)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:51 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x04\x00Z\v~\xa8(\x00', 0x1) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000044}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="300000000c140002403619f6a063d0a608003d000411000008000100020000000800010000000000080e010001000000"], 0x30}, 0x1, 0x0, 0x0, 0x4004051}, 0x814) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000080)='\x00\x04\x00'], &(0x7f0000000280)=[&(0x7f0000000100)='\x00\x04\x00', &(0x7f0000000200)='\x00\x04\x00', &(0x7f0000000240)='\x00\x04\x00']) 04:11:51 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579", 0x24, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) 04:11:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x600, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 232.101239] FAULT_INJECTION: forcing a failure. [ 232.101239] name failslab, interval 1, probability 0, space 0, times 0 04:11:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 232.178979] CPU: 0 PID: 12392 Comm: syz-executor.0 Not tainted 4.19.150-syzkaller #0 [ 232.186889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.196240] Call Trace: [ 232.198836] dump_stack+0x22c/0x33e [ 232.202469] should_fail.cold+0xa/0x2f [ 232.206369] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 232.211486] ? __should_failslab+0x76/0x1b6 [ 232.215822] __should_failslab+0x153/0x1b6 [ 232.220069] should_failslab+0x5/0xf [ 232.223790] __kmalloc_track_caller+0x2d8/0x4e0 [ 232.228464] ? dh_data_from_key+0x19e/0x2c0 [ 232.232795] kmemdup+0x23/0x50 [ 232.235995] dh_data_from_key+0x19e/0x2c0 [ 232.240153] __keyctl_dh_compute+0x329/0x1330 [ 232.244663] ? check_preemption_disabled+0x41/0x2b0 [ 232.249689] ? dh_data_from_key+0x2c0/0x2c0 [ 232.254043] ? proc_fail_nth_write+0x95/0x1d0 [ 232.258548] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 232.263319] ? __might_fault+0x11f/0x1d0 [ 232.267396] ? lock_downgrade+0x750/0x750 [ 232.271547] ? lock_acquire+0x170/0x3f0 [ 232.275528] ? __might_fault+0xef/0x1d0 [ 232.279516] ? __might_fault+0x192/0x1d0 [ 232.283590] keyctl_dh_compute+0xbf/0x11f [ 232.287748] ? __keyctl_dh_compute+0x1330/0x1330 [ 232.292524] __se_sys_keyctl+0x10f/0x3f0 [ 232.296597] do_syscall_64+0xf9/0x670 [ 232.300432] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.305634] RIP: 0033:0x45de59 [ 232.308831] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 232.327822] RSP: 002b:00007f0318c10c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 232.335531] RAX: ffffffffffffffda RBX: 00000000000202c0 RCX: 000000000045de59 [ 232.342802] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000017 [ 232.350072] RBP: 00007f0318c10ca0 R08: 00000000200001c0 R09: 0000000000000000 [ 232.357361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 232.364638] R13: 00007ffe2cec305f R14: 00007f0318c119c0 R15: 000000000118bf2c 04:11:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xa00, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 232.411509] VFS: could not find a valid V7 on loop1. 04:11:52 executing program 0 (fault-call:8 fault-nth:5): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:52 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x0) 04:11:52 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6", 0x36, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) 04:11:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x7, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xc00, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101, 0x7}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000040)={0x2, 0x1, {0xffffffffffffffff, 0x3, 0x80, 0x0, 0x1}, 0xa50}) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="80010000", @ANYRES16=r2, @ANYBLOB="000126bd7000fedbdf2504000020bc0008801c0007800800060071000000080005002ba8c50d0800060039000000540007800800060049000000080005001e44f64f080006009100000008000600b600000008000500561a241608000600ee0000000800060039000000080005001e5c51250800050005bdfc2a080006003d000000040007804400078008000540330d3f780800050086f2c7b6c5bb2939a4000000080005005b943b04080006558cd3f154a509c500b89c255c0800050005000000080006009a000000a0200c801c000b80080009001cb4d11d08000900ebd70c5c0800090096b1416b4c1203f457000a003f5c000008000a003021000008000900f500442108000a00fc75000008000900727e997908000a00e4eb000008000008000900cb0dba5134000b8008000a005c00000008000a004d09000008000a007454000008000a00d27b000008000a0041d60000080009002f8647580800010003000000080001000300"/378], 0x180}, 0x1, 0x0, 0x0, 0x40840}, 0x20040000) sendmsg$NLBL_CIPSOV4_C_LIST(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x298, r2, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MLSLVLLST={0xe0, 0x8, 0x0, 0x1, [{0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5c9c6ed6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4ad08621}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7dd8649c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x415f1c49}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x10000}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xd07f754}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x68a5d06e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x106443bc}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x26a05255}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x36}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa9}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x64}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x48405c55}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xed}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1e05527e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1c}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xb0bdd1a}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x518c56c5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1cb299b5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x87}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xac}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x188, 0xc, 0x0, 0x1, [{0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5022ee06}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x747a1473}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8cb8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1cd94f9b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfb29}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5bb89df2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6e47}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x15ae}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x38ce}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbf8a}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd88a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbcd5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x671af1b8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfa05}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6aa8a05a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7395}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x24f4bc91}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x222f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa4c3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x661e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x403a0474}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1ef8e89d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1470}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe049}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x58556a2d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4f2e10ff}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x735c8b10}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4951}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x41f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xffe4}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2db46f82}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x37d3fb6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x14e46a7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb49}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5302c18}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x937}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x33038e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x785e}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x51f6f162}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc3f5}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4f436a04}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc7a7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4e684bf8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd618}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}]}]}, 0x298}, 0x1, 0x0, 0x0, 0x40400}, 0x8800) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb5972, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ae9000/0x4000)=nil, 0x3000}) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x46000) io_setup(0x2349, &(0x7f0000000240)=0x0) io_submit(r4, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfffffffb, 0xfffffffe, 0x80000000000000, 0x1, 0x0, r3, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 04:11:52 executing program 3: recvfrom$x25(0xffffffffffffffff, &(0x7f0000000040)=""/66, 0x42, 0x1, &(0x7f00000000c0)={0x9, @remote={[], 0x0}}, 0x12) clone(0x86018000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) io_getevents(0x0, 0x7, 0x2, &(0x7f0000000100)=[{}, {}], 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0xa, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 232.878621] VFS: could not find a valid V7 on loop1. [ 232.888262] FAULT_INJECTION: forcing a failure. [ 232.888262] name failslab, interval 1, probability 0, space 0, times 0 04:11:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xe00, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0xb, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 232.976965] CPU: 0 PID: 12441 Comm: syz-executor.0 Not tainted 4.19.150-syzkaller #0 [ 232.984876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.994233] Call Trace: [ 232.996830] dump_stack+0x22c/0x33e [ 233.000469] should_fail.cold+0xa/0x2f [ 233.004388] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 233.009509] __should_failslab+0x153/0x1b6 [ 233.013756] should_failslab+0x5/0xf [ 233.017479] __kmalloc_track_caller+0x2d8/0x4e0 [ 233.022169] ? dh_data_from_key+0x19e/0x2c0 [ 233.026513] kmemdup+0x23/0x50 [ 233.029715] dh_data_from_key+0x19e/0x2c0 [ 233.033873] __keyctl_dh_compute+0x4a1/0x1330 [ 233.038381] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 233.042973] ? _raw_spin_unlock_irq+0x5a/0x90 [ 233.047497] ? finish_task_switch+0x174/0x8b0 [ 233.051993] ? finish_task_switch+0x146/0x8b0 [ 233.056494] ? dh_data_from_key+0x2c0/0x2c0 [ 233.060862] ? __might_fault+0x11f/0x1d0 [ 233.064936] ? lock_downgrade+0x750/0x750 [ 233.069085] ? lock_acquire+0x170/0x3f0 [ 233.073067] ? __might_fault+0xef/0x1d0 [ 233.077054] ? __might_fault+0x192/0x1d0 [ 233.081130] keyctl_dh_compute+0xbf/0x11f [ 233.085282] ? __keyctl_dh_compute+0x1330/0x1330 [ 233.090050] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 233.095418] __se_sys_keyctl+0x10f/0x3f0 [ 233.099487] do_syscall_64+0xf9/0x670 [ 233.103296] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 233.108507] RIP: 0033:0x45de59 [ 233.111705] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 233.130606] RSP: 002b:00007f0318c10c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 233.138313] RAX: ffffffffffffffda RBX: 00000000000202c0 RCX: 000000000045de59 [ 233.145582] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000017 [ 233.152874] RBP: 00007f0318c10ca0 R08: 00000000200001c0 R09: 0000000000000000 [ 233.160229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 233.167497] R13: 00007ffe2cec305f R14: 00007f0318c119c0 R15: 000000000118bf2c 04:11:52 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) sendmsg$NFQNL_MSG_VERDICT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, 0x3, 0x3, 0x903, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffc, 0x9}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x3}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffc, 0x80}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffc}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0xfffff39d}}]}, 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x24004880) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:52 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6", 0x36, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) 04:11:53 executing program 0 (fault-call:8 fault-nth:6): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101, 0x7}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000040)={0x2, 0x1, {0xffffffffffffffff, 0x3, 0x80, 0x0, 0x1}, 0xa50}) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="80010000", @ANYRES16=r2, @ANYBLOB="000126bd7000fedbdf2504000020bc0008801c0007800800060071000000080005002ba8c50d0800060039000000540007800800060049000000080005001e44f64f080006009100000008000600b600000008000500561a241608000600ee0000000800060039000000080005001e5c51250800050005bdfc2a080006003d000000040007804400078008000540330d3f780800050086f2c7b6c5bb2939a4000000080005005b943b04080006558cd3f154a509c500b89c255c0800050005000000080006009a000000a0200c801c000b80080009001cb4d11d08000900ebd70c5c0800090096b1416b4c1203f457000a003f5c000008000a003021000008000900f500442108000a00fc75000008000900727e997908000a00e4eb000008000008000900cb0dba5134000b8008000a005c00000008000a004d09000008000a007454000008000a00d27b000008000a0041d60000080009002f8647580800010003000000080001000300"/378], 0x180}, 0x1, 0x0, 0x0, 0x40840}, 0x20040000) sendmsg$NLBL_CIPSOV4_C_LIST(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x298, r2, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MLSLVLLST={0xe0, 0x8, 0x0, 0x1, [{0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5c9c6ed6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4ad08621}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7dd8649c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x415f1c49}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x10000}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xd07f754}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x68a5d06e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x106443bc}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x26a05255}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x36}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa9}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x64}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x48405c55}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xed}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1e05527e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1c}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xb0bdd1a}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x518c56c5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1cb299b5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x87}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xac}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x188, 0xc, 0x0, 