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:11 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:12 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:12 executing program 4: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:12 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:12 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x0, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:12 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:12 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:13 executing program 4: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:13 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:13 executing program 2: mkdir(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:13 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x0, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:13 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x0, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:13 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000000340)=ANY=[]) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000000)={'wpan3\x00'}) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040)='NLBL_CIPSOv4\x00', r0) r2 = syz_mount_image$nfs(&(0x7f0000000400)='nfs\x00', &(0x7f0000000440)='./file0\x00', 0xc9e1, 0x5, &(0x7f0000000cc0)=[{&(0x7f0000000480), 0x0, 0x4}, {0x0}, {0x0}, {&(0x7f0000002280)="d4421edf5317cfa6e23ca7ea55754de615fd8c61cf140aba79f9c257f4aa98155f3b101dd4681bc2f6538c924b39bcc482d6cdfadb3eea5a088973952dc92d1ecb8597c44b51420ddf296e2bcf40dcaa6517563e63cbbb20c0cbf7607b04e5cd8bd8d03c8d0e22fd69002fcd4858e18a77f0497d313ff04d72ac5c4ca89eff90089e14436bd9e26079c0d064ee7f409fb3afdbad91d12aac0bbe96d2fcbf6e8fdda41c8288893df1b91858442a975283213471cbc7ca371bd7c447f0654f984c22d7f81964cb84d533b096b1f6980a93b05f394bbe02cdfaf31251550c078d0e543e2e481148713573c3467ca8ff7e67ea7be130bc13baa23e75ed9df1f9a1e66047babcf6b88cc3c6a6748efcd354fc34a0433772a93008738f7c25f91832d6cbb7b250acf8ba84f98e64cfc4aeca456e429daa6bb3323ea1d7742d004ce40ff1ea299e30e6edb36997c3d64dfe1d3dc143758caa35d17f4b714f4bf8a9d45df6362de6499c39e2d3a295a3f1e39bc2536ceb28fbae83bc24ca7f0a83a52fd1dad7fe76e60cb8c28b372cde0dfece2dc2e796962d47bbf4328ac4a040c9a6e10d916345fe558388b63a798d66566fd6745f707f90bc77b030167bef50a89dd299ae7601229a338a834ded91d7ef210781d8f5d489297570535b043126a8911c34b0deffa2e1f94aa35e5f0d48714b2ee2747c6966da473cb88d26d3da8a51f5e470285ed8a57924b7700783b329091ddfe62e3bed0cd2a18a1c8d3d9212f4a7130c9f66ea9f5beab84a5e5cc0ae695e803cc4964fd998798395882a4e5abd8a514e06946b2e2c4ffab42b3bca71295bbe2ab31177de5221bf11aa154a1f99f280e022c8a479dcb3bcf35ca5c1468fea5b8297fcfa5356b2db96fa894d8af8fbfe638ac0911770790fb15ccb433f6ab1a8a7d2d9b5d066c04cffcd5aa83a1d9ab25aabe2e770549b1da0b594e11d740cf864d0c711ba754354ad9af4914b24faaf459bfe8eb3bae1b15fe4c347323314c2e32ca74013e7a636df99962fd68029a6961b60ae6b89ee3023c0f2b0664745cb0f5e6fd0cd8d05083a315cccb70129d2fef604f2a3cc015410d2506a2d0e732a553bef280fc151e8fe606dd24c762bf4d700920771e1065221ce84d69ca5a4074c575e69b8994ffd0a9f6a644ebdbd9dae85d6dec10e0c3dc9113029ccc2a805337fc3a726d06ac4e8511c346b588aa278e7a9c904a118c8339fa7e99f1bcd92c4179571d5824f43381955bdf41c5aa10dd344f5b5d750413f66be3718cf673d9c0ef573c455125084df5c17284f5b9cd14602c0a284cf580fd61a58c578dedd27e65517b8f0a00d6decae3db67b6a43254a19644b9c49e5e9518cd72c0e77679a6e97ad116fdeab306a676977030decc05a13b3f8d572de63bda694fd0442103d2c49a86a60bc79f5c400bc564755d62f555cc55356443f81c797b23c8d7688437e87c16a54fc18d0ff22f907ffa822a0575e895c9a449ed68f385cf453f703eaab89bc7de134615652f42d68b9da54e64bfa3f63023dad5c17e7dbaf7c9f311918ebb026fdc69a649decbb7bc2a6182e915769214a87dacc6b05463d883770d0b4d4b59ca52c35567132badd472eda312a0135cdc03b99a194d90427539d9765a3231d8e2f5be5c969b418f5a220b544307a249f1350c67bbfa9ce41830d864fe2bde012c443e103252039f1b8f8bf00f08bcff46cac936913aef4cda0d6eddb21446cbbfe78e0df729e16d0270ddbf15bffae1d8b7f9008fbaea7d429acb4be9a0fe319b92172acbd66e0b297b79cbc1f14bafd057e5c2f89a61d306340baa6f766173b97aaf1da7658e3d6373cbb24420c3a7b4b055bfc9447552c1cc28b4e4898717103d024376cbe0fdc1dfa8e1f4b59f5466b12582149025b75ad84eab2551cc8cd680a78deb9e49fddd84f9e281e0a8f7d2852d66cb50819c9eeedfc541dba672a7233863b393e51bc697c0f7163bb4697a2f84d03db48cf60814f7b328f94b9cf1cbd45390bf927c2e4f04c1d3b82e42b9a6c25f6fa9381da9da7533507d8a0f40ad8381898f41427cb25866df8acc2812b8c7680aa0ec055be4abcd69561605143afe4acbed1a2102741e4c11f17f9440b3fb7469daab6e63765a9e9e7cec4032fdc036f6513d6f630c57dfac15bb167e9113148c6152b599175de831137ccaa9d12ec48ddc75c989aa66504bf5bb2b3857c9442664d85f14e9ed729bbef1eaa5af636c664febe583a0883e561fb9147e4e234e2de01bc131f2e37ba69f4c45602e5081c220559a3cb84b43f0f1b701e11a88c3f766b212c5361921cb0df74e3794022d68fae0f1972108d53b3a717016f110915739632a5b46c67bafb1f3828cb044e9ff808b1883ad635c72ccff7bc0cca1a5d21e7a8a462160a6408eca9e1f135d0c2e2b50e4480b6d5e58c70f9eb7ce4a4a31dde329c5f3cf63a41ae4967ad61e3e8b365eb0783987ce7d8ca2f218cdd517985c3f8f5adbfa787e43ca529a0f10821fbb69f5906edaad9630b6ed753f558c21833555904b61460b8a16e76abca1456690007e4515075ce0fe02b3956307bfff6d194fd6e888187492c17b02c655c07e17d1eadfe29903228690caa29eafe32740bd2e805efc61ef545154a69568ef148beb354cabcea56ce23f1c9d45e1491c33f36bde3852baba6275607c902820297594258690e85d429ea5bbfe9d53db61ee4db2cdbfd5fd6eb24191ad2944976d482724f9f428cb214f166a43a232698a2537d5e0d24898ae3f59c60c784a8d342c0c481f3003f296e9869d233c8a185cafc7ffc317c0af39ff49b6c1e021fdee16f9a9b196ead59f68845ec5ffb65be3182c56d56ffcb0c7c92994bded2165c72ad85dde5f9dce30ac8683f95c5e702b47c903d015a22b1b104ff78b08c0df0b62d5b217f8a230d0d7a239903224bbf642955c52f0e270a306f326ee93bdd3ad099e2bc3f5249a19e437123f0e3acf9b198635512a8127701ed6d3c862c5963454a0202ad82ea8779a7adff5c9a9f5507741745c9a93ffb8d9bcd8fdcc1a7f25820d8d1634889ea0758dadb845d45e9501c4b90f7403840c44895b5b61f9ba1b4dc3d16345ee3c1d27c6cfdfc067627779196927dd6fcf5a7d847688a4340489efbf748e3c26498a55413ad0953c41f3f63ed18e2861cef08e37ce312569f3134da15f10dbfd0be9bb6f60a7d2818937414154f078129a9792eb011f0ae9a5dc7e20bff438bc6f7dc744ea616f82f37441b52e7f3f05de5cfb4aa59756688cab8c2c111f3d73faf21abef7c5d552f2bcfe8c9ba5d75c465bc56e2d1fbe60afe245030d95eabf600d56091be4b3ab562fec98e907be7da2ddd436c1114f905a7b051f16a42bc8176836fc4c032deef72979aa406b8c2e3a229e71d58c971f008550e5869953e784edcb8d424c058c09ec4ec1d4659e5d0d2171e090741e06427676ec94aba887361aad0f2be9fb4510fad87c54205fa7cd906e8c7d5548af8bfe62be5604e672ccb1898a21cc79ed40388d4b8dacd0e6e0abffc5cdcb08b565b7982bb5626685b45da63a265b84f0cbd161006f0ee6c95bce2b4d1c89fc69eec15e764b49193343d9adfd3eb3517473cb145411824cc16aaed78d4162bbfcc71f7089d46e83219cc7d3986de2216ec53c637bff38efecbdfa4bd170e7e7c33119b6a83e3280bcebaed014242cc60a53b80e9bd86d829b872936fac6f906296271084a6748958cae5f6458302d7fcfbb924408ff3c5656e337a82e8744c40cfa59ff2bc2391dbcff01d4c81207a14315531aad48778bd49a9be0e26bd609d939137a6a95d99a2866e158941f9ebedda16bfcbc3dcf2cd00744e170d78ebf918975aaf8972c5ef82f580b4e72470f3e0ff33fe70af0a8e63ba66e6287edd6f912d2460a51c2357f975639ad7e03af675a678c413b3975ea91f8d6f19598554f1c19a53263b4fd22d67394fb2cdcf15ed157dac7ae18b8e89db16e1475d2e765fe538a88d24da8865bcfe0026dd69efde0bd4e4207fcc042222affa1c9935c148202ddb28ccb25ebc66969ac895369610a825b0b98b6451b547e99d1333f167be6c1e8be900129e2194e6e116c268c099db43626c9964e73d9999a19ff9685fc6b47ce55183ca041490df69ff45ca7c6c9e8e69ad199855418b46001e7c07851356a5628433336ebd1f0950cd72f71500915ac636244474cf64b2829a56f2f0958a68b1360699744383e412d74056da6baf32feb64234a892abdd9e0db09660fb350e8c6706ed82dd3f723a0be9d69d0d551a41a6fe02f32a11946ca119c09e1ddc15420ecd3b0abf53f0802eb80ed6649e485f962b36ccab344f00240758c7d5d341630cc849b859a174b8fd0efc027ae7baf1835b32499325b85addd769c04b578d903b47e8274afc86525fd5e9417e5e3034cc1738481a9f1b6762675bd483268f8a644a1f988f4f27bd88484a38a46fb15fa40dcd28480f0dbbf84181343191e4e0a854cc7eb3bbd32080c11055b28deb3bd8df8195e4b84df6777ec2fd8e0708124cd52567102e8d8942eadcacc1934062e85c5debe0508eb5bf5ed48e3d1115003ac07c0e59c6a936847152eeaab9caf7a4fb6b07a8bd06cc87248025800ba2ee21471e0499b0f85ebe88c5c8b62de0e214dfc3372c9c4e99f86b87692f45fbc39f40a18862409ad6668c069ab5dda8d91e019a3b7f0d6afdf819b1266dbe4ed1d15c1ab8c22ce8372594fa38c609d1b1121757ad72bf889c37db7e8d309e475f0ea6b32bbef6c0903a18cede67c41ca043d2a69147d86c9fabe42ada0319b256701cea66b053eece35327c49ea00d2096bf0d8a974a5306e1bb6bea91edd183f837f9633e4470f339961315f40067605607559eea063b5efb9b5835875e06914088b3e3efb7a53158cae15d2a5b4b7c19eb127dbaffacba1bc34519b19df1f2963fbfa7f80c732a477281f6e69807481999fa7baa8f368492fecd119a2269f1c7a6eff80978727051251a1ecc40e744f07ba9d5f90e0b016dac60dd81e5c8f6416474d815635ec1c0bf08087fb890b32e8e3b471ed15c2352c587d9b251d8ededfb875ddbe6420423d4ff31dd69fbd05130604ad649fcaf5e7bbf5f66ed49539b8009a35ede5fa93860d798be34ae0ee5e109add3c536362a9fbb7ebbb7c062a6e7fdd66e437589a57b9bb8e794b784882a6e8969a005413d58ef9521d2b63dfd2b5a8324ae85e2e7d17b93891d8ce9b9bb6c829589da2ed0b03227db7ce97b14c489da3eb26b515c4a2f702b6a615362c41d358dd17e1b67ce88298f8353e1c0cbe4ab72ad6b754e9066cf60bcb3fc4373123438e8d822ae6f95c50ff4d611dd5661d5b757c14e80b3f4183a68e6278fcfc03e439e57e9f83d44f30f3cc21c1252d22ae8d1e69f301b773cf6c5ebe78c073332ed2e4ebac7ae07ebe99108945f265f20e37974c46a67f472755ef1532d94bbf1d9bc430a867be757428798ddf4d320b9e5d5cfd897ead83ac244fb7a9197b37c6d23b7ef3fe0d77a8d1de0e7f2eff99fc1dd729caefb0966cc96355252c08ba5c744e3551b309df294dc71d4aa49d5faac2833779a8d0c7bf5befdd76f62a621bf1d285950afba5e9d7d937dd424ee28720192ddd06d9e18942d36edb84f3d9e47c57c560faee7dfa1b69fd855217a783accce517e8f9316d99cb", 0xfca, 0xfffffffffffff663}, {0x0}], 0x0, &(0x7f0000000740)={[{'ext4\x00'}, {'@,&##.