0x1, [{0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5022ee06}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x747a1473}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8cb8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1cd94f9b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfb29}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5bb89df2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6e47}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x15ae}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x38ce}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbf8a}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd88a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbcd5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x671af1b8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfa05}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6aa8a05a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7395}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x24f4bc91}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x222f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa4c3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x661e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x403a0474}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1ef8e89d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1470}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe049}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x58556a2d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4f2e10ff}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x735c8b10}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4951}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x41f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xffe4}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2db46f82}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x37d3fb6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x14e46a7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb49}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5302c18}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x937}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x33038e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x785e}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x51f6f162}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc3f5}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4f436a04}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc7a7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4e684bf8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd618}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}]}]}, 0x298}, 0x1, 0x0, 0x0, 0x40400}, 0x8800) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb5972, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ae9000/0x4000)=nil, 0x3000}) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x46000) io_setup(0x2349, &(0x7f0000000240)=0x0) io_submit(r4, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfffffffb, 0xfffffffe, 0x80000000000000, 0x1, 0x0, r3, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 04:11:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x20001, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xf00, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:53 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 233.407122] VFS: could not find a valid V7 on loop1. 04:11:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:53 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6", 0x36, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) [ 233.571498] FAULT_INJECTION: forcing a failure. [ 233.571498] name failslab, interval 1, probability 0, space 0, times 0 [ 233.601710] VFS: could not find a valid V7 on loop1. [ 233.608593] CPU: 1 PID: 12496 Comm: syz-executor.0 Not tainted 4.19.150-syzkaller #0 [ 233.616509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.625958] Call Trace: [ 233.628549] dump_stack+0x22c/0x33e [ 233.632187] should_fail.cold+0xa/0x2f [ 233.636082] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 233.641201] __should_failslab+0x153/0x1b6 [ 233.645444] should_failslab+0x5/0xf [ 233.649160] __kmalloc_track_caller+0x2d8/0x4e0 [ 233.653834] ? dh_data_from_key+0x19e/0x2c0 [ 233.658164] kmemdup+0x23/0x50 [ 233.661361] dh_data_from_key+0x19e/0x2c0 [ 233.665516] __keyctl_dh_compute+0x4d3/0x1330 [ 233.670014] ? check_preemption_disabled+0x41/0x2b0 [ 233.675040] ? dh_data_from_key+0x2c0/0x2c0 [ 233.679371] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 233.684132] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 233.688724] ? rcu_nmi_exit+0x102/0x220 [ 233.692704] ? retint_kernel+0x2d/0x2d [ 233.697384] ? _copy_from_user+0xb1/0x130 [ 233.701539] ? _copy_from_user+0xe5/0x130 [ 233.705694] ? __sanitizer_cov_trace_pc+0x22/0x50 [ 233.710550] keyctl_dh_compute+0xbf/0x11f [ 233.714703] ? __keyctl_dh_compute+0x1330/0x1330 [ 233.719466] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 233.724840] __se_sys_keyctl+0x10f/0x3f0 [ 233.728908] do_syscall_64+0xf9/0x670 [ 233.732724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 233.737918] RIP: 0033:0x45de59 [ 233.741115] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 233.760015] RSP: 002b:00007f0318c10c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa 04:11:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x4000, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 233.767726] RAX: ffffffffffffffda RBX: 00000000000202c0 RCX: 000000000045de59 [ 233.774997] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000017 [ 233.782288] RBP: 00007f0318c10ca0 R08: 00000000200001c0 R09: 0000000000000000 [ 233.789558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 233.796823] R13: 00007ffe2cec305f R14: 00007f0318c119c0 R15: 000000000118bf2c 04:11:53 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce254", 0x3f, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) 04:11:53 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYRESHEX=r1], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup3(r1, r0, 0x0) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f0000000040)=0x3e03) 04:11:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x2, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101, 0x7}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000040)={0x2, 0x1, {0xffffffffffffffff, 0x3, 0x80, 0x0, 0x1}, 0xa50}) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="80010000", @ANYRES16=r2, @ANYBLOB="000126bd7000fedbdf2504000020bc0008801c0007800800060071000000080005002ba8c50d0800060039000000540007800800060049000000080005001e44f64f080006009100000008000600b600000008000500561a241608000600ee0000000800060039000000080005001e5c51250800050005bdfc2a080006003d000000040007804400078008000540330d3f780800050086f2c7b6c5bb2939a4000000080005005b943b04080006558cd3f154a509c500b89c255c0800050005000000080006009a000000a0200c801c000b80080009001cb4d11d08000900ebd70c5c0800090096b1416b4c1203f457000a003f5c000008000a003021000008000900f500442108000a00fc75000008000900727e997908000a00e4eb000008000008000900cb0dba5134000b8008000a005c00000008000a004d09000008000a007454000008000a00d27b000008000a0041d60000080009002f8647580800010003000000080001000300"/378], 0x180}, 0x1, 0x0, 0x0, 0x40840}, 0x20040000) sendmsg$NLBL_CIPSOV4_C_LIST(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x298, r2, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MLSLVLLST={0xe0, 0x8, 0x0, 0x1, [{0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5c9c6ed6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4ad08621}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7dd8649c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x415f1c49}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x10000}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xd07f754}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x68a5d06e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x106443bc}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x26a05255}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x36}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa9}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x64}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x48405c55}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xed}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1e05527e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1c}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xb0bdd1a}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x518c56c5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1cb299b5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x87}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xac}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x188, 0xc, 0x0, 0x1, [{0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5022ee06}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x747a1473}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8cb8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1cd94f9b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfb29}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5bb89df2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6e47}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x15ae}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x38ce}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbf8a}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd88a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbcd5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x671af1b8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfa05}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6aa8a05a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7395}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x24f4bc91}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x222f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa4c3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x661e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x403a0474}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1ef8e89d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1470}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe049}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x58556a2d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4f2e10ff}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x735c8b10}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4951}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x41f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xffe4}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2db46f82}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x37d3fb6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x14e46a7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb49}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5302c18}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x937}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x33038e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x785e}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x51f6f162}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc3f5}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4f436a04}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc7a7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4e684bf8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd618}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}]}]}, 0x298}, 0x1, 0x0, 0x0, 0x40400}, 0x8800) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb5972, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ae9000/0x4000)=nil, 0x3000}) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x46000) io_setup(0x2349, &(0x7f0000000240)=0x0) io_submit(r4, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfffffffb, 0xfffffffe, 0x80000000000000, 0x1, 0x0, r3, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 04:11:53 executing program 0 (fault-call:8 fault-nth:7): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 233.974715] VFS: could not find a valid V7 on loop1. 04:11:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x5401, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x4, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:53 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce254", 0x3f, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) 04:11:53 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x10, &(0x7f0000000200)) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f0000000040)={0x401}) 04:11:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x5865, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 234.206430] VFS: could not find a valid V7 on loop1. 04:11:53 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x80100, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x290f40, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r2, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE(r1, 0x50009401, &(0x7f0000000200)={{r2}, "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"}) r3 = accept$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @private1}, &(0x7f00000000c0)=0x1c) getsockopt$bt_hci(r3, 0x0, 0x1, &(0x7f0000000100), &(0x7f0000001200)) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x6, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:54 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce254", 0x3f, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) 04:11:54 executing program 5: ioctl$UFFDIO_ZEROPAGE(0xffffffffffffffff, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}}) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x0) pwrite64(r0, &(0x7f00000000c0)="beb8b4878331262aa3f6ee6733aecd209dd424dab7111f4331740568cbf915299e1a6daafeaec729ded5e20bf0d70a4049bffdbd2db5f8bf1123344b8495", 0x3e, 0x7) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x2, 0xb8d, 0xfffffffffffffff7}}, 0x28) [ 234.321834] QAT: Invalid ioctl 04:11:54 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "ac3a2e6d76f624a2", "a7da5074c954806d538177a00faadc86", "b6ad5c0e", "f671f99031e63ab8"}, 0x28) r1 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000010000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1dca71021a37914ea508ed46264ebcae63b32"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 234.371023] QAT: Invalid ioctl 04:11:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 234.472394] VFS: could not find a valid V7 on loop1. 04:11:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x7, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:54 executing program 5: syz_mount_image$befs(&(0x7f0000000000)='befs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x8000, &(0x7f0000000080)={[{'-.\\!(@&'}], [{@dont_appraise='dont_appraise'}]}) ioctl$KVM_SET_BOOT_CPU_ID(0xffffffffffffffff, 0xae78, &(0x7f00000000c0)) 04:11:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x2, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:54 executing program 3: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) write$P9_RWALK(r1, &(0x7f00000000c0)={0x7e, 0x6f, 0x2, {0x9, [{0x10, 0x0, 0x4}, {0x1, 0x1, 0x2}, {0x40, 0x1, 0x7}, {0x20, 0x3, 0x3}, {0x20, 0x2, 0x3}, {0x20, 0x2, 0x6}, {0x1, 0x2, 0x6}, {0x0, 0x3, 0x6}, {0x51, 0x1}]}}, 0x7e) timer_create(0x3, &(0x7f0000000040)={0x0, 0x40, 0x0, @tid=r0}, &(0x7f0000000080)) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:54 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b41000002", 0x44, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) 04:11:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x6558, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:54 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=""/244, 0xf4) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYRESHEX=r0, @ANYBLOB="b1628e3a79de610436ba91c88bb6d35e61397fa21f131ea4374f6d7ff258f5c00a9e0d4bb81285d4555099d8cc76a76b9b112623814d9c7d579f3d885102a56302e7f09560a4d817e4e5274f99413c2d76c0d5a17381198ff48e4f6b80e5c90449352f90fed085d2ef3b924daa98b14cbe846cd8d08451754c77049391070c028570e0b7831ee5ad30a495084d072be04408ffd18627162b9e2f8a463b5a5c8b16e9bdfb811276e32c13f13e4e7cca8e3effcb27479c85f534be4d"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="524c2cf97cd8e8751160b0a29577e4cda18090a2ebb16d887df88a2574c778ab0f", 0x21, 0xfffffffffffffff9) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000380)={r1, 0x0, 0x6b}, &(0x7f00000003c0)={'enc=', 'pkcs1', ' hash=', {'blake2b-384\x00'}}, &(0x7f0000000440), &(0x7f0000000480)="37cacbd996c3d84816349857f475ca4244ecf7178901ddf691ad3dfeb04af989cd55a76d8cafc41d9166f9dcef1d41fc1af0e725a5985836e4ac5952822cb82c09f611cf046f745bc179eb8efaaef83ac9748dcd9ec39cfd5c8410e955902a9804a7141edc5727856f622f") setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440)=[@window={0x3, 0x40, 0x200}, @window={0x3, 0x5}, @window={0x3, 0xbfc, 0x1}, @sack_perm, @window={0x3, 0xff}, @mss={0x2, 0x200}, @sack_perm, @sack_perm], 0x8) 04:11:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 234.648989] befs: Unrecognized mount option "-.\!(@&" or missing value [ 234.713118] VFS: could not find a valid V7 on loop1. 04:11:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x3, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x8100, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:54 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b41000002", 0x44, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) [ 234.800064] befs: Unrecognized mount option "-.\!(@&" or missing value 04:11:54 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) socket$bt_rfcomm(0x1f, 0x3, 0x3) 04:11:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x20, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x20}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0xfc, r3, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7a}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x518e}]}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x37}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7fffffff}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@private0={0xfc, 0x0, [], 0x1}}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x39c04f34}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2000}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4800}, 0x4080) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 04:11:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x4, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 234.938710] VFS: could not find a valid V7 on loop1. 04:11:54 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) syz_mount_image$adfs(&(0x7f0000000040)='adfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x3, &(0x7f00000000c0)=[{&(0x7f0000000200)="5ffad75f18d51c19cc598ce28b8d4e8a132491a8e675b8a133f7619a18ffd570a6b8d8d7037f0e4d4035a486b856ec3bccf3141a7a61d3936375691b502242c1fa3b45790d9cdf0d4284bfcab07b0b5b85bf5dc8298478e067a61487421f51c21cc0129dd9b889fcf849ce2d54bbaaf6717404040536a05ebbe1bca5978d0e2dcb60ccfb2a2e1fdb250d9cce0c596eabdd3a1db6f4f31d8eaef7a0493d1ed9fd64b7b4249e2cdafd41", 0xa9, 0x92f}, {&(0x7f00000002c0)="a72ae04252a111b07264cea33cd8d32ace4821eb90ede8f9b214cfe51b194acb580b9624898028aec7240f53104c98e3208dc0b42b95aa0ba63c9a3fb37511adc695ed0d1786617ebf0610b8cab5a8ca977e4f23aafe6e9c6103f89eced9e94112ba7560320389540ef401717b9e0562e024b004f6a1fe1fa8379ef40a2ef33b5d88e5102d54f79d80d9d2bec111bafaaf7d6b55178c8d6d0ecaf1b9b95ab17c4ac73f74180f44a61216dd7587346d346e29da270e574b73b608d2c13d738a48909664ddfec370f5ddd766f30a386a0a42bd9d71671b5a6b27dd6259e8c38f391512", 0xe2, 0x4}, {&(0x7f00000003c0)="13f9518535df171447a1301c3ef9f02a1692c54689147bd1b50525b7ec5f48d34564e28574d6e0198bd63995d4cdcadc7c5be073414847858fc20d798a9ce1347c885db2b9dde7c9b48fa60dde115247cccb2471eda4c0698ff0f095de3ed06989b4398a0dcb38e8a5e4a72e329822744b5f0363a4eab0b055987b36023c0152b72a84992eb1100d32fac05951ccdddf8f1513771114fa714892c0412977b668739d9c012563811c691afb91f590dfc98b73e3d1835c301df2e361c4e367694f80fa9b18b331109520e35840719c2731a0656788acc5161ae4e27b5b06b9e6", 0xdf, 0x4a}], 0x0, &(0x7f00000004c0)={[{'\x00\x04\x00'}, {'\x00\x04\x00'}], [{@smackfshat={'smackfshat', 0x3d, '\x00\x04\x00'}}, {@fsmagic={'fsmagic'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@dont_appraise='dont_appraise'}]}) 04:11:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0xf, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xf000, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:54 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b41000002", 0x44, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) 04:11:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="b700000003000000bfa30000000000000703000020feffff720af0fff8ffffff71a4f0ff000000003f040000000000002d400500000000004704000001ed000062030000000000001d440000000000007a0a00fe00ffffffc303000000000000b5000000000000009500000000000000023bc065b78111c6dfa041b63af4a3912435f1a864a710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c5181554a090f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fee5bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e654400e2438ec649dc74a28610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f75dd08d123deda88c658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdfd1f5089048ddff6da40f9411fe7226a40409d6e37c4f46756d31cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10746443d64364f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b98fb6853ab39a21514da60d2ae20cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d71cde2c140952f9a0f0bc6980fe78683ac5c0c31032599ddd71063be9261b2e1aab1675b34a22048ef8c126aeef5f510a8f1aded94a129e4aec6f8d9ab06faffc3a15d96c2ea3e2e04cfe031b2875353193f82ade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343ce3c953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2960242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44022a579dfc0229cc0dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed82641605000000070000009c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24d47afce829ba0f85da6d888f18ea40ab959f6074ab2a40d85d15017ab513cdc6c0e57fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0c1e02b6e4114f244a9bf93f04bf072f0861f7580e69db384ac7eeedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba34015ea5aacb1188883ad2a3b1832371fe5bc621426d1ed0a4a99702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b727f27feeb744ddcc536cbae315c7d951680f6f2f9a6a8346962a350845ffa0d829e4f79adc287906943408e6df3c391e97ba48db00cadbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a9037d2283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738012e4fee18a22da19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f62e96753b639a924599c1f69219927ea5301fff0a6063d427f0688430754c02180d61542c2571f983e96735600000000000000000554f327a353511ccedde99493c31ac05a7b57f03ca91a01ba2e30ca99e8ebc15ecb4d91675767999d146aef7799738b292fd64bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a7bce14c6de4e7c0660d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b91b7d120617d12d91db2633d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e1661261173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ec86a4555d89fe0120f64c62e8e3ed8bcb45202c3d4bbec8d722824c0ebca8db1ea4a003d2fbdc1f9be78537756ab5bbe4fe9af5d785d0128171c90d9900ce2532b0f9d01c4b45294fbba468df3e1b393cb4e62e754598e47df6bd06431c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd849904568916694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a8811922929e085392ab3d1311b8243266d87047f601fa88a059bb26cea52baf3e110e9c818c1a6652844aa8f8136f733f765384d3b815eef18e72d589636a7919a67252d3303f56e1a5afa1a9f51a619785d4b65d89bf4232093f80deaf7acb108b8bf88876f79af9c6db3118d6da70cf990975a526f226793452072860e13e00f05d1d81cc0cdf3ccc2e6280fc91172b8f3806b83dc393fab5f0c3fb2b123903718a7b650e66ec2a56722f4c378f497187f0b8c2d48c0c6f668e7edde4a47dfe5da7095ab16c97972377b6cbfea8e3f19de91f65f321b18f3736a8413ff5e0dc76047c0f6a086651d375cf7d70ee273d16a5cd8c76deef4257255b2b0cbd6b42466c511fea8d3e544e4faf5b10dc86efb3"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x20, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x20}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0xfc, r3, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7a}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x518e}]}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x37}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7fffffff}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@private0={0xfc, 0x0, [], 0x1}}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x39c04f34}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2000}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4800}, 0x4080) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 04:11:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 235.117614] VPS: Can't find an adfs filesystem on dev loop3. 04:11:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x5, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 235.169191] VFS: could not find a valid V7 on loop1. 04:11:54 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xf0ffff, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:55 executing program 5: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_elf32(r1, &(0x7f0000000280)=ANY=[], 0x14) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f00000000c0)) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$sock_int(r3, 0x1, 0x29, &(0x7f0000000100)=0x100, 0x4) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:11:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x2, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:55 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vcsu(&(0x7f0000000240)='/dev/vcsu#\x00', 0x7, 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="0000030000000800010000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x2000a845}, 0x40019) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={&(0x7f0000000180)=""/143, 0x8f}}, 0x10) r1 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r2, 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000080)={0x34, 0x0, &(0x7f0000000040)}) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r3, 0x0, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/btrfs-control\x00', 0x1c5400, 0x0) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000400)='l2tp\x00') socket$inet6_dccp(0xa, 0x6, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="01002abd7000fcdbdf25040000000500140003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x400800d0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000580)=0xd00, 0x4) r6 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r6, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f00000005c0), &(0x7f0000000540)=0x4) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:55 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273ee", 0x46, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) 04:11:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x6, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:55 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r2, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT=r2], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:55 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) getresuid(&(0x7f00000001c0)=0x0, &(0x7f00000000c0), &(0x7f0000000180)) r3 = socket$unix(0x1, 0x2, 0x0) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x9, 0x410901) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r5) syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="616e63686f723d30303030303030303030307e3381ea50d03ed79fa4377475f81b3f3030303030303030332c6e6f7374726963742c756d61736b3d30303030303030303030303030303030303030303030312c6769643d666f726765742c696f636861727365743d6d61636761656c69632c62733d3030303030303030303030303030d1c06fb9fa2d2ef2", @ANYRESDEC=r0, @ANYRES64=r4, @ANYRESDEC=r2, @ANYBLOB=',fsuuid=d4fd5b77-422d-\x00gf8-90d0-113b88e5,euid=', @ANYRESDEC=r5, @ANYRES64=r1]) 04:11:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x4, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x1000000, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 235.477853] VFS: could not find a valid V7 on loop1. 04:11:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x7, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:55 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000040)={{0x4, 0x9ca, 0xc0, 0x9}, 'syz1\x00', 0x17}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a89710080111000000090000f8ffffffffffffff03060000000000000d60395a7088d7c27f000000a10100877dcc87cf2c3e06000047d100020000000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:55 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273ee", 0x46, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) 04:11:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x5, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:55 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) sendto$rose(0xffffffffffffffff, &(0x7f0000000180)="6be25aa6a8e5f107ed579525a56f9e687b95fa9b92d20b283c88979dd124b86e461a47ac39ff6e04b576f023abe543d389e1b61d33b0c616926f7a3b6f3cd4cba022b841ed37cab3444f64a92e010688753881d4a7a59727268c02dc2f27bcd71f33f83c605bff9b967953bbec3ee7dc08e6bf2a2e24861a5762fc1a2a6f1e44b140a3a57b892849911f6a6724fefe6399ec0c8ae22a6515d290", 0x9a, 0x804, &(0x7f0000000100)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000100b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1", @ANYRES16, @ANYRESDEC=0x0, @ANYRESOCT], 0xd8) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000)={0x0, 0x6}, 0x8) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000280)=@gcm_256={{0x303}, "85f4e248b7b02a8c", "1bdc15475a8be26e7d9571d5641fee0c10c24c404bef2e2285033ff206752a18", "c0aca2e0", "e7db61673627db55"}, 0x38) 04:11:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x2000000, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 235.663523] VFS: could not find a valid V7 on loop1. [ 235.666266] UDF-fs: bad mount option "anchor=00000000000~3êPÐ>ן¤7tuø?000000003" or missing value 04:11:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x8, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x6, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:55 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273ee", 0x46, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) 04:11:55 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000040)={{0x4, 0x9ca, 0xc0, 0x9}, 'syz1\x00', 0x17}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a89710080111000000090000f8ffffffffffffff03060000000000000d60395a7088d7c27f000000a10100877dcc87cf2c3e06000047d100020000000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x3000000, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x7, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:55 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000040)={{0x4, 0x9ca, 0xc0, 0x9}, 'syz1\x00', 0x17}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a89710080111000000090000f8ffffffffffffff03060000000000000d60395a7088d7c27f000000a10100877dcc87cf2c3e06000047d100020000000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:55 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="01000000000000000000030000000800090002000000080011"], 0x24}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r6, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r6, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x9, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 235.913507] VFS: could not find a valid V7 on loop1. 04:11:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x8, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:55 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3", 0x47, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) 04:11:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0xa, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x4000000, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:55 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000040)={{0x4, 0x9ca, 0xc0, 0x9}, 'syz1\x00', 0x17}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a89710080111000000090000f8ffffffffffffff03060000000000000d60395a7088d7c27f000000a10100877dcc87cf2c3e06000047d100020000000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0xa, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0xb, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:55 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000040)={{0x4, 0x9ca, 0xc0, 0x9}, 'syz1\x00', 0x17}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 236.214039] VFS: could not find a valid V7 on loop1. 