+'}, {'wlan1\x00'}, {'wlan1\x00'}], [{@uid_eq={'uid', 0x3d, 0xee00}}]}) unlinkat(r2, &(0x7f0000000dc0)='./file0\x00', 0x0) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) 12:42:13 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:13 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:13 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:14 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x80, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000003140)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc7, 0x0, @perf_config_ext, 0x10802, 0xda}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) r3 = socket(0x11, 0x800000003, 0x8) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a0dffc2c654"}, 0x80) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x4, 0x2, 0xea}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000001340)="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", 0xe00) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd609a03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f00000000c0)={r1, 0x57, 0x6, 0x3}) sendto$inet(r4, &(0x7f0000000140)="4dbcd7080b83740dbfe7df8b0c0c540d", 0x10, 0x840, &(0x7f0000000180)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f00000001c0)) getsockopt$sock_int(r0, 0x1, 0x37, &(0x7f0000000000), &(0x7f0000000080)=0x4) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 12:42:14 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:14 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:14 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:14 executing program 2: mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:14 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, 0x0, 0x0) 12:42:15 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x80, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000003140)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc7, 0x0, @perf_config_ext, 0x10802, 0xda}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) r3 = socket(0x11, 0x800000003, 0x8) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a0dffc2c654"}, 0x80) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x4, 0x2, 0xea}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000001340)="a7dae376e23bf06b534bf60f4a803f23be647604106ba8376af821fbda53d48fd500bea0dce807baa7010005d2ac7be389ac78cd1ecadde9e117bceae7d3549e3c2cd04d9d1776787bf646ca3a9927ed0c260a7007fc76f02afddad8136744a6cce340585f242b442df090db503f342d1efa1535f4c42fa04391981231c9dbf9a899fbfc46e15942525ab8dcc25e3e4d0cdfdff39ada2e9962167bf551a164a6ee8b4b670410b7fa21c5344b8aa53d802d3ddcd7a0a4e0fbf9289c64a1db23ba77c47aae420a9f05d9e6868fcb12c270b6267fe917bf21e0a07855b80f0d838f48499f9012528e39ec5661b5e8307f2ceb738c8baf84dfc14439a4cae34d8b7ab61e52ff3ec9b79ec5d556c5fd5e5387f7f8b2e8ad85cab3eefe8bfe820aeaf731a27b221621f411ac3476d5a2a2f3764ddc40d3c11f205215eec18a42f774ac91bd7877a720a50c8d2cf39528381859bae13a0b8cd3ee051dd28da66ab7e41fb013e93f20fa40a6bc141a9f0b58f391e4cece13e06d8cdf85baa9dde4674e237ab4584854d3d6bfc5a80fbe1de40bd426fa032f272545b90547a36b3e59f997a84382a997f669fa70f0830fa9d5cb2160a3d9c8c0ba377baa9175b1e28cc59f8a1b8ba36ce414d0628a6982a40182b7f4bbe6ca17c1df7b16be0bbe76708f957280190a40af309043aacf4cf85908fb197f22eede0d905a828e9adbc74e25243a64605cf1425003ba8597b2cfa9ee7d73834cd97b7efdc8d010d3f83ac664094c9b5acf9cbb19f0fc59db7f0367f9b56263e9a3fb6d84f0605879c411de1468e52e60011193623265698ca200be459b2c8ac1161147bd0dc9bb0ed0130582c0349d571c477d3e425014e2d727aadba3832717faaac831ab9edd10f4f3e0e7c891a26fabfbe82834e186c07b8a5f4bd7cff382761331bdb7d78293f69171834701f747a0469e9ec1b04c11de05664606beb3b38aa50ee794f84ac99777ee7b9804a0fc39edecff656b3b6cc6f016bae49aa0507f679b845861fb9d9a4c7ffb2b50f0b82cab710331d5ce9acd1db5bd9c755173b4e56f4992a6be9f21ed5d00f68765e727fe9607b11fb7d9258104ce5362173b0000d23e492c57ea388df2636541ee318ee41b83d6ae57a09f0bfc361a30cb85718fbe9cb9685211ea8d86f642fe02f3fbf58aa67146c10e61f4900a00db71ba1085f055a66c0a3370f08b39fcba7e8a00e0c9e583e220810b2e668c7ab8e78605a211302c40db1264e212a10d46fe492e1b9fd9dddf14b2b397e65735a4d27530ca1c3a3d22a3110272fe0bdc95476b2996b93d4be4ca17bb2eaacb3e283b03d47335a3bb933df37c96e985f719a8f2d484e5b4a3a913e9d5ef6a7f6067d2b4dda779cc85201519502d3e393598f2e8a4533d5b4a0171baba7f58542225541fe052f12b0978793ad927164c66dff7fa0bab4f6ab9832ace48f6b97e619a612da8e23611b2429568bcb146a4596eeebaa8e414a2a1d495da8e3910a9582128b84950c4969994b916160f9a92a99a49d6c621bf4ee063389e0a4395820fc121f0d20886e429ffe19cd5b01ab544643bcdac53d5f4102c03bc0319de08ad7f0658067edd91b693b618bbd2936fd81513b722c1bb012d851b5b15cbdbc704702fa1459ba08f3a3658d8c391ab4e3c6405d386c42c4f9fa6af4611c1b89a3766565d7d7054c60706f29b2bc0b16affdb80584a51b177f3cf76151a26718d081f31a29d9cb6915280ba08dcb5d7331102d67eb0c5cfaead0be090a3af781608281b69fbd511f532cc94674c2c02a055196df4657ef0b3db568a583f3f6e1d0b1a9281a01992e462034cc1453772518302969a1b94e19b7dedaf5b59d26c2a3ef9be6d2143696d049d7130260d353cfa48d95464ba54f66c682e8733cbcd3607fa0efebb356a52f49e03598c67438c0974a848ef68103704e0d9061dd97e6d185ba03ccd7e911f2167163c4af57d444a9bb1953d2101b33f0e335524b809ada0a39a8546e05d756a7f9705e89cc21dc506642a97cf4211d6fb44bacd549cac29ae1f1659771ad3bba9da1f369cfbb455b5f1563d4656d7a92787fec9914d2b23e76286fb5c81deb8cfe2daf82cc77fd3076960be3d76937067336d9fc30c0cd8e3780748ccff0dd1511ce302a2bb54ac50934400b5135cd9fce45096f6f740c8911c41689b22ac46194907ee29c46536b30d660685cd358d76ed22b1afb6d2b856b67341956067bb9206ff88980ba1c331e262c15f9eb36e75572baf7f6257624e67b9a656e65d6fe5a208ae49183416fff519a90b9f24d51e6c4c5045e6a5266ba2512a2579c27a994995b8647dd8db06164820e22033f3b641a4765b9fd5657254fae501b89b48f9244a65bf4ab248ea7a60a6062e3dd9a21ea1497d1ed1dfe6f736331db46b10b798196ae809e011657ccb6a2f6c2affbf66dd3815a5a8335b0df8d41bd70d6a603f43d15c012540369e8447b65dae64d32af7a6d3f3cbef03a8aefc5eccb0cac940f7fe4b114971deb7ffcc751b9fb480972ea4bb3df2bb02ad10b5547b1a63cc970f114760f71c49e967921a13157cbd2e642d60b6cd856855ab03bc161fb6477ecad788e3c7d58fd4663911430e729c22aaaf01af14c9de9bde38d254d18003dca457b21fb871cf43cd389709c1b3f93ee2471c67234ea88195323cef022822e0b283c29769a7bc05bee50cc1f7b029f5a267248fbcd19973378c8a5025d164e768b2ab97991e3fc7b8b539f724047780571632f551ad56e83696115823dcdcfbab098d092846882fe69e4355b84beabdb6f3e955213cb1a14a4afc4e8d9116fbb0d3b559f044e4f14b19d6ce161b9eb564fbda0aa1c9dbbbe465a52cc82efbd9129368f1b9d2532d3f7d3e6fa3ac0e830d4b9af83bf790f41077e648d7498f9fcecaa07092a8ad59eb570c2b2541ebcb61a15e7383de7ecfe5c314f8cbe55e972690f5df8ad4eec813e879508787eab41e8de495bbab4e961c32391f14608f7f254d6a555b645d239b934b2f2ecd6554739a4ff2e7498e11ab695a4450dbfd012c0b0c829dd75c0f871bff727d78164491623a954fbf5d30475346737d89b7297d3a73c552eeb4fc35962b3dbf9a288f96e71503f9e786f96d0f9b97660aa77f2fa12e670c50a36f924135352d4149294bf1ef322f93e9d9590c1806d052957f751a70c1312852fac22d6b2f4144d2ba710b728bbf6298dfd64cd17217103fe81b23458d528b433c62ea94e3056a4c9d2390b23ad1a0c98a615d32a9805a4427eef5557b09a0745c5f40e3104897af6cd8e37048a4eeb6a52d062e199685812e9cbea283b3ba7c03179b21c25d9f10563efa84c1cf8d7d9cc471b52a1a50c7e1b36a9f2d069a624d62914ed9d395f7bd24e18a5d115d126ed9ef0e6692fa657565bbfb460f3133f5a3c57c70c00d0a612e8cc2d907052c071343321f28c4f7e01b1a45026bde93c369599755e619ac62d97fea878f3089923407eafcbec277cde74806cd74c92a543205185d4a604889c74c0852b6b4d139a2ce31385d4f22fbad0e8859d9ec99a8bf65cd0fb6f94737e79aa92d93cb9c8a864c7d9000a52b3a6d1da30ba9ff2950951044f6768e9197fe4e19973ba97479d27343b7c0e166f8a6b09adb8159cfb028a4b3eaf56a18fb1ad74b77b8bb42bea65b8e71a15e9260408d3c608d88df01bf04d54535343be52a77c9444c8f766169bdc7e9f1587823eaa7ec3e9422bbbd1a03e158d628d4d52d4d62db25978f73c548da26226235c588c4511c05beb6fec5e51b34a87ec5c716c32e7e258e0118b9b8be47561fa530f2246c4caef6ce40f08d94b9a61379166effaf01adba75b0f6a378acb57599d1af44d445ecec542525803719ca2317ea67373bee1702dad6bd8c49693847627495d3cfa62a12c45954a240aeb17393b35de7a4d818371de1fc06d94a996d23c4725a5ffc1c47c7d120b18a3c2a2935c12182209cf32ff8976031a7ab011d0dc1382db525e8de1906bb08a870f9090bb2e996e3ca6e6b3328bc40aa833c8ae98d158b987d9f0bb504eb118ad0b57419046bb218fcc32568b64d9076ec55751c560970041ccf90cbd84cfda0cd543ef59bb49de1bdde5dac1c1a4cac61b31b4fc2ca83c96c7b99f3eeb3a85822bdd2cf0da9f80df50bbc63e404f3ffb1b92aad6185b846e239a19218b4da7b1be76675e32b77e63bda2b9293b2a6b7ae0a6ef52d800e2db69b1008d741457c4c42ad33bdb33aa1e5a3fe5b2d1534e7ca132f987ca5627d4b1f4af87e9b39fd0a7742a8900157add7ab571ad89d86c16973a854afcea3e910b6acfa873a935bbf6445d0fc445ce1ee2da5d9fcd90bae48ffa1f61d0a284f95661e832a9d798ef20c49a7d50d40806bdaba17bbd5ec4106c01c05b8c171efbdb70813f28e8a50617c83c2d028bfb92b483c953c5069a18b76e0ae86210fbec2fbec76fdc69287ec7ae60c1ba422073fc5440a9e4b8fb561aeba369c4c4e786317ae0dd5c1cd36a1cccb166a9916fb8127be5899494219fa815032109ae6599a7eeabd22e8da3934e5f410d7d94ffc9371af03fbd57cc46c735f89608a18b57a5e95e8ad9694ff8ed6de43237be3e9524e2a84cd201c6b9eaf7773bb820457a7a45afc201230688f48d9f7af3fd3e1a3d92063b136598153291c739ab56ea45bcd7a970a653140687dedbec3af7da497ca2b5cf12ab2401135fd177f4118a2cedb81cbff7c1024786c168c5e544616679840f441b7e7e2c7396ebe3ca8dde6aa7d9f136c5d169af27a54cf639f654907f4d4e90ff968d5e9cfa048352b87bcd572100db6eedba5ccb4aca2d00942abb2f2f484d62e6d3d880a88a744495947f01ede4bc5a7f400af6aba6d1f323019e6ce4bd6ca166c50732cb6592cf531939b8cddc244aad312ce6e9a549ec2b3e21cc0e6a00bb35fc68ea9024a1947dd6bcc243d874ff9764918aa69fb3dfd6cd694d70bb203f942f5b2a926a10ea6444f65ec41183876783f29717f841cb490f96263083e011412e222baf53a7d6786b51a456b", 0xe00) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd609a03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f00000000c0)={r1, 0x57, 0x6, 0x3}) sendto$inet(r4, &(0x7f0000000140)="4dbcd7080b83740dbfe7df8b0c0c540d", 0x10, 0x840, &(0x7f0000000180)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f00000001c0)) getsockopt$sock_int(r0, 0x1, 0x37, &(0x7f0000000000), &(0x7f0000000080)=0x4) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 12:42:15 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, 0x0, 0x0) 12:42:15 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:15 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:15 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, 0x0, 0x0) 12:42:15 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 12:42:16 executing program 2: prctl$PR_GET_TSC(0x19, &(0x7f0000000040)) syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x20000, 0x1d, &(0x7f0000000200)=[{&(0x7f0000010000)="0042454130310100"/32, 0x20, 0x8000}, {&(0x7f0000010100)="004e535230330100"/32, 0x20, 0x8800}, {&(0x7f0000010200)="0054454130310100"/32, 0x20, 0x9000}, {&(0x7f0000010300)="010003005c00010045d4f0014d0000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e757855444600"/128, 0x80, 0x9a00}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c17172d01002a4c696e7578205544464653000000000000000000000004050000", 0xfffffffffffffddc, 0x9ac0}, {&(0x7f0000010500)="000000000000000001000000000000000000000000000000000000000000000006000300dd000100b521ae014e00000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000", 0x80, 0x9be0}, {&(0x7f0000010600)="000000000000000000000000000000000000000900020000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000200000100000000000000000000000600000001000000002a4c696e75782055444646530000000000000000000000040500"/128, 0x80, 0x9cc0}, {&(0x7f0000010700)="0000000000000000000000000000000000140000530000000106010000000000", 0x20, 0x9da0}, {&(0x7f0000010800)="05000300420001001fdaf0014f0000000500000001000000002b4e53523033000000000000000000000000000000000000000000000000000000000000000000000200"/96, 0x60, 0x9e00}, {&(0x7f0000010900)="000000000000000000000000000000000000000000000000030000005d000000a0000000002a4c696e7578205544464653000000000000000000000004050000", 0x40, 0x9ea0}, {&(0x7f0000010a00)="07000300d2000100c3a4100050000000060000000100000000040000fd000000", 0x20, 0xa000}, {&(0x7f0000010b00)="04000300e30001003168f0015100000004000000002a554446204c5620496e666f00000000000000000000000102040500000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000", 0x80, 0xa200}, {&(0x7f0000010c00)="0000000000000000000000000000000000000009084c696e7578206d6b756466667320322e32000000000000000000000000000000000012084c696e757820756466746f6f6c7320322e3200000000000000000000000000000000130868747470733a2f2f6769746875622e636f6d2f70616c692f756466746f6f6c732f0022002a4c696e757820554446465300000000000000000000000405000000000000", 0xa0, 0xa2e0}, {&(0x7f0000010d00)="080003004f0001000000f0015200"/32, 0x20, 0xa400}, {&(0x7f0000010e00)="0900030037000100b9a87600530000000010e4070913122c173e2a580100000000000000000000001700000000000000000000000000000000000000000000000000000000000000010000002e0000007d000000a0000000002a4c696e757820554446465300000000000000000000000405000000000000050000000200000001020102010200"/160, 0xa0, 0xa600}, {&(0x7f0000010f00)="080103002b000100bf57080000000000a00000001400000000000000f8ffffffffffffffffffffffffffffff00"/64, 0x40, 0xba00}, {&(0x7f0000011000)="00010300f7000100ec14f001010000007810e4070913142c17172d010300030001000000010000000000000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e757855444600000000000000", 0x80, 0xbc00}, {&(0x7f0000011100)="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"/480, 0x1e0, 0xbce0}, {&(0x7f0000011300)="010103004200010066ba18000400000001000a00000400000200000000000000", 0x20, 0xc200}, {&(0x7f0000011400)="050103002f0001007008a8000500000000000000001001000200000400000000000000000000000000000000a53c00000200000000000000080100000000000001000000000000000010e4070913122c17172d010010e4070913122c173d5e380010e4070913122c173d5e380100000000000000000000000000000000000000002a4c696e75782055444646530000000000000000000000040500000000000000000000000000000000000008000000080100000700"/192, 0xc0, 0xc400}, {&(0x7f0000011500)="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"/288, 0x120, 0xc800}, {&(0x7f0000011700)="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", 0x160, 0xca00}, {&(0x7f0000011900)="0a010300280001000830d8000900000000000000040000000100000500000000000001000000000000000000a57c000001000000000000001a040000000000001a0400000000000003000000000000000010e4070913122c173d5e380010e4070913122c173d5e380010e4070913122c173d5e380010e4070913122c173d5e3801000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e757820554446465300000000000000000000000405000000000000110000000000000000000000100000001a0400000a000000", 0xe0, 0xcc00}, {&(0x7f0000011a00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0xce00}, {&(0x7f0000011f00)="0a01030012000100896a02010d00000000000000040000000100000c00000000000003000000000000000000f77e000001000000000000003a000000000000003a0000000000000000000000000000000010e4070913122c173d5e380010e4070913122c173d5e380010e4070913122c173d5e380010e4070913122c173d5e3801000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578205544464653000000000000000000000004050000000000001200000000000000000000003a000000010000000504000008746d70051600000873797a2d696d61676567656e393633353539373036050600000866696c6530050600000866696c653000"/288, 0x120, 0xd400}, {&(0x7f00000004c0)="0a0103002800010082b7d2000e00000000000000040000000100000500000000000003000000000000000000a57c000001000000000000000a000000000000000a0000000000000000000000000000000010e4070913122c173d5e380010e4070913122c173d5e380010e4070913122c173d5e380010e4070913122c173d5e3801000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578205544464653000000000000000000000004050000000000001300000000000000000000000a00000073797a6b616c6c65727300"/256, 0x100, 0xd600}, {&(0x7f0000012200)="0a0103005a00010088dcd8000f00000000000000040000000100000500000000000001000000000000000000a57c000002000000000000002823000000000000282300000000000012000000000000000010e4070913122c173d5e380010e4070913122c173d5e380010e4070913122c173d5e380010e4070913122c173d5e3801000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e757820554446465300000000000000000000000405000000000000140000000000000000000000100000002823000010000000", 0xe0, 0xd800}, {&(0x7f0000012300)="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", 0x140, 0xfe00}, {&(0x7f0000012500)="020003001d0001002700f001ff000000000c00004d000000000c00004d000000", 0x20, 0x1fe00}], 0x0, &(0x7f0000012600)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000e40)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000e00)={&(0x7f0000000840)={0x59c, 0x1, 0x3, 0x301, 0x0, 0x0, {0x1, 0x0, 0x4}, [@NFQA_PAYLOAD={0xe4, 0xa, "4ee252f47b2487e9da00a449b51dbbfa2bc328bcf1899e709c6c0918c90011a7653a6e87be74c77f3c598d184849a029624300e7d9edf1c841b1f11a3a0f4187c0a8772f4e623bf81e498e1c9f93626332055042c21306c8ece454f41bc7ba9fff639f017eaed1fc1fd3a586bc995bac43da0b8b53b50d6c73f7b36a47646ca6a78ede9b893f302312a9014dc2640eaa9b42c62f99175d22a93a804eb03cb7e125540eaa9dfea0180e355fbb567c3e046147cf508accd45aacfc5cb5cd60a512829b2cc6db6ddd9f58efea96f92a9d64944015143cdc3f2eaaf0d161107f9e03"}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffd, 0x10000}}, @NFQA_PAYLOAD={0xd4, 0xa, "2933ee1d8f1699b68f8fed71adbe90837001916691a7c139051a29cd68cedd3d628a53f1172d1802e626f3427042b55d5cf1ba5748bde7d26df39733f889eefebf400725c4a7f77120c9eb636b81e092a9452e8838dc059d6d0199391bf496dfd87eedbb3460d42f30daeee68c5c1de523ee1af505f16bcbf3aff04a697467dd56858b25caf95b6289c339d166e837f7ac760d43f8d1b925f542838ee66e89d1a775004ca4d946b53cf64db2540c519645a82514f81b0d74dd152f0275af9318b56ad9fa5652513851aaea7329887108"}, @NFQA_VLAN={0x44, 0x13, 0x0, 0x1, [@NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x800}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x9}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0xcdcf}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}]}, @NFQA_PAYLOAD={0xb1, 0xa, "ed841e2e84f23ac923d2eac9e3ef03eb923c9ae89b701cfcba3881e4d9b1ebeedac4d16b99ca012f89e77938bad6a073607bd160b71e5b6a408231d3167acd6a11299fc15c8aade1e71c6ee911045f67c7bcd8aa894cecd51aaab5180f6ec15fb7610e0a34cb04575584d7fc25521d05c77e5712a3ab29ec9c1566d010e49d3f4ef4e9ecf43436c943375e9ed734e26e1f9633f5e5489f5a7fb7a44e14aa4c7111f94c0f293c97b42e6614b012"}, @NFQA_PAYLOAD={0xff, 0xa, "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"}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffc, 0x8001}}, @NFQA_PAYLOAD={0xf5, 0xa, "295e62d10b7dbd15852bc03bcbd9c3c63093e0d1c2eeeb7633041a42c30aa497e7febcf2d488e674df9fe513a958d7a556baf87708fd765aa959645665d1bd6f8a6f0d741dbbaca2b5c7b2829bb5e0b75b3cde79d23861430cafb1b322db053915907b0e7bdbe2cd3453e5c1a03df76235aa3e18a1d0523e40c63291ad2f9a4ce2ad5b24990688217808aa2d78dbc339c42500ea2f39cc75fa1cba62c4f9b719e76fcb0240d74d347fdd9a4e88ea8d19dd6f4cadacfa67c74139c561ef03dd79e0e2ab7958ec1fc8182eab5cd9babe9bcf2de78ed7d60e89f10c7347c0245017ed561007d8b68c5321df42d6bde95a7b2a"}, @NFQA_VLAN={0x4c, 0x13, 0x0, 0x1, [@NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x6}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x99}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8000}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x81}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x4a1e}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x4}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0xff}]}, @NFQA_CT={0x7c, 0xb, 0x0, 0x1, [@CTA_SEQ_ADJ_REPLY={0xc, 0x10, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x5}]}, @CTA_SEQ_ADJ_REPLY={0x2c, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0xdfd1}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x10001}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x8}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x1ff}]}, @CTA_TUPLE_REPLY={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @rand_addr=0x64010101}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}]}]}]}, 0x59c}, 0x1, 0x0, 0x0, 0x14}, 0x400c844) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000780)=[{&(0x7f0000000140)=""/134, 0x86}, {&(0x7f00000000c0)=""/52, 0x34}, {&(0x7f00000005c0)=""/4, 0x4}, {&(0x7f0000000600)=""/5, 0x5}, {&(0x7f0000000640)=""/97, 0x61}, {&(0x7f00000006c0)=""/131, 0x83}], 0x6, 0xe788, 0xfffffff9) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/self/net/pfkey\x00', 0xe2f9f522e6e8dbd, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0xfffffffffffffafb) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000ec0)=""/60, &(0x7f0000000f00)=0x3c) prctl$PR_GET_TSC(0x19, &(0x7f0000000080)) 12:42:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x60005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x804, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x3052, 0x0, 0x9, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() pwrite64(0xffffffffffffffff, &(0x7f0000000480)="d8ed02439ce6145983895484e16b70261bbe197ab02cd99e08bf87445b27891b20df48cff34ce96d0480d080e278f2584c4413a2ce412bcbdb3605ac06708682c49bf8c62c79066bf540768bd57326ce764094b9ec2d649f698b1ed92f84e4496392f5d3a172b8c9c231911adf03faf304f5862a1470e309c3898798ed42d062610b6bde463151894e0cf9303ad9ca0e244e98c4175bbdd6fb609dfe5a3c96c3ff3de418325b7d71955652d8bde4826541afa905da55f77903f64dccb35be4edbdfc0441656fef9edf74be945798a9a669561342b4f4ce862e3b8aa67d66ceda00000000000000", 0xe7, 0x3) sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) clone(0xe1004d7c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x6000, 0x0) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r1, 0x0, 0x4000010) pipe(0x0) splice(r1, 0x0, r1, &(0x7f0000000340)=0xb, 0x0, 0x8) ioctl$SNDCTL_DSP_GETOPTR(0xffffffffffffffff, 0x800c5012, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @local}, &(0x7f0000000240)=0x1c) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000040)) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)={0x0, 0x4, 0x4, 0x2ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0xfffffffd, 0x1}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.stat\x00', 0x275a, 0x0) ppoll(&(0x7f0000000180)=[{r2}], 0x1, &(0x7f00000001c0), 0x0, 0x0) fstatfs(r2, &(0x7f00000003c0)=""/144) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0xd2e40, 0x0) write$dsp(0xffffffffffffffff, &(0x7f0000000280)="bffba2330b15b94a000000000008019098f05c60030d034b3f1ffeaac73311c848a1225b", 0x24) setsockopt$CAN_RAW_FD_FRAMES(r2, 0x65, 0x5, &(0x7f0000000080)=0x1, 0x4) socket$can_raw(0x1d, 0x3, 0x1) 12:42:16 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:16 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 12:42:16 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:16 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 12:42:16 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 348.505430] IPVS: ftp: loaded support on port[0] = 21 12:42:16 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 12:42:17 executing program 2: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) [ 349.047767] IPVS: ftp: loaded support on port[0] = 21 12:42:17 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:17 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:17 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 12:42:17 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:17 executing program 2: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x0) r0 = request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='*$)}#/$W\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) request_key(&(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='/proc/timer_list\x00', 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000000c0)={r0, 0xde, 0x95}, &(0x7f0000000100)=ANY=[@ANYBLOB="656e633d6f61657020686173683d6362636d6163286172633429000000000000000000000000000000000000ec48005eee063cc19a1bb34c0c3e40147b00000000000000003f1912000000000000000000"], &(0x7f0000000240)="f876108b3690a790ec5283b7dbb53af2401520fd5f5354ff0efc1dbe96336649620258695659df0ea84b85b77a2604ebb74a1d9a37846b6f8719463e067681a34553ef2c2c1f252c67f5158621bd88548126ac5cbc9bc244e2bca7954bde16f5f723a8a32c2864cf3df997e97932d6c5aabbb80f9bcf57ec649aba0484b455bb9ea46951e9a9a3f0c974ccd6252a83d1cf11fe1a335f477a0876b63359260358ce39c5107726a0b89690a8ac47d509331f4514f34c13d45fd4ca621e43f5cf8c01e9c623d011cf26fb0d68598a1882cb4f20be87a5d73f7725c237f28cc2", &(0x7f0000000380)=""/149) r1 