04:11:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x6000000, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0xf, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:56 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3", 0x47, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) 04:11:56 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000040)={{0x4, 0x9ca, 0xc0, 0x9}, 'syz1\x00', 0x17}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0xc, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:56 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000040)={{0x4, 0x9ca, 0xc0, 0x9}, 'syz1\x00', 0x17}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 236.441103] VFS: could not find a valid V7 on loop1. 04:11:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x8000000, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:56 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3", 0x47, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) 04:11:56 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000040)={{0x4, 0x9ca, 0xc0, 0x9}, 'syz1\x00', 0x17}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a89710080111000000090000f8ffffffffffffff03060000000000000d60395a7088d7c27f000000a10100877dcc87cf2c3e06000047d100020000000000"], 0xd8) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:56 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r3 = socket$phonet(0x23, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_KEY(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x30, r2, 0x901, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEL_TX_TS(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r2, 0x10, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_TSID={0x5, 0xd2, 0xe}, @NL80211_ATTR_MAC={0xa}]}, 0x30}, 0x1, 0x0, 0x0, 0x44040}, 0x8008081) r6 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r6, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"/298], 0xd8) execveat(r6, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000040)={{0x76, 0x2}, {0xae, 0x6}, 0x2eb, 0x2, 0x1}) 04:11:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x2, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0xd, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:56 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000040)={{0x4, 0x9ca, 0xc0, 0x9}, 'syz1\x00', 0x17}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a89710080111000000090000f8ffffffffffffff03060000000000000d60395a7088d7c27f000000a10100877dcc87cf2c3e06000047d100020000000000"], 0xd8) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xa000000, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 236.697812] VFS: could not find a valid V7 on loop1. 04:11:56 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c466000002ed8e4f95165ce27b90300060000000000000000b738000000000035ff03000000000000000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:56 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000040)={{0x4, 0x9ca, 0xc0, 0x9}, 'syz1\x00', 0x17}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a89710080111000000090000f8ffffffffffffff03060000000000000d60395a7088d7c27f000000a10100877dcc87cf2c3e06000047d100020000000000"], 0xd8) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x4, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:56 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) 04:11:56 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b903080600e3000000c8cb4e3504bd4a82000035f4c38422a3bc82200005000000e9bad7ff070000a897ff080011000000090000f8ffff04000000ff03000000000000000d60395a7088d7c27f000000a1010041007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xc000000, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:56 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000040)={{0x4, 0x9ca, 0xc0, 0x9}, 'syz1\x00', 0x17}) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a89710080111000000090000f8ffffffffffffff03060000000000000d60395a7088d7c27f000000a10100877dcc87cf2c3e06000047d100020000000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0xe, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 236.988111] VFS: could not find a valid V7 on loop1. 04:11:56 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000040)) 04:11:56 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000040)={{0x4, 0x9ca, 0xc0, 0x9}, 'syz1\x00', 0x17}) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a89710080111000000090000f8ffffffffffffff03060000000000000d60395a7088d7c27f000000a10100877dcc87cf2c3e06000047d100020000000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x5, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0xf, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:56 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) 04:11:56 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) ioctl$USBDEVFS_CLEAR_HALT(0xffffffffffffffff, 0x80045515, &(0x7f0000000040)={0x4}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xe000000, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x6, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:56 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000040)={{0x4, 0x9ca, 0xc0, 0x9}, 'syz1\x00', 0x17}) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a89710080111000000090000f8ffffffffffffff03060000000000000d60395a7088d7c27f000000a10100877dcc87cf2c3e06000047d100020000000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:57 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000100)='\x00\x04\x00\x01', 0x6) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0xd8) execveat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x1000) getpid() r1 = socket$caif_seqpacket(0x25, 0x5, 0x4) ioctl$BTRFS_IOC_SEND(r1, 0x40489426, &(0x7f0000000080)={{r0}, 0x3, &(0x7f0000000000)=[0x400, 0x1, 0x7f], 0x88, 0x7, [0x6, 0x0, 0x63]}) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r2, 0x0, 0x0) ioctl$SIOCX25SENDCALLACCPT(r2, 0x89e9) [ 237.307042] VFS: could not find a valid V7 on loop1. 04:11:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xf000000, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:57 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a89710080111000000090000f8ffffffffffffff03060000000000000d60395a7088d7c27f000000a10100877dcc87cf2c3e06000047d100020000000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x10, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x7, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:57 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) 04:11:57 executing program 5: r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a89710080111000000090000f8ffffffffffffff03060000000000000d60395a7088d7c27f000000a10100877dcc87cf2c3e06000047d100020000000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:57 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0xd8) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x400000, 0x0) execveat(r2, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000) 04:11:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x10000000, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x8, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 237.565345] VFS: could not find a valid V7 on loop1. 04:11:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x11, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:57 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, 0x0) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) 04:11:57 executing program 5: r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a89710080111000000090000f8ffffffffffffff03060000000000000d60395a7088d7c27f000000a10100877dcc87cf2c3e06000047d100020000000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:57 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYRESOCT=r1], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0xa, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x40000000, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x12, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:57 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0xf, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:57 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, 0x0) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) 04:11:57 executing program 5: r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a89710080111000000090000f8ffffffffffffff03060000000000000d60395a7088d7c27f000000a10100877dcc87cf2c3e06000047d100020000000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x10, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x54010000, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x13, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:57 executing program 3: clone(0x20800017fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:57 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, 0x0) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) 04:11:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x1e, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:57 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a89710080111000000090000f8ffffffffffffff03060000000000000d60395a7088d7c27f000000a10100877dcc87cf2c3e06000047d100020000000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x14, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x60000000, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x33, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:58 executing program 1: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) 04:11:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x15, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:58 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a89710080111000000090000f8ffffffffffffff03060000000000000d60395a7088d7c27f000000a10100877dcc87cf2c3e06000047d100020000000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x65580000, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x8c, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 238.484718] VFS: Found a V7 FS (block size = 512) on device loop1 04:11:58 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r0, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r2, 0x0, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f00000000c0), &(0x7f0000000100)=0xffffffffffffffbb) r3 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) setregid(0x0, r4) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)={{0x2, 0xee01, 0xffffffffffffffff, 0xee01, r4, 0x10, 0x5b7d}, 0x20, 0x6, 0x0, 0x0, 0x0, 0x0, 0xfff}) write$binfmt_elf32(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96754ce27b90300060000000000230000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff072f20ef5cd7992631000000092000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea8b3d368ab9a990900000047d1bc8a1e4b63e030f9b2189f89517c622d4953"], 0xd8) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:58 executing program 1: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) [ 238.580179] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:11:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x16, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:58 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a89710080111000000090000f8ffffffffffffff03060000000000000d60395a7088d7c27f000000a10100877dcc87cf2c3e06000047d100020000000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x500, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:58 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) getpeername$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @remote}, &(0x7f0000000340)=0x10) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)=@deltaction={0x11c, 0x31, 0x20, 0x70bd29, 0x25dfdbff, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1a, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}]}, @TCA_ACT_TAB={0x34, 0x1, [{0xc, 0x804, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x13, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0x14, 0x5, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}]}, @TCA_ACT_TAB={0x5c, 0x1, [{0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x0, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x1, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0x1f, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}]}, @TCA_ACT_TAB={0x64, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xffffffff}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x60}}, {0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1ff}}, {0x10, 0xf, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0x10, 0x7, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0x10, 0x18, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000380)) 04:11:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x81000000, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x600, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 238.757006] VFS: Found a V7 FS (block size = 512) on device loop1 04:11:58 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x14002, 0x0) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x1d, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:58 executing program 1: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000180)) 04:11:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x88a8ffff, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 238.855623] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:11:58 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a89710080111000000090000f8ffffffffffffff03060000000000000d60395a7088d7c27f000000a10100877dcc87cf2c3e06000047d100020000000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x700, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x2d, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:58 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a89710080111000000090000f8ffffffffffffff03060000000000000d60395a7088d7c27f000000a10100877dcc87cf2c3e06000047d100020000000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x9effffff, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:58 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x480880, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x200, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000000)="03", 0x1, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000900)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f0000000940)={0x12a0, 0x0, 0x8, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_FRAME={0x1280, 0x33, @data_frame={@qos_ht={{{@type10={{0x0, 0x2, 0xf, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1}, {0xf93}, @initial, @broadcast, @device_a, {0x3, 0x1}}, {0x4, 0x0, 0x1, 0x0, 0x1f}}, {@type10={{0x0, 0x2, 0xb, 0x1, 0x0, 0x1, 0x1}, {}, @from_mac=@broadcast, @broadcast, @from_mac, {0x9, 0x60}}, {0xc, 0x1, 0x0, 0x1, 0xb0}}}, @ver_80211n={0x0, 0x20, 0x1, 0x1, 0x0, 0x3}}, @a_msdu=[{@device_a, @device_a, 0x96, "4fc0c5f83fdf800385b90679e11ac604b89648d84c8bd871a52580db930da1a0729672a944bdcecd477e449eaf05ff4b586d9a7a5b165da50c4ef5d9d9ed14a154614928eed798bd5d67df4fb2f7bf0c67542f6ac64979563cbccfbd7ea2a1f83b24c1f2db1b445fc406fdacb991ea892cc7eb888c2f5ce1d4e59f91e31cb85e6d05fe3d9e0d88c8bf25149e16359e8e47969646c356"}, {@broadcast, @device_a, 0xcc, "4d35960afd72eccf3212e8adc02f319c60e22d8d66fdffec76f2c52351ed665bf3b91b6f79073eb3f97ae41c8793d19ac996681322cb1c3fecb2f667739f4df0d5fb6f902e397cd8363a4ef1942bfb088f4a60fae05b098e18dce9755973995fa59f13bfc56fef07dbd03d9d49923f6fc16b091e208d47c046db251673a48001dd54857a681e0ce2f5c6543c06b5e4bef97c5a017da68ed528632043621cee23160d4a5b2332ca972b1687ce961250538b579c5979fb09f9759ec7765180280c377a33bad5395e824086df77"}, {@broadcast, @broadcast, 0xa3, "8eeb074842e80c0ceb92bc88154dbf8972b8bbf84dc9d3531f9eba2fdf9339c7d7ee55692360ff82c79fc7ba2a8848300a9c12f58958d05dd1573a20a29483eaa2a24765f795eacbd937853032a2f07332b45d1d451dfb5f93c4b8bccabd8dcded8911559ecec3afa4cf591d889cab0c22885de6fce7ea64b64385de7ac4a369e64714442972227cb5b07c1ddbdde1c782938e891b8c81dc2cd99abd8fd329845b2d28"}, {@device_b, @device_b, 0x1000, "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"}]}}]}, 0x12a0}, 0x1, 0x0, 0x0, 0x40}, 0x4) keyctl$dh_compute(0x17, &(0x7f0000000300)={r2, r5, r4}, &(0x7f0000000540)=""/230, 0xe8, &(0x7f0000000140)={&(0x7f0000000240)={'sha224-generic\x00'}, 0x0, 0xfffffffffffffe66}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r4, 0xb0, 0x44}, &(0x7f0000000400)=ANY=[@ANYBLOB="656e633d72617720686173683d7374726565626f673531322d677ab4767e8d25db656e6572696300"/84], &(0x7f0000000280)="dc18fa15417184b7c6648035fbe71c1b7851f69b97c8be72f3d950b7cbf18724cc5dcf1c8af795bf88af6c2891dc97e9e741637bad1e935f11fd08c5d17f1e18c32908b9a7937e07260448aca0d532dbb3c4597fee0691051fab216567ee0dc92342173b1eda08e67191313ce87e0fe15cc3e1b19682ad44e0516913cccc681508ac016169e4167aaad1388e43a9167aee8397dba8eeba59bfa2d20eac5ef181cda087f642021276f73a34c916ff82b6", &(0x7f0000000340)=""/68) r6 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r6, 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000080)={0x8000, 0x4, 0x4, 0x4, 0x7ff, {}, {0x3, 0x1, 0x6, 0x59, 0x1f, 0x2, "bc1244c5"}, 0x5, 0x1, @offset=0x10001, 0x100, 0x0, r6}) mmap$usbfs(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10010, r0, 0x3) r7 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r7, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r7, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r8 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r8) [ 239.040448] VFS: Found a V7 FS (block size = 512) on device loop1 04:11:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0xa00, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:58 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, 0x0, 0x2000, 0x0, &(0x7f0000000180)) 04:11:58 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x04', 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b903000600c325e312000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03020000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d10ffca537aae2244ee67b82372b43fa12b105adce48db403d9ee1acbd980cd5c5c78347c9f1b37538a96128f2634141f4fde1773f41b4b6495633aab5785fb530270395051ea39cf28a4260437d016d444e0ef2ef43c42569c1278c4477f699e399"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x80, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_SETPF(r1, 0x7a9, &(0x7f0000000080)={{@hyper, 0x101}, 0x200, 0x3cc8, 0x5, 0x6, 0x1000, 0x8, 0x4a, 0x3}) [ 239.127963] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:11:58 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a89710080111000000090000f8ffffffffffffff03060000000000000d60395a7088d7c27f000000a10100877dcc87cf2c3e06000047d100020000000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x5a, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0xf00, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:59 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)='\xde\x04\x00\x00\xc3\x93%k]\x9d_\x13\"&tv\xa7|\xb6\x84\x1d\xf1\xecJ\x87\xd0\x85{\xb2\xd4\xaf\xeaw\x83\x02\xbb\xf1\x81\x81\xde\xdf%\xe8\xf6\x1aC\xf0\\p\xbbh\xd3\x86yk\x9a\x16\xb9`\xf8w\xa6\xd2\xd1`\xcaEG\x8fd\x8fUph\fE\x98Tx\xf0\xe0\xc9\xfe\xeb\x9fR\xf5\x16\xba\xe0s\x17\x13L\x8f0Qlt\xeaH\xba\x12\xc3xC\xe7\b\xb9\xa7r\x06[\xf0\"\'\xf9\x98\x0e\x8f\x13\xe45-<\xd8K/O\x9a\x98\x94\xfb\xb2\xe4\xad\xcf\x9c\x1c\x90fM\x17\xee\xff\x02/V\xe1\xa4\xe4\x90\xd1_\xbf\x04\x95q\x9d\xfcY\arl\xa8d\x86&[\xc3\x01\x00\x00\x003\xac\xee\xfd\xd8JfJ7E\xa7D\x82\xee\x15\x00'/206, 0x4) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYRES32=r0], 0xd8) execveat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x1000) [ 239.269143] VFS: Found a V7 FS (block size = 512) on device loop1 04:11:59 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, 0x0, 0x2000, 0x0, &(0x7f0000000180)) 04:11:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xc3ffffff, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 239.335044] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:11:59 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a89710080111000000090000f8ffffffffffffff03060000000000000d60395a7088d7c27f000000a10100877dcc87cf2c3e06000047d100020000000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:59 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x34) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x1e00, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:59 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a89710080111000000090000f8ffffffffffffff03060000000000000d60395a7088d7c27f000000a10100877dcc87cf2c3e06000047d100020000000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xf0ffffff, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 239.484910] VFS: Found a V7 FS (block size = 512) on device loop1 04:11:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x2000, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:59 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, 0x0, 0x2000, 0x0, &(0x7f0000000180)) 04:11:59 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a89710080111000000090000f8ffffffffffffff03060000000000000d60395a7088d7c27f000000a10100877dcc87cf2c3e06000047d100020000000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 239.596788] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:11:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x3, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xfcffffff, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x3300, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:59 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)=0xc0240) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000080000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27fe7ff00a1010001007ea85ca6574c9a990900000047d15ec1f96b6ae4270b384643f38eb7740694768d0c8f69164306e10f0d88a04bdad66c29aa1c2b", @ANYRES16=r1], 0xd8) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r2, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2c, r4, 0x13, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}]}]}]}, 0x2c}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x1b4, r4, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9a}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}]}, @TIPC_NLA_LINK={0x48, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffb}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}]}, @TIPC_NLA_NODE={0x114, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ID={0xf5, 0x3, "af64990274e7b33175e449c4d7a3c929a666316a3824330c469c10997d764197b33ae782ea045231fff6096cc93cd4a0a21b20e834e42e8325dda059d7bf18f8d4682eb68db5a1247b5ff64389cd0cb91a3322c20d2f9affe4bb2b4565983acd72149d4221f323b711aea92439c936dbcfc2348964528695fe3136225e85bc2784dd4f720464eee20c513dc2aeb0a0a5624a28bfbcd287f4dae63cf0a000dc402c8d1ab0ac6b7cdb3e121f3919eff0b19dcb71c506e25239697a87efae439b62d82470cb1c5be52e0d08116fd7a2e1dbbd091b22f282ac518a7de689044aeb11c6217aeec4465abd23887bbffbfd80a773"}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x40}, 0x40) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:59 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 239.765515] VFS: Found a V7 FS (block size = 512) on device loop1 04:11:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xfeffffff, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:11:59 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) 04:11:59 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x3f00, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:59 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990908000047d17946cfa52178574a8a75da3b2594d38b1ca2a1b0218c5a60a7b6c12f6e260a0e6199ebe624dbd5e8cd5b10c6b7a04bb9b21b5aef9c4ba92279f861bec0aa959191ed"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:59 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 239.888292] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:11:59 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x4000, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x5, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xffffa888, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 240.037273] VFS: Found a V7 FS (block size = 512) on device loop1 04:11:59 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 04:11:59 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) 04:11:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x8c00, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:11:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x6, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:11:59 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:11:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xfffff000, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 240.177943] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:11:59 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000000004e9bad7ff070000a897ff080011ffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1000000000000000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0xff00, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:00 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 240.287859] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:00 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x64010101, 0x1}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300010000000000500004e9bad7ff070000a897fff51411000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f00000000010001007ea85ca6574c9a990900000047d1abe5213be481159d67490419157ef1378a08af0afd8e13b2d1da4bd3d6c94f187ea914f11bd55654b72d7976a6d058b790beec88c298169e161939e3fe8601f8752cb14f742f58ce6b93c7486eb24bc1481a2d939e0f596be40cb7c667c792e972167d9804e2e87d3880199bb8ab672497b9c4b2e8452e4610fa7be627415321991928a84c"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f0000000080)={0x1fe, 0x0, &(0x7f0000ffb000/0x2000)=nil}) 04:12:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xffffff7f, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x7, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:00 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 240.408974] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:00 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:00 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a10100015ca6574c9a990900000047d1000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = syz_mount_image$romfs(&(0x7f00000000c0)='romfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000001200)=[{&(0x7f0000000200)="bceed5e44b991a32f73dd518d17fef2b042bfcce2db00ccaa85507d8bc0eb74d4bfc5ccfc530affb7910538fe8ac928cf775f523fc124d89df04ca60111b7a78ef95793d01600b8ba4ef02d3575af4af59ac6939d95477708d314d22486d496a0b002099484357ef112266497cc690ba0492817a0c698f4316bd3cd0a07892818329cc5ede83f5431b7a7cd2a4213dd932c03518d390bf66f20e3d70f0f086ee78f40e9e31726573c1207412490f76d61a3446d370ed6ad86657645fdcf3f4f79730c4fda66025f0ce55ede706ae3663ab8eb9d0651c2b11c9d8d3b8989e34faa3ebfe2541fcca120505e99620e7bb34583a92bc1f85270485402c1b29980531797f2d34c0b52ecbfe666282efc63cc88fa1d45cecca47529280ce4f901a3b04495df6879e3845e101702c6d21f498a6d301dfc93747ade2549fa229a1e92e88fefdcd65df8a6f8d452bbfb8e39c8b265d10d05ebf17fe72d5a909185148917fb709b766c8ec06494ad90423ec9786c7141ff23b6e9e970e1c8a980c1ad57e4078f11a43122207a55d4fa03a56a17107ae3478418d3651613dc528443e57a8876c488d8c8ec2000af9ffb49803b839f5a0c3b656b95e0503831a8c591e01d5de9ead1eb8eaee866ebb4fd49de0f58eada3ff555cb76a130d35fd9bfee282945ea4ffb052e98ec477f287a9233e6e118328d26e08de6b0e17b2c075f2bc792ee264c17b844f33b504eb2a374a04dd2204189a7e6a7b1b7095c558356f7006f672f9af7f25199eb8ad322f246ff4d5dc5b808b1cdeeff85ea6fa0e6502e9fe7d687ab36efd52f6f49b0ec88839addce191554805f845bad47d77e95df955d0f7471433f41cf7da4af5afaac2db98417395aab3d8e517d4b6af9e52b1c132a4e5d1c470efb76b1e9a101e6f1a81b8ac6275b66e1417565face6aa27b0b256d11a609c27727aa299c2f65040987f9e32060234d58166e005338d3c4722fd064c2244f6c15cff9a114e1726e964091faebbda7020272a217a319c2bf71f7515727712d6705d33dfadad2e87b2cf3f1f1f5bc61fd91783e3a8f4b78630f79a14c55c897737719f7b44dfd03726d3bf01334f4916aa94ec72ba0c1b5c4f8a133df8d5ba35dc9824cba00b3eeab33f3c1da76aa201b27fe44144af818506e8bd0e29cf80467fb05ddaba0a64abe3a586e9a533d6a20d6f8e827afa7adc3ae3b1d2b30d5b11827cc5ae7386d3e4d96c4cc0919887e9e990e1e73f2cdc767df952f6d445bdf3a03b761d5db5b820cabfd3b5ca4ab8d3a33a26ff1801efb0c099bb6ae735617283d3f4a1c5ecf11269df934fe1f878716d863291a00b979f5a59eac730b1be0beb3c4953e74f7d66416b0e958c133664e8fdcb9d321f6aa2bff67ede9def34cb8a643a4d291f8feccc317617877a25474fb1eb6a310eebf4aff60d96c7a6c80eac66a546e3b2eeb63bc8fb524dbbfd4d2e8e2bfe814862ebc37ff1c0d612eef734627fdaf829c76a31ec6a09cca679b98a394f8fdead413c85b121beb2050ea1b105697306bca2092f2a262b20acf852b4888fc9e9d1bd2421d562ff188798971e91bfc2377fe6a51385e88ff4b725f690edf7e11e094c2b1948dd52b7049236690fa97f9fec5e0b9aedee28d22fc6490f7e2b6e7c03b0c786cca9d23332c46c41a18c1cf3b40fb839fa47984c798aa9787b19ae764364db6f63356346290cab66897e0cdb96bb426136f12b3bc65c72e3d0541e0997edd018029db27a5dd7a753a068e938433ddabd40af2b4113a5a2e0a2ba99f90fcab79c7f874731e8174db9ca53842d285f2b8d2e95409dc9db9e901246ab7971ee35d838cf477592b1beaa2d283c4c986e4c4fcc9fa07cb0820e1e5f84f90c9455be8aa602dd81de7de917bd18fd3d0c35f30bc4d1401a7824e8b935e81167bd43d301c93eec87aa242fc45404d3a8b909e4f8e0d7954f629d422b0a0379ce53db352f27c3e065aeed028eb4b898ec5df3ff6b556684bd590645b64d51ed2f217265f358fc17f7527646f96d59e679e0af936c0db64e0509d5d1dcd02307176e914a9cebccfaa5a88a0d253e298d354a273d48bb24c7fcce13f63b4770bd38b70c393cb42cc571f9b9fcad5aeeb1d4c2b7b790ebb767fd33317be1799f81ea27f4fe7379ab9760a2862976d4437f86eb22339730ce693fa95984d4eb5bf490c5c7ba8477f6c5f15cd5c6dada652efaf7d72fa0e7cd5b5bacf699bb75cb5b5cb73b2e43cdab3d8fb07b0d7259adad199c8121f000be8a58a625cc9b02284a0b2801e5e9195b98e7e287d14e5e7bcbc455747e9cfc1c8ca784f752bdf052851b0ba4cd63e9a1ada73e59d2a5abe5fba296be0d229a318f86de68773bdd4496462e9978b18c14188acbfab74a1fc157aad12aa18f1a831cc3f0a52bce893642b73605d168cf0cced59da0f4639b925b86fd13a4cf847ac0b1cb9e1afb1d1f489681754186250edbcb8f057c05e5c710aa97c3a7272addfff53742c87bd9c96ab5848a3e8439bdea9ac29f731d6e969336fae02df9bb11f710eb4bfea49083bac3ebc79297cc9415924c55c00e52f7378a4b0729f076a3328b4dceb9972ff96fc5e7c7f0323d9a47b93353493a245e039e9a92f96ef2f8ed5034535caf2df3a6bde3531ea17848ef726ff4de97ef8755726b548e137e59f962c38018e49409f43cb38b4db76b44921f5842a180e62c9f1e8a58f49a03891d5e2a4c78312aa4f290f75548b32577b26d03c87f3554db81a37b21a53d82cd2e91afb3b3ec32312815eda42b6bce060ac6e71f6a7fd35ddffbc11afdb13f655c3173e0ccfe661461ae613342cc9265e06f9fcd2ccfb3b60ba58980e097ecaacb34d1d4bbc956d3f6311cfcb6ff2341d4526b7d3c35d4bf424b6417f74b3b87c3f46f937b434075ad02c7447c18c5b5b79f9af8713cce1db804eb280f4ebc9390e3a54391087f1030ef968544de1d3c142b444a7c1385e0cd327d9f57dbe9a5977beaaf35c3daa6492b929805721a89598fd75dca31f3ad7992e017ea4e6fe18799ccf4c8caf3e3171a3a25d9050a444a5537895bf349c204ec14e32b3484c69f3e15f2fe164c41895759b99bc2464019ceda37bfd1ded7bd8e1219464872afd05992d063825d9fe6a9a4600bbe981bb5111980011267fdf57e896c4027885bae8fbe3add5ad25879eba08e7ee753ed0d9a8a458577e462b7f76d6e56ddfe22ebbfd816090a134afc393e02316dac0534972f891edb8bae7dc85bbe8cd1824005c5f7974cc56c167779503580c6580a5d609563f716d59cfbab156c1400938667823db5f38f5b16b3397a2dae355d975f1fe8214876cf8fbac7b23eac6ebb1c314b6d0dc655dcf09652bcbb249199d43f591a5dcca3596ddc440bc091c184119a44dbd5025ab5ad70655973aeb7e28474d4ee8c031ac22a6d632264154fa93ccf9824f0218aecb988ecb3041569cecc7fd3915f2c227550e023e953288eba33914e2236e6ecc48595a1e230babe9061223f4d71685209b31151fe33748a17927d78913164961c5c3aa80ad723ab6b1a7a06d25fbbc3877276034394288271714c37e70377af1cd7f3af4db5227b55b08fef87574c5de594ee785be33fb43ada96e34ae375510cb3c36b6c87295ad88d07ede462161f224b1238944ee7c02bb43bd04161625e2b364a5ddf5838a76573f6064f6a84a74567bc3dba5ac49bdf29cc30f4a4eb9f49c5c1d7c3693ed0b0906e9dc9a9439a141f3cfb6ab