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/timer_list\x00', 0x0, 0x0) r3 = gettid() tkill(r3, 0x7) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xb394, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x2}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, r3, 0xffff7fffffffffff, 0xffffffffffffffff, 0x2) sendfile(r1, r2, 0x0, 0x4000000000010046) r4 = gettid() ptrace$setregs(0xf, r3, 0x5, &(0x7f0000000540)="03d433c9900a4271603fa86515a689ef1d45c6fd81867bdb769814b97f65df1dbd7714b1888bf415ab3850ea0334a8f95d61dd20251d31f53dea29b3b9ad5d310ebf7e6206431bee1e742dc974f0c255ead74b2da98fcf8d4a839d6e2f5429118cc5f8ad885794229181ca77cc4c95bbf706033829aebdd868430e3a1674863478dded65300972b9be003357fd90f435244bc79ef2303e5e4e4692966d774ab74b3ac637bdf63e846d07337e9dd322cfbf3a7ab383d6ad58f35cfb03c8d7") tkill(r4, 0x7) ptrace$cont(0x9, r4, 0x5, 0x3f) 12:42:18 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 12:42:18 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:18 executing program 2: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:18 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:18 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:18 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:18 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:18 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:18 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:19 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = gettid() tkill(r2, 0x7) lgetxattr(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)=@known='trusted.overlay.nlink\x00', &(0x7f00000003c0)=""/206, 0xce) perf_event_open(&(0x7f0000000280)={0x1, 0x3d, 0x28, 0x20, 0x20, 0x7, 0x0, 0x809, 0x80003, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x2, 0x5b28}, 0xc0, 0x18, 0x6, 0x5, 0x207ff, 0xa80a, 0x20}, r2, 0x4, 0xffffffffffffffff, 0xb) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)) lseek(r1, 0x7ffffc, 0x0) getsockopt$rose(r0, 0x104, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[], 0x1a0) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000c00)={0x0}, &(0x7f0000000300)=0xc) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r4, 0x8008f512, &(0x7f0000000180)) fallocate(r0, 0x100000003, 0x0, 0x80019c) ptrace$cont(0x1f, r5, 0x0, 0xc000000) lseek(r0, 0x0, 0x3) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00', r4) 12:42:19 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:19 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:19 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7baf4b06d3585a09a87507ebf4e43bc0609b1f4ecdc78eb2b57c099b6ed90e0ebcdac5f7a860c00269c781f6428457253530c982dbb518d0e3705e89ad528d985636a86ec0f60f5a6d1159a2c2e85d726859a919cc9548a349980d1ccdce27f94bc074c27f81070545cab5d5b0da0f0575cc2727e8d974927676468582d8621050000000000000040b3cf252a47c05af3a30d57cc3ed67d1867b54d24e2da1856ad3b0f24b52616bf84d3b00127473e6ba922aff649609d40b47ec349ccba3ce8d530ffff19a605000000c742d9cbcfb964b13831034694a6aad86cf08a2c7b2235dc99de9aa3e6b77c7a2877261ed713eec3b86836ae504479f60b0ec9204d2b85627aa5a79f670000000000000000000000008f02712c3d8fc4e2686e21a855e819887196d4f4e9f2013d2aef4a3b3edca2aea012823877c3df20b5dca4325092be4d6852b88317c5adbbdb0019afe5725c8a4047b91da3768c1ca6a4410009f95d4ba21068285afa8d3b4a6893d5626ab5becbcdb8878f2c85c2d9ab09b5dd4406d273650bf7b2ff4602aec5eea20000008108fcca27b35f1ee4772be145d33dbf4a02f686cdb71f96bcf2bb65ce40f47b8c0e443e2f5a716aa2e22190740b68bed424b353e2c4321e4fd45a2787000000855ec16c1c05d2aa27a9ff23b45d45eedd1e9b038ffd722e80d9ae8e64697b444768dca2a4612eebca014622a9bb14421411445cd882185517210f4277a41ef929bdac9dc2e84cd72a9db53ffab39ff97c86fe401f2fb22d6b6b6e8d455921b7577fc38139146cf31f8d0e27970128fe8e0aa0334df931b94ba639a6a2aaad362616777ff8f0711e08bc7d43c81db6cc8674af3009bd7da05bfdf8c4eb06890860cf4d7933ea42b795eebdd625f0eb00212a31151dadc994e66dad3c81ba0fcf65007a3ed55aeceb0a60d8ffed4690c64a8576fba017adba197c83f4b537750905ec0c3500fbf79b43631fe49fdf9d9b777d4ded46198100ba8d2c6ae91bf3b7e6cb6b4cac3e657b5995f3b331275dc71777ac3e05883cb3a35d3b7a2d5182b50bd327d085cdfc616f271f3ed57da1589cc805bc5af0b77cbb310ed30a001411a597f8d5c3732f0ef5e481d4c832ed017a076fb6e88e4594e80ccf"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0xcc0, 0x1000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x16, 0x1, &(0x7f0000000300)=@raw=[@ldst={0x1, 0x0, 0x2, 0x4, 0xb, 0x35, 0x10}], &(0x7f0000000400)='GPL\x00', 0x0, 0x6b, &(0x7f0000000440)=""/107, 0x41100, 0x1, [], 0x0, 0x1, r1, 0x8, &(0x7f0000000600)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x4, 0x1, 0x8, 0x3ff}, 0x10, 0xffffffffffffffff, r2}, 0x78) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = openat$mice(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/input/mice\x00', 0x44200) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x14, 0xa, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@jmp={0x5, 0x0, 0x8, 0x7, 0x2, 0xfffffffffffffff4, 0xd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3c}, @jmp={0x5, 0x0, 0x9, 0x9, 0x6, 0xfffffffffffffff8, 0x4}, @map={0x18, 0xa, 0x1, 0x0, r3}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x7ff, 0x0, 0x0, 0x41000, 0xc, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0xd, 0x80000001, 0x8}, 0x10, 0xffffffffffffffff, r4}, 0x78) 12:42:19 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:19 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:19 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:19 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:20 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:20 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:20 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:20 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x4000000001ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x9) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRESOCT, @ANYRES64=0x0, @ANYRES16=r1], 0x32600) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x7a05, 0x1700) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6}, 0xd8) bind$inet(r3, &(0x7f0000000200)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x580f}], 0x1, 0x0, 0xf080}, 0x100) write$binfmt_elf64(r3, &(0x7f0000000880)=ANY=[@ANYRESHEX, @ANYBLOB="17f12a7831560934d2e475a2da31786fce62f682cb21bcd31f962f7e1eda3b44c3f50e14e51db293becf499d50738527a254a15de199f7f7da7604df115d8b9a82ebc8128d13fc1d3410a00097c1", @ANYRESOCT, @ANYRES64, @ANYRESDEC=r0, @ANYRES16=r1, @ANYBLOB="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", @ANYRES64=r2, @ANYRES16, @ANYRES16, @ANYRESHEX], 0x1000001f7) 12:42:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:20 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3b8, 0x98, 0x158, 0x158, 0x1f0, 0x158, 0x320, 0x320, 0x320, 0x320, 0x320, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28, 'DSCP\x00'}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @TTL={0x28, 'TTL\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x418) r1 = socket(0x40000000002, 0x3, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x0, 0xda1, 0x20) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x37) 12:42:20 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:20 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 352.449927] ip_tables: iptables: counters copy to user failed while replacing table [ 352.508690] raw_sendmsg: syz-executor.0 forgot to set AF_INET. Fix it! 12:42:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 352.558814] ip_tables: iptables: counters copy to user failed while replacing table 12:42:21 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000100)=0x3) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)=0x443000033) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$cgroup_ro(r3, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 12:42:21 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:21 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000100)=0x3) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)=0x443000033) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$cgroup_ro(r3, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 12:42:21 executing program 2: seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000080)) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000340)={[{@swidth={'swidth', 0x3d, 0xf9}}]}) 12:42:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}}, 0x20}}, 0x0) 12:42:21 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:21 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:21 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 353.420731] XFS (loop2): sunit and swidth must be specified together 12:42:22 executing program 2: msgctl$IPC_RMID(0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f00000002c0)=0x2abc) ioctl$int_in(r0, 0x5421, &(0x7f00000001c0)=0xa4) r1 = epoll_create1(0x0) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000240)) socket$unix(0x1, 0x1, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/sem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0xfb, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x2) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket$inet6_icmp(0xa, 0x2, 0x3a) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000280)={0x50000024}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 12:42:22 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) sched_setattr(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002940)=[{{0x0, 0x0, 0x0}, 0x2}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002200)=""/246, 0xf6}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000100)) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x10000}, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x41, 0x8001, 0x1, 0x2, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x10, 0xffffffffffffffff, 0x9) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x2, 0x20, 0x6, 0x9, 0x9, 0x4, 0xc, 0x6, 0xb568}, 0x0) sendmmsg$inet(r3, &(0x7f00000010c0)=[{{&(0x7f00000000c0)={0x2, 0x4e21, @initdev}, 0x10, 0x0, 