40660185cc9aeed96a10d190770a38988d857763bb1343d4c11d1786db25b8d69c16b4a73671a188094822af21904e86643328bbe6714e3a004a76bbaec058b0be0ff0e66476a82c72207c8bf7c72bcefc5421814c268aced67da9a3e1875b8cd7e29a018fbee34163c5b3620cd4c77d7397ece62e8b502ec24ae5920484e8b350ba8720b5890f9d076070510c9d0bddf576fc38a3f266ea7d45687d96605c893fe952b250922c0ebdaaafccc3e93d966a2d8cff0ecaf634cf6dd4f01324dd7adafb1b6861dc527c2bce9779c36b3c713353bae384fc616c6d947c1e32eb8cc353536c95132ce1c587498f242a1fb40ecc870a013c0fcb9137f764dc78d1c95503ac111b5556634156fafb18c988c31eb7a5e6a75bd5e12e5ac77a914b285109d886cddddbdeeea30dc6de82ca72d883c9e1f02a993503c60f76412e5b9cc4394d5ff4fbc0ad421a9f6e098010ca9c0b09c79d34dc062c84f6a7c74a50388334db04953b2589e3eae481c880aa371e8678461ae15edea7b3730fe85a383efb18d26e2bb9efb0ca623771168e10cfc53a09fda75f2deeaf026f3eb58e533b223e56e11a255d8625d559499dc1d7a483583518ff64d655794283ee35d0e1d3cc64df1b96b4d687de1c8e3123a89aa3d24fb591bcb318def25e386435ceea07a48f095a6acfa6f37c98e76f51eb4927b6eefb18be75941ba2669b65a2ce0bafcdf7fa0034b36f70bdf2f648c2a1132faa4beab134f18a33ac84b3492fbc4c42ddb19aba513a646fec07543d8adf47292dd4845eedfd4e30d596ed821d5a46962884dd77d48cfda87f428ff4029d3bc7d358165858fbd5ad37e65440b00d4fd765dc710b5d69dfcaef8695c8483e4498c100ca5268504e795ea5080c08a3a6531dbaad2ced5152f056a10ba5bf19fa86c56f4c0b2a022b2deadaacbe2cb54e79807349fad41bd5d61b1122dbcaad458efa2e927862665be844fc52f2ed8f4933315b4adf2a8f13b996dd18374042b5b9414ffccc01c53026b6a06763c3382d8367330a3cb2624c186c09beb8c5426be5d5a9f5f5931ec21dedf9ee4fecf84ba5a0e6c84dcb0f17c02a50014b2266b739363815870f337e65a58d50db38d5d5e0aa7537061996cdecbfd8534ac2e32778c4010545ade636c5dc59abc04bbdcac3ec7137f0e4012a20065cd06ca63769fa94e50be779109cb949b749f4d07b7f052cd7042763be4248ee8ee14f69798612e61d7257b2b94fb0e93a5e00599366a592a9978830342f3d1c6c7be68ec3267ee6d79c9d47868666c666174cc41aa6beb002bf30f6faaf7d488a38b63e4d7fea848a4ad73fa011f25b01c8ea261ae5c8b3d52337a397e03fc3398e1b8387b657b9a99165b0795dbb7d19ecf0917881a0c223ae1885e1760a88ee217de1e407f2cd6120a19be050eb1adb387437187d8e242c8b101ae094e7e347338c01b4acdf0de60fb7b291548112be3e471c044a83ae0553bc3bd5cb5c8223be8473d389a8206016e3c92265b03ae83c9919aceacc07cd6b700554e9b36eb3c8fdbb94d571a2e799e666882ccc8691b2833aa1d737f29ef5309ae8815aac3ff00ca5e3ab194117983918fde1fecd91d800fbb5cc63c470d7d39217192bb83d67d8ef90bc848a16f885757e74f4c409ee8930d5695f03b45f611a452f05b9466a29e9ffe28a06c66b083cdc97d7639ccae8b37e14e5b6f59598410f7af178f0ca01187aa3a6c97e278b87f2014ee4db3586cf29ead40266c68eb71379b46c78bfac1a8bff47001e2ec82aa11f60d5259c4e23305d8876076bf4cd61b67bfc4db6f3218c9767bcb694fd7666c8e9e4464a210b4af7ee3a58b52a36d65afb6e2af57e89c1bd8bc39ad155717c0c71fce99781bca166e0eb2aacd956054ad1c9f9a0f1db7592b075fdb2fe8ed762c7ad5cf3b5f6074a86687b2554f58e58471c97ece4e9e1eb1d600815f464194e26d80d1b38e28bc4559e781da1dfd6da91c720ecaaf4233e8064c9c685c9c8ece585540", 0x1000, 0x8}], 0x0, &(0x7f0000001240)={[{'\x00\x04\x00'}], [{@euid_gt={'euid>', 0xee01}}, {@context={'context', 0x3d, 'user_u'}}, {@subj_user={'subj_user', 0x3d, '#'}}, {@hash='hash'}, {@fsname={'fsname'}}, {@dont_appraise='dont_appraise'}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@subj_role={'subj_role', 0x3d, '\x00\x04\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00\x04\x00'}}, {@appraise_type='appraise_type=imasig'}]}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000001300)={0x0, 0x100, 0x6, 0xbdd8, 0x3, [{0x40, 0x1, 0x8, [], 0x2086}, {0x68f, 0x2, 0x4}, {0xffffffff, 0x3c, 0x800, [], 0x2400}]}) ioctl$BTRFS_IOC_SUBVOL_CREATE(r0, 0x5000940e, &(0x7f0000001400)={{r1}, "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"}) clock_gettime(0x4, &(0x7f0000002400)) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') signalfd4(r0, &(0x7f0000000080)={[0x28000]}, 0x8, 0x80000) 04:12:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x6, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x8, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xffffff9e, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:00 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 240.655020] MTD: Attempt to mount non-MTD device "/dev/loop3" [ 240.670161] romfs: VFS: Can't find a romfs filesystem on dev loop3. 04:12:00 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x2001, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) pwritev2(r1, &(0x7f00000005c0)=[{&(0x7f0000000640)="78d588a3550ab30998deba8e4e51b1732c44041f0be4a0f7768b08420555ecc55b864c56860ed76bbbeee31a06eda1a3ccfe5093b8bad1634d66827cb7466653b0142c13ab83c673af0faf26a989536912fc98eb01df541585a6bdcec8f984ff083acb94f2244feecfb50ade7fb6f8eb79e56c63d021ffd0068b529d99b28c9491ef55f13822c8ab5e083caf86dfc62ba21f7df00d6ea41bc1a50eeae998812ead44c85391f1d82f80d69ea71070fd", 0x36}, {&(0x7f00000003c0)="2ad9b2cc69ecaa3a3461bc1f8f07abdbb4d63c4bf75b7e10346220623a77fdd9168ed241fa90d9628de0bf11beb0fb7fef714260d1032bb1fe51d3c685842ef3f97088568ed2964c4df29d1ad08251a42e3fd255ba07de0594eb7dadc07eae1ab00bee5f6abfa76a1b241a5c7a04c32a2df14732800c2de987ccd67742937c06c6e54d0f455181cff84a4d0b5d9a9c529442dc7f49e1c99a8bc58a6d6dc4b305fc564ed6886f9a72e1c6f6fa44d798d17be76f4cc2273ae3139685cb5ab89ab2310a20d79708c422297fe718ca0e", 0x16}, {&(0x7f00000004c0)="319f51509f4b1ea19cc9e5230391f3873627735595e2e808a053ef0484b55b5c83be1bf03f45a9a32f9dc84fb92beb1c2e13c669329c39c8b6251be34c82dbbaca4d050e83f4292397a13d1741223309612e8dfae3a932a916b3e1cb0ae3dbdc53d504c0a7fe9f3b24d9ca6c24694de456965eb8d5526fd7aeec15cfbf8b69649ad0a41b1716acfcbb15711c4feb944ae61a226bc3605eb17657d9a840264027ad1f88a7f004164a3e3f6d818b15a61ef7b3a0cb07efb4953970ab3e07570dddb5c4a4b6ee318a9d7e8f8c3bdd9856d6bd52115eb0751a4ceee85e2bb514ecc9bd353f70d9d236568a702b", 0xeb}, {&(0x7f0000000180)="dba50d7ad649dcff07d28a32a26fda39b230188a594194608063586b5371f4cb6d01cb6c5a95f68debc87a0443e01728aeac539b1bb8ea8915217a2f97fcab24b47e55ed458c1e5437ad01b2fded46f94c88a9c38946fc7aaa9936de1eb4c89c5ce033d1493540c7869fe4f73f4c400301560d1e6e138e84b5af102814da0a29fab4790ffe2ed6687e782fe817e13ff1df69d6b09e55"}, {&(0x7f0000000080)="00e953edad8e5dc10a4990b30bc90362023516b71468d93e27dfcfabf7e8a9a32efd182542435a6922d3a0d7c1"}], 0x1000000000000277, 0x60, 0x7e, 0x0) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000100000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff0700b6da16f4569fc7b00000090000f8ffffffffffffff03000000000000000d60395a7088fc556a86820ee20ed7c27f002000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r2, 0x0, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000280)=0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x2, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:00 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x80, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000080)) r2 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xffffffc3, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:00 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000000035f4c384220300000000000000500004e9bad7ff070000a8971008"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x9, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:00 executing program 1: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a10100015ca6574c9a990900000047d1000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = syz_mount_image$romfs(&(0x7f00000000c0)='romfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000001200)=[{&(0x7f0000000200)="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", 0x1000, 0x8}], 0x0, &(0x7f0000001240)={[{'\x00\x04\x00'}], [{@euid_gt={'euid>', 0xee01}}, {@context={'context', 0x3d, 'user_u'}}, {@subj_user={'subj_user', 0x3d, '#'}}, {@hash='hash'}, {@fsname={'fsname'}}, {@dont_appraise='dont_appraise'}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@subj_role={'subj_role', 0x3d, '\x00\x04\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00\x04\x00'}}, {@appraise_type='appraise_type=imasig'}]}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000001300)={0x0, 0x100, 0x6, 0xbdd8, 0x3, [{0x40, 0x1, 0x8, [], 0x2086}, {0x68f, 0x2, 0x4}, {0xffffffff, 0x3c, 0x800, [], 0x2400}]}) ioctl$BTRFS_IOC_SUBVOL_CREATE(r0, 0x5000940e, &(0x7f0000001400)={{r1}, "5b4a424520bdc38b9b6e065bd027dd81a4903c6dcf10ddddf13bf560ee0d9057aa2d6486c7822d7f64a0f6af54adef8f924758912b3b451da2f65c05a96819f0c7c33f4b5b56be6d44597158a03b9f657deef364dd039cbdaa37c4b994e51b9486c2c07809fa88e64a35c251d1427b136a7c2c29d393036b103019aa8bd0fe12e40723626f94406bca87de3084e55e7ea2ead557bdb1cef5f6abc889193afe0b45103aa5d48e67bd644bbf33789e9e2a9b344ac95fb101e533453338674adaf63a94b5175b4c78be25aa19204b5f69f58b088c1d7b8592fbb1fd0dd0237c65057c1be1ec9646b763a86a58b6758f920f79395b5185e5a75891d48fe40b4f73612e652829dce39de0856584bbafc6c9ab9d34d1a3bcdf0999a7022eca374059f54a1b0b08d61ee8444a80da3ac4901d44062810091219269be41456d95eac958cab6b03923f41935cdd69162b9f2284e30735d1f2f628ec1ec1f27611f2af5856bea9f6523f0deb8a34d6b29989cf457b082f29472b5e49e0cccfa78bcf9f901a321b532dab33da4500f29e997c3f5f26ce2a610be34ab23ed974a4503e4e94a0b18af021f3250d6b83c5031ec9f57369b18fa096c75257d0b74b00da7ae1eaa8d89b188bc31c391c551ad1036c1bf430868b8ac6c63838e0af7c117d6e0ea68d8e9bb8c0b24f0aab07b740ca4035b6adf88080e7fcfcc3b3d69b440ec192d4326907531541c7c6fb2f35d63720638bdf75d95bc41ece3fca836be435996d7083dc4b56fdb1a79a578fe8190a1db511396aa0cfd807baa63eaeb3421160e06ba95f31418dc5f97460e40094ac8b171b0744d366faad75b402d346bf181117b9e02e497bf1b0b9b4878dc84d4638d031fde6fa17c5631debddc52a37a0a61926f0a86db5f0ca59ddae81c27ffc39bf2e23618aad7f68f1507d3c5df84702953026e90e76bc62a2b7f6984bcd448bdeb4128fa4eece2590e2b7a2487f9704e489f92c7108a9904f39a1067a9dd11cf5f5542405c4eb1fc687494d6ec55cd36a2dd938a9edfa5a06a403688ead9663cd8d487763f3757181450156d0405a053f41fbbd3225547663ba27fe95cebdac60bd6f66b4d0b3c742adf941636d3e81fa5ac6742af0b711968c65759c8b30950262fb8c6968d28343a24c559db93d8783ba8d554b8d661fbe1e4fa8076ab8a0f2f0e5e2ba82c6736d51053573e4a0fbff794a6c6cfc43dd4b55396858016fdfdac25615ffec37d1ba535b8abb92848691c67c18f103eee44b61355ea064fc30c45e2d18b977c80af1f4c2c2d89bdda8ce4bd98e641decc0fb4d2de7538898698679375bba016ce54fc079e80e5cc0f4e43472bb85f72edb111a168e54e208674960922856b93408da300571ae056d70ad0f27707832701ef90c883ceb08419c3290fc039ab5d1440c457d780cdeece5f76e3ed36785e79a7eecc9c659ee0a4f78a9f28b5dc8eda6cd347172fe6f499f9708950b7e4093cf005f02141266d95a752be051fff1b7ef4a773ce28719fa3e3b8ff09744291b218deeaa039668fa733d30b30dd5338a63e272f4eaed152c4b742559ec35d0c38e3969813a0bab050487deef24c8311b111d16d8a44c8d9bdc505e9fa16bfd9ede6b12e344a4c6b03a97cb301ce8ca0aa88b8910e9a0b1c4dd9c6dbd5e5a473dc17e51d8c3578427f5c3d590acf45ecb6275fe2173a76c9aaf2366a781d7acb12699d64e413654959025e11b6dd24b5a4bc6efe040c5f589228e3909ffde47848de688b1c8f0aa3e2c9ed070b21df79a616e7748e534320bd6cc587a0b7a561873fc03ddc946506aca9909fde3c136ab787c368f1245f1f2efd971d6649307593de06f3beb10cf8c3e94eb2d9ad06a5f5a5749ac71d96f3943874e638a3ef94cbd934edfca8f1d7cc7cc8407548bb99b9c678e457a44f16d3ab438ede5332aaaed1d097089b9abc28c08e48b0ebde997063b33aae4a84a2cff5e4d521a157f43b19e828c74307c229e3f4cea090a3d80e281b76781fde24d33f525217ca94ee9c9c6da3217535852b7cd814f77e021baaa1284874ca7f77f266f0e42fda9373c16b7ae667975164c7472797ba76e0e7d6b79f5610ad4bbdb2757a1fa0d70c02fa6adfb4d81a4c2254d80bb52c277a6527581a84b8964ce520d78785ed5cf0ab796af9c5e9b6ecd9c915003b4350ce63c673475ebec2506454ffe0cc582daf011bc9393c4e3f44e583c4f6b9a2d1ec80f346de5e0e9f17d40394ebb5ca5cd40885866e08597791b0b6cd48452fe3f103e590210c6eba97b0374350a576ed972541a8931559e694e41e5e3a7c44aae21d177228f7c6ef9024a59959eef0a4e50b997653e47bc4a81a4a22b3e9e520bcc6e8d28da64148e2abb5e2e2fe42e33255f0dd12cbbfee9f7558a64a833f6b033b2cc3bbbc51f2c7fa4c6dc276e8547a4aff31393bf93f7acfb07055e320b2ec549592d9053b30710f39cd2111be7a40cede87d5d3905d085f573f287bde2d77a69ba2fbde5ed33689fc2ba3d19ad0ab467d1c75a6ba20d8bc316e3082553339a6c2c95d00f0507087cbff8f7848be1bd0cd53e82b72141bb976a30197998ce353cd7ab74d48ad97d71e776586b7974a255f5bd1faed09430aadf0abf6e799c68a2f7cfaec5baca84f2d7c54f8fcc5557833a5ce0da0d3c13459c7e33ee19a585ead15018439b8f5c3d1a57ba0c5852085eb1e65e7a8c3e8541df45c239bf74adab10e112af212c84c52cf18fc8dd4b578a02db08a5f4320bf287e335846fe7cec2c79c16a7ffef56310ac3518d67215a21cfd5ab447fcaee0cacab68362b6edfaaeb26bd7768dd24ac5a545878478a7276e7dcba0583302aaf32e8bd1a252524ee6fa0e5de36e71eb9ea9814046731c144309561d4384685206d440ab5facec45e7a554ea6139a8db232252605ce8b6fb124dbfb4a851c537dee39739ef39a5e2886ca9f8c8bdc1ce2ee0b2a27ea58fddbe9d3f8f5794cffcbf1a3c91be21fc717d79e08a8129fe73e225769943d8454fe51942e4a3487671642db79849bb391beb7b047ccff13816244a843b6c909b6417d6415fc38e9e8988c86f2e72a20613ccc96c7486c0a7ebf8f9ba1670600fd0611f067aa293d38f09ab0438d08ed8ab08c13a2f34e70357f27923aa45ee13be84bf8f1b4104e303c15b2879c3b88f2d1445f511a3e811448a14b9a72847c277610296e7ac2e982c7d898f3aa8414f9ff9fc241ce93aeeb88dd62cceb4e4b8532bf9b5ce3c72e3da91d92cc0ab49be38e7feb5b8101b8ea4cfc94b28ffc9e7db8710d15e19ec09694b89157323493d4c9deb52eaf51960ff05000545b43ff8847a6e304a45c11d28fd476c90dff65c2b80ba6b8e628e2ecc1852ebd7625978798df3109aab69e62fd222b7dbcc7d8f0819422a433513c04260e3960056559bf67fd3967690dbbabeb935e22db84fe458eedf2399fd5b55acf0ee5f26b5ccc7557f9eb4598dc9cb45eca4e091a036ea2f5d6c0b62175ae2f0fb5e94010e25f70c50c6dedaf2f62b6d1fd5b815349e3cc0d39643c8c436c8c4b94d0bedfee44e7a3b8a3dade58c4c2f38d63845ae73228385823d890a646afaeb96760d0f6dc9efcdba76736009fa0736b13e63cd31c0d4cced5425cd31e5f476c6e1f342c0ebdb2632a30da4bf0c597f764cadefedc4869df2f857dbfc36df0e9100a9fbda60abba598bab2df7b4541d80d1b798067eef7e88bc23a8c7acabc28e97a313ec1a9f34d6d7bf12dae02590590e4b744eaf502ee2dd81c454451952249314b473689155c8f6c294fa5baf26082d853a0c38146329cc5f3462a9d9af7be850d3481da2f61e6e7b2ecd4814c73d700d58b23e34cf502945737c3dbd7b633e2479f586df389040aeaa9dcc472eb2f6ddcc3731e28755439edc3b1c5fa7a41114a5dff244a714e6074762c0419d186b8e8ff5080b33a80eb46e9d784528f2ecb8b5ae5393a29bfcd02cdde36495ffdf468be808c2b0f7e9bb6a6351fc806a6b7441d0f055945c08a52ab045a75faf40a5bbc1ee00212b5446f5c603866e392d74f5b265259924da94867418a4588dcbb8eb3b7a6aa7ee7674e60cb0423a4a5f969c5059aae92446f8968c923e74ef4f32ecd214f29dfa8ee7daa17fafeeeb820e055c1a26710040f76dddbd909277a7b65df1bff68ca8b3ebebf5f950bf3b4dd1b52280a282a3641220418b97210c1cb8572f73ae5d61acc1094d995067b304d256c12bcc37dfeac4bf69ac1fd0333efaa1f90d901162d385c27ad03d3ab4b34d23583da1b61ddbe47a86f9d58599c1c9548a38e123caaed352ad1fc13fec4f114b475a77a9e7f18c8e39e354ea09849cefafdda10fae0e142b0fdeeec33a00dd6c82f459998fc2dcb185c071d2387f90027e91c3ebd814dcebf374fef45b8d3f99fa4c299a5ec949d331e54c5ca67ecbe82835fab7c6bdd508e16ef43ace9adb16b51b38152e51d67ed013f6f368be1cc85d2526983d4a143a8c81190566e28203d8ad4b2540f833a6d6faff163b8961ebc9e2b81969581ce394acbc21a311a380cead7a501843e1e3905a06e180e2e5e83411ff3b4ec71cd9dcfd5e15b8bf309461cea8752510cf9be96329b975fe791106215aaf0551bf18f4730e446347f37e1a9a5369182578801e2a06355849ed496b6ca0db827d0057145099516dfaa511722d2f0f8245dda0aab1d6febff997d3898c19d7c33d7508cbe75ec8183dfe82767f0641505cb8a1f746fd91ba07cd14ae757bbeed2e9f17cdd57815e34d156004c338d8c1ef6c3fac4502175fda0d3492057fc1991327d75b771e3f395f347a3bbbd886a496dab2fc5604f40a1526b32f77cc2ffee9bc39c0dc94515edcfffdb8a2c98290e274c47033d0b8461c9e53e1d8ce668997fdf9aa6d692833a08f2450ff8bdcf40dee90fc48f549fd5c0cdefb295558d68d39fe93d2845141178f3641defb2372376d997c1b723d64fbac02b9545c93041ceb611b9952053b7403d53b2c925aeffccf8cd6951575fc19a5f52e11270c1d04017e796ed9418339ff1fca1dff443f949d51d2bb71a56e2641d485108a80ac535f1b39fb2989f39250590f45b3f9c297ecdea4ebc781f712dff78006907924d61f23822481a244f73b1542503b998ac1a92611936b01e7bca1af98e5e70387a532095f6d74fe567125548f09af67c3259151bab05127b3d64ed447eccb8694b8c1da81eb193ef4e771b9a789115bf2db9b420a42aeccd0feef7e9f7c8ea1977dce78397f283c3585a698a00b731d2fc36b2fdef6ba0fa70f98a76a4bb7429ad906c00ff083b3d4d872b1fa234e83baad0c1a028ad5ed0f5defdc6b6867387d9661ea2a8510d91ff6ff84bff489ad9b37b3c25c0aaf8d9ead5fddc7f3460ba30cd0642982c6b8879faa6492a8614f400ee7a1c880506a2469123321c9493e1b4c7e7a4f20c12a64aecaa3933d95bfa16bef488e63a49f887cb3567a59f4c95b71b0e151a3202ad9ea80fa81e37fb89ead563d5d9869d9fc3240a681e32bce068b28bd76aae4d90c9cce13dcc7f579495545dcbb266c34e7fe44aee0a8d17295382e6d4919787955b258b5535e3e1bd34d6ab9217f7cc346b1fc203f23380e7a91f3691772688219f66ef441d8555080f3bd6abd4b96780642ba389e1fdd0c2057aab6a6ed25f35edb89d46342c25be9758bf32604e49dd90b9ba239c6534d6d76e6dce696ec34ba0f5b988f24eb081ae25ae22dfb3d66e5be5ae15d7e5b033589216"}) clock_gettime(0x4, &(0x7f0000002400)) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') signalfd4(r0, &(0x7f0000000080)={[0x28000]}, 0x8, 0x80000) 04:12:00 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r2, 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r3, 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r4, 0x0, 0x0) r5 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r5, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7cb169c54d01d4ca80a58eea96f51064895e9bd405da5cc298481f44eef99be8a464777c24a5dad55a35a6860e6129fb458b6839c9cefeaf9b6806d23a12ddd2de08b8f43dedb3cb01d59c05dde32e7d96128717516d", @ANYRESHEX, @ANYBLOB="02557238b31285e1f9a0628c08ec4ed3ab911df1fa1427171047dac0c48856207209bc3145d26f93b644853be7a915cec70d81d0e4baae9219cbcd08c6e155bc0b864e2fdecad3a21da7c18118cbcf4ead7c61224945c921f54b04479418dab868a0b6a932487c341b267e0ab772470c247ff05a451cfda553857899ac9d", @ANYRES32=r5, @ANYBLOB="3def9996a1987cbfb8046d087b6bf466145fea12706a8d95cf864ed68fbeab6045b16542ac0bb5bc3e03c55ef95b5e86725865b2e4ee6a01a0240b2a3e3eefa103fc1d4a8d952e26d8f2a6146b91cc9bb574b9af9ba8a4ecfedae8a3a4512f53ea8e0dd5c1a8b8956b1af794902e33a8cecd580aa85108ec77991e6637ea83e271df6dc83dbb6fdc3d2d0646d418a7cb893f9a54d52a7b8a242daf9c37a24df09e02818c3b117c96930f8c2399d1296c855fc08c223f", @ANYRESOCT=r1, @ANYRESDEC=r2, @ANYRESOCT=r2, @ANYRESHEX=r3, @ANYRESHEX=r4], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x4, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:00 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 240.949082] MTD: Attempt to mount non-MTD device "/dev/loop1" 04:12:00 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) set_tid_address(&(0x7f0000000040)) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 240.991804] romfs: VFS: Can't find a romfs filesystem on dev loop1. 