0x0, &(0x7f0000002a00)=ANY=[@ANYBLOB="1800000000000000ff06006d9d45f64a60ebef2c478a8eecf9c6ee8df0ecab4c06006c00b2acd37913b1f73ab71d6dc45954a82057877482992d4182ee10d2d603892ae97f2c182307050491e76079b7e99a6e319aad462f9691ba629a777fb5d0a0583b7ec4e36f08d215c2de67708a460a8a29bee41e9ec39b4bc291b928ef9f1b12e68f74ab829bfab487da47080e84bf0d92f72e567b07f8112d75f25cfa60b42e5ebbe40debd93f5c8843542ce87ccd81b56a7ae49a9d9c05298ef7f9267d1200e31df000d9fa45e8a8dcbd98d41df16b4ebd66464d000066e11a5463afc56cd9c3ffa277233a378e5cbdf9d18aa6a0eee8e60f2627681241231afcffab6b767130120b75215596d1bc4fb6849874fabbd14fdf723522e65fa0c1c1598d101b737b6dd68457b0b8a034dd0c734ce438614b32e2eb83b4cd0818425042862824672d7ef659a3c2b217d76be42e595d751d8dde26cecba021e627df1e13015900953b2416e6456c9560e298785fe0f9d862f8000000000000b7f90b24204ee5b0370bf6b862765e1c604f179187f6113b7bb899190ffd83d9f3ec78f787a020fcdc91fc334dc2394b3dc3bf01008c6a76047e89cd3a2f000000000300dd5f4baa61d744982ebd621a0036e8231e1e5b2d63d4d30be7a1733342ce4eadeafa2a6ca643ed1be45c869a8b4b69bd2d0f3864276586b1eb282db29052c8463c09d239ee2aa3a97a170f7f3afa435df3b9b5d1be8527b5acdc7dea2c69bae4d8115fb6a7bc72e15045dd1d4654ba4bfffffffffffffffb36cacd0f0a25955257cac2fbe3b066a59b27df5fb6e122534b2cc67d2698eaff0149aefd6cc9e559c485b2e9943ffb3414d8713fd5791a8a3c2ac7c6e02662b86b574d1aa0ff4e0a6dac6b7b09003a7de4c5d2b6a0124ab2cb83d197059dff5229a6a8ed66ad4ab6fe55a0319ab26e8049f1aec539292912f18b082a78496675fb70e50d5184e704d5195a040000000000000041c0153a5ddbf52a70a63923b5868e5a433969d359a9b965f6cbfbb602e59143a21cf702d524dd1a0000000000000050e7819de59e4ccb2703c1a2c4f35964f1bc738adf9bff6c2edd8ba60be9f2dd79a0ba73b74c0ebb2d779856e31ab8083702be81e973969ae9f84576582d576828023a99d84eea9bb538e4eb5992028044f8241375875e185bca0e8ddcdd4010d9c4bf065d4c407208c32b1df1a2ed39562630040c603fb5ceeb29c10520dfb25f93fbe8e77345f72fb9268af4550f1f6cbbd22c13dbdc602bdf746b293e99015fe0860f83198cc668489f3c7374bf71f755d9a5f51b430516bda0d0c6391e4a32f81c0835db1f9a59694f4a3f57ff0f0000000000003faa3356c26fb689d9f4c3a0c1e8edc34073ffea7897e705001dfa315144d0bd89c27e2c912f82bc18361464a40802348f920f76a94cf3f102cf07d022ab6bbbb040ff7b2c7aaeb343bf9a401deab24827a5dba43d8f8f86c6d57542445cafe559021d78fdffebe8957caa6b122becf002068289cf96f5aa8c9dfd1e3687b5afa39e2f576f79c2c073341fb587d458b62b8f6e818b38df932f34bd26d2c66e9510eac33a706be80367a91f71cafa3d645a4003c3dec409207e979842d59dbb8086651f57c2e8d44906889226f31b2ba7ac196a78c48f7ded2ddb8791cdc9ae0bfa3027bdf6a217667774b7d50e0b4d51eabd0b9c27b5bb6639aeab43efb25177d0a35501643072d046b3b33cb23b8cc44685e9e0de65f5862da6666aea0199a9d6fe2e980ac54f87b0e88b5b01767dac4202f90cd4825785a4e885819ac56cb6468154eba92b00005ab0703369f75d5e6a6c757ea3532a31ea46abc169f7055497c79cedacde5e382a60284fc995823fff29e2bea15e0cda32f4bcd30436969f3eb3847f04c1dace848c454e86a6f500846fef570014b9da7ccd22b451ce9de5a7d2e000b9be9085ea6d67e310aa56b3863b79a390c1893659dac30f382b7b424e58ee47b2f4100a3bb8fec74163f00d470e7c00000000000000007ddd2f47f0b237013b04a6af556bb92424359a7964dd3d6ffc3558484678d2ecced7596fe02e5d4175cf93e712f41c956c6e7ad637fcf00f202089f1a5224c17e4f3b2321d3bea1adefb1b8bfd7d674092320f77d44e590d6a8db290a62cf41bcc3c2e8a836b0da267290246aef3e9f3bf25db7ffc85d6f3c43ea03d0e2663a25db39a28540726f40866ade825e354b0afb470aa3d93cdef00000000000000000000000000000049c2d322707524971076de995cc174293f39dbf855ffffffffffffffff973223b5f430f1241c30a8bf6c4bae4ae07c541afa5dc6a513cea10d6ba6e3cb2f63b8726271adcc754321b64fd26a2331ba0c93f008007dc466ae004afa63d731f87263000000000000000000000000000000000000000000000000000000005580fa97782233d24e69ad3fe99b0f2ef027453d7bf2231e1e8ebc2696c592e51efed678a2a1a2b37ebcd87d324af6cf01fb29575c7c8113388d936815fc2839e364b1e21862332a00ce719e7c0fe1184b3be7a007cece3cf29a261070259e36913d0a6e9eac8fe667ada57e0216e9b54ccccbb0b90625aa4eab8d50cf6afa03ee802ec37df3985164b740d70db7c3486bb9d68b9981efcc8eab807048d7fc546422aac2c22f98a909e049d45449bf24416f333a8d860000000000000000000000004aad13ea05fa065c1809e06e191edd1134ed9cff9331add472d3de75de3c3b08e19f11399cb4e3a7f3e884a9e332b9e3164548eff67857e9ed8e0302e1dc768a28e549263554de1ef43f714ae9323776944dd28ced8e5f3aee71c318d5871e94b4921045372e44dfcf44a7afc424e61c8858f3916dac1913d61a439212b55baed8925ee4c3b4a50490935d660000000000000000000000a13e31042d7faa8e4b86d4dd1440e802d169d83951a5955a189bea5c82fe4dbd10385084a72a73b00059b42a4bd79c67ad4997678a64032db86fc0ef7ad941857be84b4fc5e4b6f5039fd9d4e684f54fd2e3c7018ea42480516b03d66adceeeb29596f77eb737744a6ac6d4d57e6d0a5927213e75858f674e7695321c56e9e9d62425a9d1dd31c0000000000000000000000000000d79b5e6fbde45e6fcfc941a0429d405ebbff81704fe7740aec9d7e468e205bd45f86c5fcd8e6dc53d1dfa2228148fd0eb04b9ed1dacb6077a2a2e657a77dbe75aab300"], 0x18}}], 0x1, 0x0) socket$inet(0x2, 0x80000, 0x0) 12:42:22 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:22 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:22 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}}, 0x20}}, 0x0) 12:42:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0xffffffffffffff81}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) close(0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snd/timer\x00', 0x0) clone(0x1000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x6) pselect6(0x40, &(0x7f00000000c0)={0x0, 0xb5ef0000}, 0x0, &(0x7f0000000180)={0xffc}, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:42:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) shutdown(r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x6, 0x4) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={0x0, 0x800}, 0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = dup(r4) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000004d980)={0x0, [], 0x80, "535b282dc3bfc4"}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000000c0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x14) ftruncate(r3, 0x200002) r6 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x8, 0x640) splice(0xffffffffffffffff, &(0x7f0000000280)=0x9, r6, &(0x7f0000000300)=0x7, 0x0, 0x6) sendfile(r0, r3, 0x0, 0x80001d00c0d0) [ 354.250631] audit: type=1326 audit(1617108142.613:66): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24915 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x466459 code=0x0 12:42:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0xffffffffffffff81}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) close(0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snd/timer\x00', 0x0) clone(0x1000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x6) pselect6(0x40, &(0x7f00000000c0)={0x0, 0xb5ef0000}, 0x0, &(0x7f0000000180)={0xffc}, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:42:22 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:22 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 354.667038] audit: type=1326 audit(1617108143.033:67): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24959 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x466459 code=0x0 12:42:23 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}}, 0x20}}, 0x0) 12:42:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x82) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000280)={{0x1, 0x1}, 'port0\x00', 0x42, 0x1, 0x8001, 0x2a, 0xf80, 0x8, 0xc0, 0x0, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) truncate(&(0x7f00000000c0)='./file0\x00', 0x8001) sendfile(r1, r0, 0x0, 0xa198) [ 355.050816] audit: type=1804 audit(1617108143.413:68): pid=25005 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir585260122/syzkaller.UG0k50/355/file0" dev="sda1" ino=14906 res=1 12:42:23 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4f, 0x81}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0xf, &(0x7f0000000040)) capget(&(0x7f0000000300)={0x20071026}, &(0x7f0000000340)={0x4, 0x5, 0x1, 0x7, 0x400, 0x9}) ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0xc0389424, 0x0) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000080)="441f0801000000e8c94ef56491ee54be0e1c2074ed27c1c6fe76cef3e2", 0x1d) r2 = socket$inet(0x2, 0xd79c8942b6614cd6, 0x7) r3 = socket(0x10, 0x803, 0x0) sendmmsg$alg(r3, &(0x7f0000000200), 0x36d, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x1, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x1, 0x0, 0x0) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c7ae247e1fd2db1b11ea7af8100f6ff", @ANYRESOCT=r2, @ANYRES16=r1, @ANYRES32=0x0, @ANYRESHEX=r4, @ANYRES64=r0, @ANYRESOCT=r4, @ANYRES16=r3, @ANYRES32, @ANYRESHEX], 0x1c}, 0x1, 0x0, 0x0, 0x8051}, 0x28814) sendto$inet(r1, 0x0, 0x0, 0x24008738, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) [ 355.347544] audit: type=1804 audit(1617108143.413:69): pid=25005 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir585260122/syzkaller.UG0k50/355/file0" dev="sda1" ino=14906 res=1 [ 355.439052] capability: warning: `syz-executor.0' uses deprecated v2 capabilities in a way that may be insecure 12:42:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) shutdown(r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x6, 0x4) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={0x0, 0x800}, 0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = dup(r4) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000004d980)={0x0, [], 0x80, "535b282dc3bfc4"}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000000c0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x14) ftruncate(r3, 0x200002) r6 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x8, 0x640) splice(0xffffffffffffffff, &(0x7f0000000280)=0x9, r6, &(0x7f0000000300)=0x7, 0x0, 0x6) sendfile(r0, r3, 0x0, 0x80001d00c0d0) 12:42:23 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 355.497823] audit: type=1804 audit(1617108143.643:70): pid=25005 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir585260122/syzkaller.UG0k50/355/file0" dev="sda1" ino=14906 res=1 12:42:23 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa}]}, 0x28}}, 0x0) 12:42:24 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:24 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa}]}, 0x28}}, 0x0) 12:42:24 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:24 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:24 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:24 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4f, 0x81}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0xf, &(0x7f0000000040)) capget(&(0x7f0000000300)={0x20071026}, &(0x7f0000000340)={0x4, 0x5, 0x1, 0x7, 0x400, 0x9}) ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0xc0389424, 0x0) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000080)="441f0801000000e8c94ef56491ee54be0e1c2074ed27c1c6fe76cef3e2", 0x1d) r2 = socket$inet(0x2, 0xd79c8942b6614cd6, 0x7) r3 = socket(0x10, 0x803, 0x0) sendmmsg$alg(r3, &(0x7f0000000200), 0x36d, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x1, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x1, 0x0, 0x0) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c7ae247e1fd2db1b11ea7af8100f6ff", @ANYRESOCT=r2, @ANYRES16=r1, @ANYRES32=0x0, @ANYRESHEX=r4, @ANYRES64=r0, @ANYRESOCT=r4, @ANYRES16=r3, @ANYRES32, @ANYRESHEX], 0x1c}, 0x1, 0x0, 0x0, 0x8051}, 0x28814) sendto$inet(r1, 0x0, 0x0, 0x24008738, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) 12:42:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa}]}, 0x28}}, 0x0) 12:42:24 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:25 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:25 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:25 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4f, 0x81}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0xf, &(0x7f0000000040)) capget(&(0x7f0000000300)={0x20071026}, &(0x7f0000000340)={0x4, 0x5, 0x1, 0x7, 0x400, 0x9}) ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0xc0389424, 0x0) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000080)="441f0801000000e8c94ef56491ee54be0e1c2074ed27c1c6fe76cef3e2", 0x1d) r2 = socket$inet(0x2, 0xd79c8942b6614cd6, 0x7) r3 = socket(0x10, 0x803, 0x0) sendmmsg$alg(r3, &(0x7f0000000200), 0x36d, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x1, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x1, 0x0, 0x0) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c7ae247e1fd2db1b11ea7af8100f6ff", @ANYRESOCT=r2, @ANYRES16=r1, @ANYRES32=0x0, @ANYRESHEX=r4, @ANYRES64=r0, @ANYRESOCT=r4, @ANYRES16=r3, @ANYRES32, @ANYRESHEX], 