04:12:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xfffffff0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0xa, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x5, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:00 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000100)='\x8a1\x96[\xdd\x87\xd5\x1cv\xfex>\x9a(p\x0e\xfa\xfe\x04v8=N8\x00?', 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x242142, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000080)={{0x2, 0x0, @reserved="d2a8ae335eed85e3333f96d79d727ce387825a020221227bae44662d98918b6f"}}) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x11, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:00 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xfffffffc, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x6, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0xb, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:01 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000b40)={{0x2, 0x4e24, @broadcast}, {0x6}, 0x36, {0x2, 0x4e21, @remote}, 'veth1\x00'}) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@setlink={0x34, 0x13, 0x32b, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FLAGS={0x8, 0x3, 0xa}]}, @IFLA_CARRIER={0x5}]}, 0x34}}, 0x0) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r3, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000340)={0x0, 0x2, {0x6, @struct={0x200, 0x2}, 0x0, 0x0, 0x6, 0x5, 0x1, 0x3ff, 0x2, @struct={0x9, 0x1ff}, 0x7, 0x3, [0x3, 0x8, 0x7fff, 0xc635, 0x8000, 0x6]}, {0x3, @usage=0x5, 0x0, 0x3, 0x9, 0x1, 0xfffffffffffffff8, 0x0, 0x0, @usage=0x7624, 0x0, 0x8, [0xd8, 0x2, 0x10001, 0x8, 0x8, 0x6]}, {0x8, @usage=0x100000000, 0x0, 0x1000, 0x80000001, 0x3, 0xfff, 0xff, 0x2, @struct={0x80, 0x9}, 0x3, 0x9, [0xa3, 0x91f8, 0x4, 0x100000001, 0xc559, 0xa1]}, {0x0, 0x2, 0x4}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000740)={r4, 0x80000001, 0x100, 0x1}) sendmsg$nl_generic(r3, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x108}, 0x1, 0x0, 0x0, 0x4004880}, 0x4080) r5 = socket$kcm(0x29, 0x2, 0x0) r6 = getpgrp(0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r5, 0x8902, &(0x7f0000000100)=r6) 04:12:01 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0xa, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:01 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300060000000000000000b738000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:01 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d152dc4505609da12c524054757660d4dabd43bb72e8477c291839bff4e64cf4325a8bd4e09fc23aae8199153494c3c0c30f0e786d174b96babcef7cf736fc6c2b9706adbf94e0a0a3b9a2f8fdd95293a32c8f841bdac71406bef96677eff3b6d6928d6650690253fb4d2bf02ec195104a775b673553568c06"], 0xd8) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xfffffffe, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:01 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:01 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/8) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="4c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012800b0001006272696467650000140002800500070006000000060027000000000008000a00", @ANYRES32=r3], 0x4c}}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x2c, 0x0, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3ff}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x11}, 0x80) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x10, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x8, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:01 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xffffffff, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0xd, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:01 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:01 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) pipe2(&(0x7f0000000040), 0x800) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0xa, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:01 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:01 executing program 1: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/8) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="4c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012800b0001006272696467650000140002800500070006000000060027000000000008000a00", @ANYRES32=r3], 0x4c}}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x2c, 0x0, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3ff}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x11}, 0x80) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0xf, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0xe, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0xf, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:01 executing program 1: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/8) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="4c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012800b0001006272696467650000140002800500070006000000060027000000000008000a00", @ANYRES32=r3], 0x4c}}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x2c, 0x0, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3ff}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x11}, 0x80) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:01 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) 04:12:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x10, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:01 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f967650300"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:01 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0xf, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x10, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:01 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:01 executing program 1: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/8) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="4c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012800b0001006272696467650000140002800500070006000000060027000000000008000a00", @ANYRES32=r3], 0x4c}}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x2c, 0x0, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3ff}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x11}, 0x80) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0xc0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:01 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 04:12:01 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x10, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:02 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYRES16=r0], 0xd8) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r1, 0x0, 0x2c, 0x1, &(0x7f0000000040)="2225a053aa3380c8c536d381e645e005e59cd3e68470b1bd1b7abcf595ec5174caa8f5bca020548cb98d21f7", &(0x7f0000000080)=""/1, 0x20, 0x0, 0x7c, 0x2, &(0x7f00000000c0)="12b3acaf19ae4e1bb277076044be0406928655c39a68c2b0a2aa99a06936484f9c72e1ab45461b9c945f636fb95b2d4fc979d47e1bb020473e2877217e8f7954759beb2fdb38bf570b992d2b941472b9e0935254e8fbaeee64949e20c2cd55536a17ad4dc5ceff8b0a1d3d7348dc1abf8e4f5c5c80de4e5c9b2e13ac", &(0x7f00000001c0)="1b4b"}, 0x40) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x1e, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:02 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x2c0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:02 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x10100, 0x0) write$FUSE_ATTR(r2, &(0x7f00000001c0)={0x78, 0x0, 0x0, {0x9, 0x8, 0x0, {0x5, 0x8, 0x100, 0x100, 0x2000000000000000, 0x40, 0x7fff, 0x3, 0x1, 0xc000, 0x3, 0xee00, 0x0, 0x400, 0x1000}}}, 0x78) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x4000) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000480)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000040)={"2559d86f209194e51e284f35b08abbf6", 0x0, r3, {0x100, 0x6767}, {0x5, 0x401}, 0x8, [0x6, 0x0, 0xffff, 0x1, 0x9, 0x20, 0x100000000, 0x9, 0x2, 0x81, 0x9, 0x100000000000000, 0x82, 0x1, 0x1, 0x80000000]}) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0xd8) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000680)={0x84, 0x0, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'caif0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'macsec0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000}, 0x4040051) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:02 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002e"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0xf, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:02 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x33, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x11, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0xec0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:02 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES64, @ANYRESDEC=r1, @ANYRESOCT=r0], 0xd8) 04:12:02 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0xc, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x8c, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:02 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x12, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x2000, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:02 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:02 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4660"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x500, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:02 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1400) 04:12:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0xc, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x33fe0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:02 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f45"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x600, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:02 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000380)='4\xa2\x16\xc9\xea@>\xa9\xe8p\xab\xcb\x9dT\xe2\xb0U\x84\xa5`\xb8\x05\x97\x16\xe5\x85^\xceKz\x05\x8a\xebp\xbf{\x1e\xaa:d]D\ry\xd7\x16?\x87\x97v\xaf\xfd\'\xc4\xc3_\x06\xe9\xe6\x16=\xd5\xc1v#\xe5\xf1&\x91\xde*\xd8y+\xc1\xbe:DaW\xb3\x82\x0f\n\xcc\xce\xae\xb1Y6\ae\x93d%\x1fZ\xc5\xc6\xbeDW0\x9d\a\xd3\f\xa0\x87\xfb\x8d\x1a\xa5\xd15\x11\xa9\x9e\x87\x06%\xd2\x9d\x8f\xfe]\x92\xfa\x1b\x8e\x04\xfb\\\x10Pq\xd2\x06\xf0\xbc\xad\xdc0-Kx\xfa\x1b\x17\x9ey\xcdA\xb2\x1a\xa7)\x90\xa4\x81\x7fu\x90Vyd\x1c\x92\xa5.\xb9\x87\xf5`g\xaf!\x1cX\xb8\x83\xd1\xc8\x10R1n(\xe8\x1f\x9f_\xcc6\xca\xd6`\x8a\x15\x8a%\xc8\xb0\xa5\xea\xacw\xc1}\xedA\xfa\xfa\t \xf6B\xee=\x1c\x82\xb3\xb4\xd6\xf7\xed\xba\x99\x8c\xe0gw:\xcd8\t9\x0e\x02?\xaf\x7f!3\x0e\x85\xab\xd7\xe8\xb0\xfek*\xb6\x89n\xe1\xdf>L`0\x1dG\xbc$\xfc\x14\x97EnD\x03\xd6<\xb0\x8b\xb7\xa21\xcc\xc5%\x8cs\x10\xfc\xb2\x95\xe8q\x97\xe3\xf9{\x82`=\xa9\xf1,#=RG\xe2\xcb\xec\xb6K\b\xfd\x03\x87Vg2m\xbc\x92C6e\xcetJe\x11\x16@X,\x9f\x82', 0x3) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) r3 = signalfd(r0, &(0x7f0000000500), 0x8) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0xa, 0xa, 0x4, 0x20, 0x1, {r1, r2/1000+10000}, {0x5, 0x5, 0x0, 0x4, 0x0, 0x20, "11d1dfd4"}, 0xffffffff, 0x1, @offset=0x2, 0x0, 0x0, r3}) r4 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mISDNtimer\x00', 0x200582, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f0000000200)={r5, 0x0, 0x8, 0x8}) r6 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r6, 0x0, 0x0) sendmsg$NFNL_MSG_ACCT_GET(r6, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x54, 0x1, 0x7, 0x301, 0x0, 0x0, {0x3, 0x0, 0x5}, [@NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x8}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0xffffffff80000000}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 04:12:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x13, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:02 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f45"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x20000244, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x700, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:02 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) sync_file_range(r0, 0x874b, 0x81, 0x1) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1090001007ea85ca6574c9a990900000047d1138c511b937c74538e02f32f0b5b7b8eb387116e9508065b1a5b"], 0xd8) execveat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x1000) r1 = semget$private(0x0, 0x4, 0x61) semop(r1, &(0x7f0000000340)=[{0x2, 0x401, 0x1800}, {0x0, 0x8, 0x1800}, {0x2, 0x100, 0x1000}, {0x4, 0x5bae, 0x1000}, {0x1, 0x3, 0x1000}, {0x4, 0x8001, 0x1800}, {0x3, 0x40, 0x1000}, {0x3, 0x14, 0x1000}, {0x0, 0x0, 0x1800}], 0x9) write(r0, &(0x7f0000000200)="462fabf2ec49459ab46119f1bfb7a6d76655d2a7c6d91469a1d9be1a12479c4cc97f314360376ac9dfdf5f4d9e83a53e0f9dfb533d6c610304fbd4f28d10848123e6d5319b462912926ca2b39399cf12799cb0d2769d270c5ee958cebe86344d7a86d2452d808f7d86656446b18d6507192abad7495896761dd9374f63f33962d363c6887d49174675cc56b41428c7ee96b0a99570fe6977a0c9f7c3286fb7030ce3324089052b7fbb3772ff19e347f6d18473db806488007a2c0daf3b46859b578e7dc80b5c5e9da421413fb8739112ed814cfbf05eace4e9ae5d6cc331c1f07d15", 0xe2) inotify_init() r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x400, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f00000001c0)=0xfff8, &(0x7f0000000300)=0x2) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000000)={0x7ff, 0x8, 0x3ff, 0x101, 0xa, "c88cab96a95e79a0301e5162b54e583bb5f904"}) 04:12:02 executing program 1: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:02 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f45"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x14, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0xa00, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:03 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:03 executing program 1: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x7ffff000, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:03 executing program 3: clone(0x21300b9ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x04\x00\x00\x9eT\xf2!