0x1c}, 0x1, 0x0, 0x0, 0x8051}, 0x28814) sendto$inet(r1, 0x0, 0x0, 0x24008738, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) 12:42:25 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 357.258819] IPVS: ftp: loaded support on port[0] = 21 12:42:25 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:25 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:25 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:26 executing program 2: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 357.704757] IPVS: ftp: loaded support on port[0] = 21 12:42:26 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:26 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:26 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:26 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:26 executing program 3: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:26 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:26 executing program 2: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:27 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:27 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:27 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:27 executing program 3: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:27 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:27 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:27 executing program 2: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:27 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:27 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:28 executing program 3: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:28 executing program 2: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:28 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:28 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:28 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) shutdown(r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x6, 0x4) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={0x0, 0x800}, 0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = dup(r4) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000004d980)={0x0, [], 0x80, "535b282dc3bfc4"}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000000c0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x14) ftruncate(r3, 0x200002) r6 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x8, 0x640) splice(0xffffffffffffffff, &(0x7f0000000280)=0x9, r6, &(0x7f0000000300)=0x7, 0x0, 0x6) sendfile(r0, r3, 0x0, 0x80001d00c0d0) 12:42:28 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:28 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:28 executing program 3: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:29 executing program 2: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:29 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:29 executing program 3: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:29 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:29 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:29 executing program 0: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:29 executing program 0 (fault-call:8 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:30 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:30 executing program 3: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 361.640592] FAULT_INJECTION: forcing a failure. [ 361.640592] name failslab, interval 1, probability 0, space 0, times 0 [ 361.690078] CPU: 0 PID: 25700 Comm: syz-executor.0 Not tainted 4.14.227-syzkaller #0 [ 361.697993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.707380] Call Trace: [ 361.709979] dump_stack+0x1b2/0x281 [ 361.713647] should_fail.cold+0x10a/0x149 [ 361.717808] should_failslab+0xd6/0x130 [ 361.721789] kmem_cache_alloc_node+0x263/0x410 [ 361.726378] __alloc_skb+0x5c/0x510 [ 361.730015] netlink_sendmsg+0x901/0xb80 [ 361.734076] ? nlmsg_notify+0x170/0x170 [ 361.738044] ? kernel_recvmsg+0x210/0x210 [ 361.742198] ? security_socket_sendmsg+0x83/0xb0 [ 361.747064] ? nlmsg_notify+0x170/0x170 [ 361.751768] sock_sendmsg+0xb5/0x100 [ 361.755532] ___sys_sendmsg+0x6c8/0x800 [ 361.759513] ? copy_msghdr_from_user+0x3b0/0x3b0 [ 361.764264] ? perf_trace_lock_acquire+0x104/0x510 [ 361.769370] ? HARDIRQ_verbose+0x10/0x10 [ 361.773431] ? __fget+0x1fe/0x360 [ 361.777084] ? lock_acquire+0x170/0x3f0 [ 361.781058] ? lock_downgrade+0x740/0x740 [ 361.785222] ? __fget+0x225/0x360 [ 361.788765] ? __fdget+0x196/0x1f0 [ 361.792301] ? sockfd_lookup_light+0xb2/0x160 [ 361.796792] __sys_sendmsg+0xa3/0x120 [ 361.800592] ? SyS_shutdown+0x160/0x160 [ 361.804562] ? wait_for_completion_io+0x10/0x10 [ 361.809250] ? SyS_read+0x210/0x210 [ 361.812873] ? __do_page_fault+0x159/0xad0 [ 361.817107] SyS_sendmsg+0x27/0x40 [ 361.820645] ? __sys_sendmsg+0x120/0x120 [ 361.824703] do_syscall_64+0x1d5/0x640 [ 361.828601] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 361.833884] RIP: 0033:0x466459 12:42:30 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 361.837435] RSP: 002b:00007fee4764c188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 361.845147] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000466459 [ 361.852410] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 361.859673] RBP: 00007fee4764c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 361.867107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 361.874365] R13: 00007ffddeae3f8f R14: 00007fee4764c300 R15: 0000000000022000 12:42:30 executing program 0 (fault-call:8 fault-nth:1): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:30 executing program 2: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 362.013397] FAULT_INJECTION: forcing a failure. [ 362.013397] name failslab, interval 1, probability 0, space 0, times 0 [ 362.059894] CPU: 0 PID: 25748 Comm: syz-executor.0 Not tainted 4.14.227-syzkaller #0 [ 362.067819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.077174] Call Trace: [ 362.079784] dump_stack+0x1b2/0x281 [ 362.083763] should_fail.cold+0x10a/0x149 [ 362.087946] should_failslab+0xd6/0x130 [ 362.091929] kmem_cache_alloc_node_trace+0x25a/0x400 [ 362.097045] __kmalloc_node_track_caller+0x38/0x70 [ 362.102505] __alloc_skb+0x96/0x510 [ 362.106227] netlink_sendmsg+0x901/0xb80 [ 362.110297] ? nlmsg_notify+0x170/0x170 [ 362.114276] ? kernel_recvmsg+0x210/0x210 [ 362.118462] ? security_socket_sendmsg+0x83/0xb0 [ 362.123231] ? nlmsg_notify+0x170/0x170 [ 362.127214] sock_sendmsg+0xb5/0x100 [ 362.130974] ___sys_sendmsg+0x6c8/0x800 [ 362.135136] ? copy_msghdr_from_user+0x3b0/0x3b0 [ 362.139896] ? perf_trace_lock_acquire+0x104/0x510 [ 362.144842] ? HARDIRQ_verbose+0x10/0x10 [ 362.149014] ? __fget+0x1fe/0x360 [ 362.152479] ? lock_acquire+0x170/0x3f0 [ 362.156461] ? lock_downgrade+0x740/0x740 [ 362.160621] ? __fget+0x225/0x360 [ 362.164166] ? __fdget+0x196/0x1f0 [ 362.167714] ? sockfd_lookup_light+0xb2/0x160 [ 362.172224] __sys_sendmsg+0xa3/0x120 [ 362.176390] ? SyS_shutdown+0x160/0x160 [ 362.180574] ? wait_for_completion_io+0x10/0x10 [ 362.185418] ? SyS_read+0x210/0x210 [ 362.189036] ? __do_page_fault+0x159/0xad0 [ 362.193326] SyS_sendmsg+0x27/0x40 [ 362.196877] ? __sys_sendmsg+0x120/0x120 [ 362.200930] do_syscall_64+0x1d5/0x640 [ 362.204826] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 362.210100] RIP: 0033:0x466459 [ 362.213278] RSP: 002b:00007fee4764c188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 362.220989] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000466459 [ 362.228256] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 362.235890] RBP: 00007fee4764c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 362.243163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 362.250421] R13: 00007ffddeae3f8f R14: 00007fee4764c300 R15: 0000000000022000 12:42:30 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:30 executing program 0 (fault-call:8 fault-nth:2): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 362.446414] FAULT_INJECTION: forcing a failure. [ 362.446414] name failslab, interval 1, probability 0, space 0, times 0 [ 362.470073] CPU: 0 PID: 25824 Comm: syz-executor.0 Not tainted 4.14.227-syzkaller #0 [ 362.477998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.487616] Call Trace: [ 362.490221] dump_stack+0x1b2/0x281 [ 362.493892] should_fail.cold+0x10a/0x149 [ 362.498086] should_failslab+0xd6/0x130 [ 362.502153] kmem_cache_alloc+0x40/0x3c0 [ 362.506222] skb_clone+0x126/0x9a0 [ 362.509771] netlink_deliver_tap+0x655/0x7d0 [ 362.514198] netlink_unicast+0x485/0x610 [ 362.518265] ? netlink_sendskb+0xd0/0xd0 [ 362.522335] ? __check_object_size+0x179/0x230 [ 362.527039] netlink_sendmsg+0x62e/0xb80 [ 362.531134] ? nlmsg_notify+0x170/0x170 [ 362.535114] ? kernel_recvmsg+0x210/0x210 [ 362.539284] ? security_socket_sendmsg+0x83/0xb0 [ 362.544045] ? nlmsg_notify+0x170/0x170 [ 362.548024] sock_sendmsg+0xb5/0x100 [ 362.551738] ___sys_sendmsg+0x6c8/0x800 [ 362.555697] ? copy_msghdr_from_user+0x3b0/0x3b0 [ 362.560446] ? perf_trace_lock_acquire+0x104/0x510 [ 362.565385] ? HARDIRQ_verbose+0x10/0x10 [ 362.569530] ? __fget+0x1fe/0x360 [ 362.572975] ? lock_acquire+0x170/0x3f0 [ 362.576951] ? lock_downgrade+0x740/0x740 [ 362.581102] ? __fget+0x225/0x360 [ 362.585171] ? __fdget+0x196/0x1f0 [ 362.588729] ? sockfd_lookup_light+0xb2/0x160 [ 362.593235] __sys_sendmsg+0xa3/0x120 [ 362.597054] ? SyS_shutdown+0x160/0x160 [ 362.601031] ? wait_for_completion_io+0x10/0x10 [ 362.605787] ? SyS_read+0x210/0x210 [ 362.609416] ? __do_page_fault+0x159/0xad0 [ 362.613652] SyS_sendmsg+0x27/0x40 [ 362.617181] ? __sys_sendmsg+0x120/0x120 [ 362.621226] do_syscall_64+0x1d5/0x640 [ 362.625111] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 362.630295] RIP: 0033:0x466459 [ 362.633487] RSP: 002b:00007fee4764c188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 362.641680] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000466459 [ 362.649825] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 362.657093] RBP: 00007fee4764c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 362.665139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 362.672401] R13: 00007ffddeae3f8f R14: 00007fee4764c300 R15: 0000000000022000 12:42:31 executing program 0 (fault-call:8 fault-nth:3): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 362.710748] 8021q: adding VLAN 0 to HW filter on device bond5 [ 362.717929] device bond5 entered promiscuous mode [ 362.730413] bond0: Enslaving bond5 as an active interface with an up link 12:42:31 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) open$dir(&(0x7f0000000100)='./file1\x00', 0x200, 0x5) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', 0x0, 0x0, 0x5c, 0x0) mount$overlay(0x40000d, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65002c6c6f076572f9000000000000006c65302c776f726b646972cd2e2f66696c65315c009c5737d056a5111b75e90686ea9e2a9925cb26ef4f808ffb028e2563198f83a7c8a4a99509ee6eb9d51d05"]) r1 = syz_mount_image$v7(&(0x7f0000000140)='v7\x00', &(0x7f0000000180)='./file2\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)="b348fbf13f364bba4b71bf189d83bb25035763becc5f34b9bb62c39533f72c6944b684b2f425a16c439987c05338d9f0338c79d4988fd2e9509dd0e1937b70c90d039f9ccfe76129ebe7e3d511bbb0312d4abe1fbbd6c5d4641abb4588e0c909d9ca3eac236e84af", 0x68, 0x8}, {&(0x7f00000002c0)="6b79f5d039a906fa1064a52198a753c76df4d5c5f0277730fd93287e6f815ffa605ae838d6530ae58de41e30b9baff5a8d", 0x31, 0x1ff}, {&(0x7f00000003c0)="68b5ba5a2823678a45c6cf0a14f32014c4c008d9f1bd9b5112e0a5b13031e068f40098d191a37d7f074ecffe848fedaa2e5b748cfc01edfea469c56ee9f48cf7ca76ab179abd1d2c8465926846b780c775502709fa3da1d4d2d423d58b74d3cc212e884637559e70d1d323d6e989faa1e64722e95c20c6051479db9cc86fc6e1d58a923800b8058a", 0x88, 0x5}, {&(0x7f0000000480)="ae6656c4a6f4884f3c624557bdb020dd1b2c821b76b3fd67741d02c3feebb81759d9b7810d63583d8b0e04b664949f687e8912ae968f6182f7b4721007ff6bfbddb46b19cd03c1b7f456bae4655de92e7244b3513039f984273b69fac8306f57120341c514b6cacab1b196e526fbad", 0x6f, 0x27}], 0x800080, &(0x7f00000005c0)={[{'overlay\x00'}, {'overlay\x00'}, {'('}, {'&-\\$&,]'}, {'$.{^'}], [{@smackfshat={'smackfshat', 0x3d, 'tmpfs\x00'}}, {@uid_gt={'uid>', 0xee01}}, {@fowner_gt={'fowner>', 0xee00}}]}) faccessat(r1, &(0x7f0000000640)='./file1\x00', 0x1d0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000040)) write$binfmt_misc(r0, 0x0, 0x4240a2a0) lchown(0x0, 0x0, 0x0) [ 362.870642] FAULT_INJECTION: forcing a failure. [ 362.870642] name failslab, interval 1, probability 0, space 0, times 0 [ 362.882331] CPU: 1 PID: 25872 Comm: syz-executor.0 Not tainted 4.14.227-syzkaller #0 [ 362.890213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.899566] Call Trace: [ 362.902203] dump_stack+0x1b2/0x281 [ 362.905837] should_fail.cold+0x10a/0x149 [ 362.910012] should_failslab+0xd6/0x130 [ 362.913995] kmem_cache_alloc+0x40/0x3c0 12:42:31 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r3 = dup3(r1, r2, 0x0) fgetxattr(r3, &(0x7f00000000c0)=@known='user.incfs.id\x00', &(0x7f0000000100)=""/48, 0x30) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000080)=0x0) perf_event_open(0x0, r4, 0x4, 0xffffffffffffffff, 0x0) [ 362.918057] skb_clone+0x126/0x9a0 [ 362.921604] dev_queue_xmit_nit+0x2ee/0x950 [ 362.925925] ? __skb_gso_segment+0x600/0x600 [ 362.930338] dev_hard_start_xmit+0xaa/0x890 [ 362.934657] ? validate_xmit_skb+0x669/0x9f0 [ 362.939061] __dev_queue_xmit+0x1d7f/0x2480 [ 362.943381] ? netdev_pick_tx+0x2e0/0x2e0 [ 362.947535] ? skb_clone+0x126/0x9a0 [ 362.951257] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 362.956713] ? memcpy+0x35/0x50 [ 362.959994] ? memcpy+0x35/0x50 [ 362.963274] ? skb_clone+0x6ac/0x9a0 [ 362.966991] netlink_deliver_tap+0x60c/0x7d0 [ 362.971411] netlink_unicast+0x485/0x610 [ 362.975478] ? netlink_sendskb+0xd0/0xd0 [ 362.979535] ? __check_object_size+0x179/0x230 [ 362.984102] netlink_sendmsg+0x62e/0xb80 [ 362.988152] ? nlmsg_notify+0x170/0x170 [ 362.992118] ? kernel_recvmsg+0x210/0x210 [ 362.996300] ? security_socket_sendmsg+0x83/0xb0 [ 363.001048] ? nlmsg_notify+0x170/0x170 [ 363.005018] sock_sendmsg+0xb5/0x100 [ 363.008724] ___sys_sendmsg+0x6c8/0x800 [ 363.012694] ? copy_msghdr_from_user+0x3b0/0x3b0 [ 363.017452] ? perf_trace_lock_acquire+0x104/0x510 [ 363.022386] ? HARDIRQ_verbose+0x10/0x10 [ 363.026442] ? __fget+0x1fe/0x360 [ 363.029883] ? lock_acquire+0x170/0x3f0 [ 363.033849] ? lock_downgrade+0x740/0x740 [ 363.037993] ? __fget+0x225/0x360 [ 363.041441] ? __fdget+0x196/0x1f0 [ 363.044983] ? sockfd_lookup_light+0xb2/0x160 [ 363.049496] __sys_sendmsg+0xa3/0x120 [ 363.053292] ? SyS_shutdown+0x160/0x160 [ 363.057692] ? wait_for_completion_io+0x10/0x10 [ 363.062361] ? SyS_read+0x210/0x210 [ 363.066204] ? __do_page_fault+0x159/0xad0 [ 363.070646] SyS_sendmsg+0x27/0x40 [ 363.074176] ? __sys_sendmsg+0x120/0x120 [ 363.078241] do_syscall_64+0x1d5/0x640 [ 363.082134] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 363.087322] RIP: 0033:0x466459 [ 363.090498] RSP: 002b:00007fee4764c188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 363.098286] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000466459 [ 363.105545] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 363.112806] RBP: 00007fee4764c1d0 R08: 0000000000000000 R09: 0000000000000000 12:42:31 executing program 0 (fault-call:8 fault-nth:4): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) [ 363.120252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 363.127513] R13: 00007ffddeae3f8f R14: 00007fee4764c300 R15: 0000000000022000 [ 363.150137] 8021q: adding VLAN 0 to HW filter on device bond6 [ 363.158929] device bond6 entered promiscuous mode [ 363.164658] bond0: Enslaving bond6 as an active interface with an up link 12:42:31 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0x0, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:31 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 363.299191] overlayfs: missing 'lowerdir' [ 363.368491] VFS: unable to read V7 FS superblock on device loop3. [ 363.398701] EXT4-fs error (device sda1): swap_inode_boot_loader:114: inode #5: comm syz-executor.2: iget: checksum invalid [ 363.471892] VFS: could not find a valid V7 on loop3. [ 363.519743] FAULT_INJECTION: forcing a failure. [ 363.519743] name failslab, interval 1, probability 0, space 0, times 0 [ 363.542359] EXT4-fs error (device sda1): swap_inode_boot_loader:114: inode #5: comm syz-executor.2: iget: checksum invalid [ 363.559694] CPU: 1 PID: 25921 Comm: syz-executor.0 Not tainted 4.14.227-syzkaller #0 [ 363.563844] EXT4-fs error (device sda1): swap_inode_boot_loader:114: inode #5: comm syz-executor.2: iget: checksum invalid [ 363.567608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.567615] Call Trace: [ 363.567634] dump_stack+0x1b2/0x281 [ 363.567658] should_fail.cold+0x10a/0x149 [ 363.567677] should_failslab+0xd6/0x130 [ 363.603222] kmem_cache_alloc_trace+0x29a/0x3d0 [ 363.607903] bond_enslave+0x3af/0x4cc0 [ 363.612067] ? bond_update_slave_arr+0x6a0/0x6a0 [ 363.616829] ? __lock_acquire+0x5fc/0x3f20 [ 363.621082] ? __lock_acquire+0x5fc/0x3f20 [ 363.625328] ? bond_update_slave_arr+0x6a0/0x6a0 [ 363.630124] do_set_master+0x19e/0x200 [ 363.634458] do_setlink+0x8b8/0x2bf0 [ 363.638276] ? trace_hardirqs_on+0x10/0x10 [ 363.642513] ? rtnl_fdb_add+0x770/0x770 [ 363.646490] ? __lock_acquire+0x5fc/0x3f20 [ 363.651268] ? perf_trace_lock_acquire+0x104/0x510 [ 363.656220] ? is_bpf_text_address+0x91/0x150 [ 363.660721] ? trace_hardirqs_on+0x10/0x10 [ 363.664968] ? __lock_acquire+0x5fc/0x3f20 [ 363.669297] ? HARDIRQ_verbose+0x10/0x10 [ 363.673375] ? validate_nla+0x192/0x5e0 [ 363.677530] ? nla_parse+0x157/0x1f0 [ 363.681250] ? validate_linkmsg+0x3a1/0x460 [ 363.685576] rtnl_newlink+0x1267/0x1830 [ 363.689566] ? mark_held_locks+0xa6/0xf0 [ 363.693629] ? rtnl_dellink+0x6a0/0x6a0 [ 363.697613] ? perf_trace_lock_acquire+0x104/0x510 [ 363.702548] ? _raw_spin_unlock_irq+0x5a/0x80 [ 363.707145] ? HARDIRQ_verbose+0x10/0x10 [ 363.711209] ? __schedule+0x893/0x1de0 [ 363.715092] ? __mutex_lock+0x356/0x1310 [ 363.719606] ? rtnl_dellink+0x6a0/0x6a0 [ 363.723631] rtnetlink_rcv_msg+0x3be/0xb10 [ 363.727889] ? rtnl_calcit.isra.0+0x3a0/0x3a0 [ 363.732388] ? netdev_pick_tx+0x2e0/0x2e0 [ 363.736537] netlink_rcv_skb+0x125/0x390 [ 363.740590] ? memcpy+0x35/0x50 [ 363.743866] ? rtnl_calcit.isra.0+0x3a0/0x3a0 [ 363.748366] ? netlink_ack+0x9a0/0x9a0 [ 363.752270] netlink_unicast+0x437/0x610 [ 363.756341] ? netlink_sendskb+0xd0/0xd0 [ 363.760408] ? __check_object_size+0x179/0x230 [ 363.765118] netlink_sendmsg+0x62e/0xb80 [ 363.769281] ? nlmsg_notify+0x170/0x170 [ 363.773314] ? kernel_recvmsg+0x210/0x210 [ 363.777472] ? security_socket_sendmsg+0x83/0xb0 [ 363.782232] ? nlmsg_notify+0x170/0x170 [ 363.786733] sock_sendmsg+0xb5/0x100 [ 363.790485] ___sys_sendmsg+0x6c8/0x800 [ 363.794466] ? copy_msghdr_from_user+0x3b0/0x3b0 [ 363.799235] ? perf_trace_lock_acquire+0x104/0x510 [ 363.804198] ? HARDIRQ_verbose+0x10/0x10 [ 363.808262] ? __fget+0x1fe/0x360 [ 363.811722] ? lock_acquire+0x170/0x3f0 [ 363.815709] ? lock_downgrade+0x740/0x740 [ 363.819866] ? __fget+0x225/0x360 [ 363.823329] ? __fdget+0x196/0x1f0 [ 363.826872] ? sockfd_lookup_light+0xb2/0x160 [ 363.831378] __sys_sendmsg+0xa3/0x120 [ 363.835184] ? SyS_shutdown+0x160/0x160 [ 363.839168] ? wait_for_completion_io+0x10/0x10 [ 363.843859] ? SyS_read+0x210/0x210 [ 363.847493] ? __do_page_fault+0x159/0xad0 [ 363.851735] SyS_sendmsg+0x27/0x40 [ 363.855277] ? __sys_sendmsg+0x120/0x120 [ 363.859345] do_syscall_64+0x1d5/0x640 [ 363.863599] entry_SYSCALL_64_after_hwframe+0x46/0xbb 12:42:32 executing program 2: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 363.868874] RIP: 0033:0x466459 [ 363.872062] RSP: 002b:00007fee4764c188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 363.879769] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000466459 [ 363.887037] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 363.894333] RBP: 00007fee4764c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 363.901605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 363.908874] R13: 00007ffddeae3f8f R14: 00007fee4764c300 R15: 0000000000022000 12:42:32 executing program 0 (fault-call:8 fault-nth:5): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 12:42:32 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:32 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) open$dir(&(0x7f0000000100)='./file1\x00', 0x200, 0x5) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', 0x0, 0x0, 0x5c, 0x0) mount$overlay(0x40000d, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65002c6c6f076572f9000000000000006c65302c776f726b646972cd2e2f66696c65315c009c5737d056a5111b75e90686ea9e2a9925cb26ef4f808ffb028e2563198f83a7c8a4a99509ee6eb9d51d05"]) r1 = syz_mount_image$v7(&(0x7f0000000140)='v7\x00', &(0x7f0000000180)='./file2\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)="b348fbf13f364bba4b71bf189d83bb25035763becc5f34b9bb62c39533f72c6944b684b2f425a16c439987c05338d9f0338c79d4988fd2e9509dd0e1937b70c90d039f9ccfe76129ebe7e3d511bbb0312d4abe1fbbd6c5d4641abb4588e0c909d9ca3eac236e84af", 0x68, 0x8}, {&(0x7f00000002c0)="6b79f5d039a906fa1064a52198a753c76df4d5c5f0277730fd93287e6f815ffa605ae838d6530ae58de41e30b9baff5a8d", 0x31, 0x1ff}, {&(0x7f00000003c0)="68b5ba5a2823678a45c6cf0a14f32014c4c008d9f1bd9b5112e0a5b13031e068f40098d191a37d7f074ecffe848fedaa2e5b748cfc01edfea469c56ee9f48cf7ca76ab179abd1d2c8465926846b780c775502709fa3da1d4d2d423d58b74d3cc212e884637559e70d1d323d6e989faa1e64722e95c20c6051479db9cc86fc6e1d58a923800b8058a", 0x88, 0x5}, {&(0x7f0000000480)="ae6656c4a6f4884f3c624557bdb020dd1b2c821b76b3fd67741d02c3feebb81759d9b7810d63583d8b0e04b664949f687e8912ae968f6182f7b4721007ff6bfbddb46b19cd03c1b7f456bae4655de92e7244b3513039f984273b69fac8306f57120341c514b6cacab1b196e526fbad", 0x6f, 0x27}], 0x800080, &(0x7f00000005c0)={[{'overlay\x00'}, {'overlay\x00'}, {'('}, {'&-\\$&,]'}, {'$.{^'}], [{@smackfshat={'smackfshat', 0x3d, 'tmpfs\x00'}}, {@uid_gt={'uid>', 0xee01}}, {@fowner_gt={'fowner>', 0xee00}}]}) faccessat(r1, &(0x7f0000000640)='./file1\x00', 0x1d0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000040)) write$binfmt_misc(r0, 0x0, 0x4240a2a0) lchown(0x0, 0x0, 0x0) 12:42:32 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x1a, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0x0, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') 12:42:32 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1000000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) unshare(0x22000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0x24, 0x0, 0x0, [0x0, 0x3]}, {0x1, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, @struct, 0x0, 0x45d, [0x0, 0x6, 0x0, 0x0, 0x0, 0x4]}, {0x0, @struct={0x0, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0x0, 0x0, 0x80000000007]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC]) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000640)='tmpfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x400000000}], 0x80800, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2e0000, &(0x7f0000000780)=ANY=[@ANYBLOB='dont_measure,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646e7f2c5f61707072617aba652c00c838a3e4a19bfb9c07659c76bfb9c2fbf62d2fc6d7b6d70f5dc28a7329c3b2"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x0, 0x94, 0x83, 0x0, 0x4000000000005, 0x940, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2800, 0x200, 0x5, 0x0, 0x6, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x20000) setresuid(0xee00, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x49, 0x28001021, r2, &(0x7f00000006c0)='./file0\x00') [ 364.295078] FAULT_INJECTION: forcing a failure. [ 364.295078] name failslab, interval 1, probability 0, space 0, times 0 [ 364.339293] CPU: 0 PID: 26006 Comm: syz-executor.0 Not tainted 4.14.227-syzkaller #0 [ 364.347210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.356655] Call Trace: [ 364.359250] dump_stack+0x1b2/0x281 [ 364.362890] should_fail.cold+0x10a/0x149 [ 364.367061] should_failslab+0xd6/0x130 [ 364.371040] kmem_cache_alloc+0x28e/0x3c0 [ 364.375193] __kernfs_new_node+0x6f/0x470 [ 364.379351] kernfs_create_dir_ns+0x8c/0x200 [ 364.383761] sysfs_create_dir_ns+0xb7/0x1d0 [ 364.388085] kobject_add_internal+0x28b/0x930 [ 364.392582] kobject_init_and_add+0xde/0x120 [ 364.396996] ? kobject_create_and_add+0x200/0x200 [ 364.401842] ? bond_enslave+0x3af/0x4cc0 [ 364.405907] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 364.411363] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 364.416405] bond_enslave+0x434/0x4cc0 [ 364.420312] ? bond_update_slave_arr+0x6a0/0x6a0 [ 364.425448] ? __lock_acquire+0x5fc/0x3f20 [ 364.429694] ? __lock_acquire+0x5fc/0x3f20 [ 364.433938] ? bond_update_slave_arr+0x6a0/0x6a0 [ 364.438690] do_set_master+0x19e/0x200 [ 364.442665] do_setlink+0x8b8/0x2bf0 [ 364.446381] ? trace_hardirqs_on+0x10/0x10 [ 364.450617] ? rtnl_fdb_add+0x770/0x770 [ 364.454613] ? __lock_acquire+0x5fc/0x3f20 [ 364.458859] ? perf_trace_lock_acquire+0x104/0x510 [ 364.463796] ? is_bpf_text_address+0x91/0x150 [ 364.468315] ? trace_hardirqs_on+0x10/0x10 [ 364.472571] ? __lock_acquire+0x5fc/0x3f20 [ 364.476807] ? HARDIRQ_verbose+0x10/0x10 [ 364.480978] ? validate_nla+0x192/0x5e0 [ 364.484966] ? nla_parse+0x157/0x1f0 [ 364.488856] ? validate_linkmsg+0x3a1/0x460 [ 364.493180] rtnl_newlink+0x1267/0x1830 [ 364.497170] ? mark_held_locks+0xa6/0xf0 [ 364.501245] ? rtnl_dellink+0x6a0/0x6a0 [ 364.505233] ? perf_trace_lock_acquire+0x104/0x510 [ 364.510166] ? _raw_spin_unlock_irq+0x5a/0x80 [ 364.514665] ? HARDIRQ_verbose+0x10/0x10 [ 364.518727] ? __schedule+0x893/0x1de0 [ 364.522637] ? __lock_acquire+0x5fc/0x3f20 [ 364.526895] ? __mutex_lock+0x356/0x1310 [ 364.530992] ? rtnl_dellink+0x6a0/0x6a0 [ 364.535244] rtnetlink_rcv_msg+0x3be/0xb10 [ 364.539483] ? rtnl_calcit.isra.0+0x3a0/0x3a0 [ 364.543978] ? netdev_pick_tx+0x2e0/0x2e0 [ 364.548131] netlink_rcv_skb+0x125/0x390 [ 364.552288] ? memcpy+0x35/0x50 [ 364.555565] ? rtnl_calcit.isra.0+0x3a0/0x3a0 [ 364.560059] ? netlink_ack+0x9a0/0x9a0 [ 364.564060] netlink_unicast+0x437/0x610 [ 364.568150] ? netlink_sendskb+0xd0/0xd0 [ 364.572210] ? __check_object_size+0x179/0x230 [ 364.576794] netlink_sendmsg+0x62e/0xb80 [ 364.580859] ? nlmsg_notify+0x170/0x170 [ 364.585004] ? kernel_recvmsg+0x210/0x210 [ 364.589152] ? security_socket_sendmsg+0x83/0xb0 [ 364.593905] ? nlmsg_notify+0x170/0x170 [ 364.597986] sock_sendmsg+0xb5/0x100 [ 364.601703] ___sys_sendmsg+0x6c8/0x800 [ 364.605765] ? copy_msghdr_from_user+0x3b0/0x3b0 [ 364.610519] ? perf_trace_lock_acquire+0x104/0x510 [ 364.615459] ? HARDIRQ_verbose+0x10/0x10 [ 364.619540] ? __fget+0x1fe/0x360 [ 364.623021] ? lock_acquire+0x170/0x3f0 [ 364.627009] ? lock_downgrade+0x740/0x740 [ 364.631171] ? __fget+0x225/0x360 [ 364.634624] ? __fdget+0x196/0x1f0 [ 364.638178] ? sockfd_lookup_light+0xb2/0x160 [ 364.642673] __sys_sendmsg+0xa3/0x120 [ 364.646472] ? SyS_shutdown+0x160/0x160 [ 364.650465] ? wait_for_completion_io+0x10/0x10 [ 364.655142] ? SyS_read+0x210/0x210 [ 364.658806] ? __do_page_fault+0x159/0xad0 [ 364.663126] SyS_sendmsg+0x27/0x40 [ 364.666661] ? __sys_sendmsg+0x120/0x120 [ 364.670719] do_syscall_64+0x1d5/0x640 [ 364.674615] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 364.679805] RIP: 0033:0x466459 [ 364.682994] RSP: 002b:00007fee4764c188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 364.690710] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000466459 [ 364.697984] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 364.705305] RBP: 00007fee4764c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 364.713529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 364.720798] R13: 00007ffddeae3f8f R14: 00007fee4764c300 R15: 0000000000022000 [ 364.808579] overlayfs: missing 'lowerdir' [ 364.817259] kobject_add_internal failed for bonding_slave (error: -12 parent: bond8) [ 364.825738] ODEBUG: assert_init not available (active state 0) object type: timer_list hint: (null) [ 364.836032] ------------[ cut here ]------------ [ 364.840803] WARNING: CPU: 0 PID: 26006 at lib/debugobjects.c:287 debug_print_object.cold+0xa7/0xdb [ 364.849897] Kernel panic - not syncing: panic_on_warn set ... [ 364.849897] [ 364.857261] CPU: 0 PID: 26006 Comm: syz-executor.0 Not tainted 4.14.227-syzkaller #0 [ 364.865144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.874495] Call Trace: [ 364.877086] dump_stack+0x1b2/0x281 [ 364.880719] panic+0x1f9/0x42d [ 364.883920] ? add_taint.cold+0x16/0x16 [ 364.887923] ? debug_print_object.cold+0xa7/0xdb [ 364.892689] ? __warn.cold+0x5/0x44 [ 364.896330] ? debug_print_object.cold+0xa7/0xdb [ 364.901088] __warn.cold+0x20/0x44 [ 364.904633] ? ist_end_non_atomic+0x10/0x10 [ 364.908963] ? debug_print_object.cold+0xa7/0xdb [ 364.913722] report_bug+0x208/0x250 [ 364.917357] do_error_trap+0x195/0x2d0 [ 364.921279] ? math_error+0x2d0/0x2d0 [ 364.925350] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 364.930205] invalid_op+0x1b/0x40 [ 364.933666] RIP: 0010:debug_print_object.cold+0xa7/0xdb [ 364.939205] RSP: 0018:ffff88808eebed48 EFLAGS: 00010086 [ 364.944571] RAX: 0000000000000061 RBX: 0000000000000005 RCX: 0000000000000000 [ 364.951841] RDX: 0000000000040000 RSI: ffffffff81441890 RDI: ffffed1011dd7d9f [ 364.959109] RBP: ffffffff878b6e80 R08: 0000000000000061 R09: 0000000000000001 [ 364.966384] R10: 0000000000000000 R11: ffff8880b495e600 R12: 0000000000000000 [ 364.973650] R13: 0000000000000000 R14: ffff8880913a2178 R15: 1ffff11011dd7db2 [ 364.981021] ? vprintk_func+0x60/0x160 [ 364.985047] ? debug_print_object.cold+0xa7/0xdb [ 364.989809] debug_object_assert_init+0x1d3/0x2d0 [ 364.994659] ? debug_object_active_state+0x330/0x330 [ 364.999761] ? vprintk_emit+0x247/0x620 [ 365.003749] del_timer+0x5d/0xe0 [ 365.007112] ? process_timeout+0x20/0x20 [ 365.011192] try_to_grab_pending+0x243/0x610 [ 365.015610] __cancel_work_timer+0x90/0x460 [ 365.020018] ? work_on_cpu_safe+0x70/0x70 [ 365.024167] ? kobject_init_and_add+0xe6/0x120 [ 365.028764] ? kobject_create_and_add+0x200/0x200 [ 365.033605] ? bond_enslave+0x3af/0x4cc0 [ 365.037666] slave_kobj_release+0x48/0xd0 [ 365.041812] ? bond_fill_ifslave+0x1a0/0x1a0 [ 365.046218] kobject_put+0x251/0x550 [ 365.049975] bond_enslave+0xd2b/0x4cc0 [ 365.053875] ? bond_update_slave_arr+0x6a0/0x6a0 [ 365.058635] ? __lock_acquire+0x5fc/0x3f20 [ 365.062880] ? __lock_acquire+0x5fc/0x3f20 [ 365.067208] ? bond_update_slave_arr+0x6a0/0x6a0 [ 365.072010] do_set_master+0x19e/0x200 [ 365.075899] do_setlink+0x8b8/0x2bf0 [ 365.079614] ? trace_hardirqs_on+0x10/0x10 [ 365.083933] ? rtnl_fdb_add+0x770/0x770 [ 365.088342] ? __lock_acquire+0x5fc/0x3f20 [ 365.092586] ? perf_trace_lock_acquire+0x104/0x510 [ 365.097574] ? is_bpf_text_address+0x91/0x150 [ 365.102082] ? trace_hardirqs_on+0x10/0x10 [ 365.106317] ? __lock_acquire+0x5fc/0x3f20 [ 365.110553] ? HARDIRQ_verbose+0x10/0x10 [ 365.114630] ? validate_nla+0x192/0x5e0 [ 365.118609] ? nla_parse+0x157/0x1f0 [ 365.122341] ? validate_linkmsg+0x3a1/0x460 [ 365.126666] rtnl_newlink+0x1267/0x1830 [ 365.130660] ? mark_held_locks+0xa6/0xf0 [ 365.134717] ? rtnl_dellink+0x6a0/0x6a0 [ 365.138690] ? perf_trace_lock_acquire+0x104/0x510 [ 365.143625] ? _raw_spin_unlock_irq+0x5a/0x80 [ 365.148128] ? HARDIRQ_verbose+0x10/0x10 [ 365.152463] ? __schedule+0x893/0x1de0 [ 365.156780] ? __lock_acquire+0x5fc/0x3f20 [ 365.161013] ? __mutex_lock+0x356/0x1310 [ 365.165112] ? rtnl_dellink+0x6a0/0x6a0 [ 365.169370] rtnetlink_rcv_msg+0x3be/0xb10 [ 365.174374] ? rtnl_calcit.isra.0+0x3a0/0x3a0 [ 365.178874] ? netdev_pick_tx+0x2e0/0x2e0 [ 365.183028] netlink_rcv_skb+0x125/0x390 [ 365.187087] ? memcpy+0x35/0x50 [ 365.190362] ? rtnl_calcit.isra.0+0x3a0/0x3a0 [ 365.194858] ? netlink_ack+0x9a0/0x9a0 [ 365.198756] netlink_unicast+0x437/0x610 [ 365.202853] ? netlink_sendskb+0xd0/0xd0 [ 365.206931] ? __check_object_size+0x179/0x230 [ 365.211512] netlink_sendmsg+0x62e/0xb80 [ 365.215578] ? nlmsg_notify+0x170/0x170 [ 365.219655] ? kernel_recvmsg+0x210/0x210 [ 365.223809] ? security_socket_sendmsg+0x83/0xb0 [ 365.228565] ? nlmsg_notify+0x170/0x170 [ 365.232809] sock_sendmsg+0xb5/0x100 [ 365.236526] ___sys_sendmsg+0x6c8/0x800 [ 365.240512] ? copy_msghdr_from_user+0x3b0/0x3b0 [ 365.245787] ? perf_trace_lock_acquire+0x104/0x510 [ 365.251152] ? HARDIRQ_verbose+0x10/0x10 [ 365.255212] ? __fget+0x1fe/0x360 [ 365.258664] ? lock_acquire+0x170/0x3f0 [ 365.262656] ? lock_downgrade+0x740/0x740 [ 365.266813] ? __fget+0x225/0x360 [ 365.270287] ? __fdget+0x196/0x1f0 [ 365.273827] ? sockfd_lookup_light+0xb2/0x160 [ 365.278343] __sys_sendmsg+0xa3/0x120 [ 365.282144] ? SyS_shutdown+0x160/0x160 [ 365.286120] ? wait_for_completion_io+0x10/0x10 [ 365.290803] ? SyS_read+0x210/0x210 [ 365.294431] ? __do_page_fault+0x159/0xad0 [ 365.298677] SyS_sendmsg+0x27/0x40 [ 365.302217] ? __sys_sendmsg+0x120/0x120 [ 365.306285] do_syscall_64+0x1d5/0x640 [ 365.310186] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 365.316510] RIP: 0033:0x466459 [ 365.319702] RSP: 002b:00007fee4764c188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 365.327414] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000466459 [ 365.334684] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 365.341968] RBP: 00007fee4764c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 365.349237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 365.356614] R13: 00007ffddeae3f8f R14: 00007fee4764c300 R15: 0000000000022000 [ 365.364998] Kernel Offset: disabled [ 365.369622] Rebooting in 86400 seconds..