\x03\xc4\xfaWy.\xecu\xfa\xc0Kc\x01\xe3\xa4\xee\xf7\'j\x11u\x9f\xa7\x01J%r\xedm\xc8\x0f\xd2R\x8d\x89\x83W:\x8d\xefXX\xa4\x02 o8\xd9\xa7W|\xd1(\xc2@$\xda\xea\xc5mmm\xa2VN\xbbb\xe3?\xd5\xc4\xf8\x8c\\\xf8\xb5\x12\x14#(n\xbd\x8c\x94w\xef\x15^\x89X\x8b\x05\xffHh\tQG!\xfb\xd2nFP\xfd?\x008uv\xe6d\xa7?i\x8dc&az\x7f\xc8\x96\xb6\x03\xd1P\xb2\xce\xa4\x92i\xd2\x94\xcc\x8bp}\x03\x1f<\xe9\xe7\xe4H*\xa0$\x88\x92\xbd\xaf4,D\xfcdA\xa0R\x8fh\x9d0~\xe6,\xa6\xf0\x16\xff\x88\x19\xe4\xed', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x10500, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000140)={0x15, 0x9f, &(0x7f0000000200)="4dd088aac7a2387033c1166420c500943c897f2038692a1359e5af61c2960a4fa16f0507793dedf1b41df74d1df6f8d58e703da6c3692fa8dd42335cf87d1d207003694ab7d503da433c39b678466c0df4c4cf403f43aab10aeb1bacea3980dbb9da9c8a2ac5af26cb4d4938dc55972611cbaa03acf7a9adcfc6d5d9ef8bbbfbb27e48201cb7cb66d1b45f290462d44140f2329e866e5ed3955d2ac38f3d02"}) 04:12:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x15, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:03 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0xf00, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:03 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0xfffffdef, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x16, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:03 executing program 1: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x1e00, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:03 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:03 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000240)=""/52, 0x34}, {&(0x7f0000000280)=""/202, 0xca}, {&(0x7f0000000380)=""/250, 0xfa}, {&(0x7f0000000480)=""/81, 0x51}], 0x4, &(0x7f0000000540)=""/64, 0x40}, 0x40) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r3, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r5, 0x1, 0x0, 0x0, {{}, {}, {0x13, 0x14, 'syz1\x00'}}}, 0x28}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x31400000}, 0xc, &(0x7f0000000700)={&(0x7f0000000100)={0x30, r5, 0x20, 0x70bd27, 0x25dfdbfe, {{}, {}, {0x14, 0x19, {0x1, 0xe953, 0x5, 0x3f}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8048810}, 0x4000000) r6 = syz_mount_image$ext4(&(0x7f00000005c0)='ext3\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x1, &(0x7f00000006c0)=[{&(0x7f0000000640)="b5594d212bcde5b7e09933e9abe04c415d6cfc151cc6854ed03c9cb656be4465cc628b79cbde184c8ed741105725fb57d3780a30b8da99d0008662aa818007b09f56094540179be7e4081c93da599c774233a8d1b6f9d73a0420f6d64cbf0a322ecfade6f38f1721", 0x68, 0x9}], 0x20001, &(0x7f0000000180)=ANY=[@ANYBLOB='data=ordered,euid<', @ANYRESDEC, @ANYBLOB="2c7375e751bc75626a5f747970653d5c2c006795"]) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r2, 0x8982, &(0x7f0000000740)={0x8, 'veth1_to_bond\x00', {'bond_slave_1\x00'}, 0x7fff}) r7 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r7, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYRES64=r6, @ANYRESOCT=r7], 0xfffffffffffffdb6) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x6, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:03 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0xf, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x2000, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:03 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x840, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x18) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e21, 0x10001, @private0={0xfc, 0x0, [], 0x1}, 0x1000}}}, 0x84) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 04:12:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x17, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:03 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:03 executing program 1 (fault-call:1 fault-nth:0): r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) [ 243.866698] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pid=13835 comm=syz-executor.2 04:12:03 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) mkdir(&(0x7f0000000040)='./file0\x00', 0x124) 04:12:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x25, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x3300, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x18, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:03 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 244.031602] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:03 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=@getlink={0x54, 0x12, 0x4, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x10000, 0x4000}, [@IFLA_IFALIAS={0x14, 0x14, 'ip6tnl0\x00'}, @IFLA_PHYS_SWITCH_ID={0x1f, 0x24, "ddb99685328dd38dd3b764b1d421f2b5b3b0d949a3cb3ac702b3aa"}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x40884) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f0000000040)={0x2}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 244.088696] FAULT_INJECTION: forcing a failure. [ 244.088696] name failslab, interval 1, probability 0, space 0, times 0 04:12:03 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, 0x0, 0x0, 0x0, 0x1000) [ 244.180518] CPU: 0 PID: 13867 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 [ 244.188423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.197840] Call Trace: [ 244.200522] dump_stack+0x22c/0x33e [ 244.204480] should_fail.cold+0xa/0x2f [ 244.208380] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 244.213488] ? lock_acquire+0x170/0x3f0 [ 244.217478] __should_failslab+0x153/0x1b6 [ 244.221753] should_failslab+0x5/0xf [ 244.225493] kmem_cache_alloc+0x2b1/0x4a0 04:12:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x3f00, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:03 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, 0x0, 0x0, 0x0, 0x1000) [ 244.229654] getname_flags+0xce/0x590 [ 244.233467] user_path_at_empty+0x2a/0x50 [ 244.237623] vfs_statx+0x113/0x210 [ 244.241171] ? cp_compat_stat+0xa80/0xa80 [ 244.245324] ? find_held_lock+0x2d/0x110 [ 244.249394] ? vfs_write+0x3d7/0x540 [ 244.253124] __se_sys_statx+0xe1/0x170 [ 244.257028] ? __se_sys_newfstatat+0x120/0x120 [ 244.261650] ? __mutex_add_waiter+0x160/0x160 [ 244.266160] ? vfs_write+0x393/0x540 [ 244.269880] ? fput+0x2b/0x190 [ 244.273077] ? ksys_write+0x1c8/0x2a0 04:12:04 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, 0x0, 0x0, 0x0, 0x1000) [ 244.276883] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 244.282252] ? trace_hardirqs_off_caller+0x6e/0x210 [ 244.287285] ? do_syscall_64+0x21/0x670 [ 244.291266] do_syscall_64+0xf9/0x670 [ 244.295080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.300275] RIP: 0033:0x45de59 [ 244.303473] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 244.322373] RSP: 002b:00007fc4939ecc78 EFLAGS: 00000246 ORIG_RAX: 000000000000014c 04:12:04 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0e9739b1109f295953a0a9c40cb08bca7470837b22d8413fb2779e0020", @ANYRES16=r1], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 244.330078] RAX: ffffffffffffffda RBX: 0000000000035180 RCX: 000000000045de59 [ 244.337704] RDX: 0000000000000000 RSI: 0000000020000080 RDI: ffffffffffffffff [ 244.344965] RBP: 00007fc4939ecca0 R08: 0000000000000000 R09: 0000000000000000 [ 244.352228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 244.359490] R13: 00007ffed31d956f R14: 00007fc4939ed9c0 R15: 000000000118bfd4 04:12:04 executing program 1 (fault-call:1 fault-nth:1): r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 04:12:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x67, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:04 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 04:12:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x19, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:04 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) execveat(r1, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0) 04:12:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x4000, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:04 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) [ 244.561878] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:04 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r0, 0x0, 0x0) write$P9_RWRITE(r0, &(0x7f0000000040)={0xb, 0x77, 0x2, 0xffffff77}, 0xb) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000080)='\x00\x04\x00\x00', 0x7) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 244.619557] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pid=13915 comm=syz-executor.2 04:12:04 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 04:12:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x1a, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x8c00, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 244.717368] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pid=13931 comm=syz-executor.2 [ 244.736918] VFS: Found a V7 FS (block size = 512) on device loop1 [ 244.782713] FAULT_INJECTION: forcing a failure. [ 244.782713] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 244.794538] CPU: 0 PID: 13926 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 [ 244.802420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.811773] Call Trace: [ 244.814371] dump_stack+0x22c/0x33e [ 244.818008] should_fail.cold+0xa/0x2f [ 244.821902] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 244.827012] ? deref_stack_reg+0x134/0x1d0 [ 244.831259] __alloc_pages_nodemask+0x256/0x2a60 [ 244.836017] ? mark_held_locks+0xf0/0xf0 [ 244.840087] ? unwind_next_frame+0xefa/0x2430 [ 244.844605] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 244.849456] ? _parse_integer+0x132/0x180 [ 244.853616] ? _kstrtoull+0x186/0x420 [ 244.857431] ? _parse_integer+0x180/0x180 [ 244.861583] ? __might_fault+0x192/0x1d0 [ 244.865654] cache_grow_begin+0xa1/0x9b0 [ 244.869720] cache_alloc_refill+0x2aa/0x410 [ 244.874043] kmem_cache_alloc+0x3b4/0x4a0 [ 244.878198] getname_flags+0xce/0x590 [ 244.882007] user_path_at_empty+0x2a/0x50 [ 244.886153] vfs_statx+0x113/0x210 [ 244.889693] ? cp_compat_stat+0xa80/0xa80 [ 244.893835] ? find_held_lock+0x2d/0x110 [ 244.897895] ? vfs_write+0x3d7/0x540 [ 244.901612] __se_sys_statx+0xe1/0x170 [ 244.905496] ? __se_sys_newfstatat+0x120/0x120 [ 244.910099] ? __mutex_add_waiter+0x160/0x160 [ 244.914596] ? vfs_write+0x393/0x540 [ 244.918309] ? fput+0x2b/0x190 [ 244.921501] ? ksys_write+0x1c8/0x2a0 [ 244.925319] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 244.930681] ? trace_hardirqs_off_caller+0x6e/0x210 [ 244.935697] ? do_syscall_64+0x21/0x670 [ 244.939681] do_syscall_64+0xf9/0x670 [ 244.943484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.948670] RIP: 0033:0x45de59 [ 244.951883] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 244.971051] RSP: 002b:00007fc493a0dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000014c 04:12:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x2000, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 244.978777] RAX: ffffffffffffffda RBX: 0000000000035180 RCX: 000000000045de59 [ 244.986039] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 244.993326] RBP: 00007fc493a0dca0 R08: 0000000000000000 R09: 0000000000000000 [ 245.000588] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 245.007853] R13: 00007ffed31d956f R14: 00007fc493a0e9c0 R15: 000000000118bf2c [ 245.117111] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8192 sclass=netlink_route_socket pid=13948 comm=syz-executor.2 04:12:04 executing program 1 (fault-call:1 fault-nth:2): r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 04:12:04 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r0, 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x1, @bcast, @netrom={'nr', 0x0}, 0x400, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, 0x0, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) r1 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000100)={0x101, 0x5, 0xec, 0x6}, 0x10) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/bus/input/devices\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000080)=0x200, 0x4) 04:12:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x3f00, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x1b, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x402, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0xff00, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 245.224967] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:05 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x20002, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000100)={0x4, r2}) r3 = syz_open_dev$char_usb(0xc, 0xb4, 0x5) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000040)={0x2004}) 04:12:05 executing program 5 (fault-call:3 fault-nth:0): clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x405, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 245.387959] FAULT_INJECTION: forcing a failure. [ 245.387959] name failslab, interval 1, probability 0, space 0, times 0 [ 245.415103] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x1c, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 245.437634] CPU: 1 PID: 13976 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 245.445542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.454906] Call Trace: [ 245.457508] dump_stack+0x22c/0x33e [ 245.461159] should_fail.cold+0xa/0x2f [ 245.465067] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 245.470209] ? lock_acquire+0x170/0x3f0 [ 245.474210] __should_failslab+0x153/0x1b6 [ 245.478457] should_failslab+0x5/0xf [ 245.482182] kmem_cache_alloc+0x2b1/0x4a0 04:12:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x100000, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:05 executing program 5 (fault-call:3 fault-nth:1): clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 245.486345] getname_flags+0xce/0x590 [ 245.490166] __x64_sys_execveat+0xce/0x120 [ 245.494413] do_syscall_64+0xf9/0x670 [ 245.498249] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.503458] RIP: 0033:0x45de59 [ 245.503474] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:12:05 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 04:12:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x406, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x1d, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:05 executing program 5 (fault-call:3 fault-nth:2): clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 245.503482] RSP: 002b:00007f6571234c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 245.503496] RAX: ffffffffffffffda RBX: 0000000000002d40 RCX: 000000000045de59 [ 245.503504] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 04:12:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x200000, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 245.503513] RBP: 00007f6571234ca0 R08: 0000000000001000 R09: 0000000000000000 04:12:05 executing program 5 (fault-call:3 fault-nth:3): clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 245.503521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 245.503530] R13: 00007ffedf47f0cf R14: 00007f65712359c0 R15: 000000000118bf2c [ 245.609160] FAULT_INJECTION: forcing a failure. [ 245.609160] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 245.609181] CPU: 1 PID: 13995 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 245.609189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.609194] Call Trace: [ 245.609216] dump_stack+0x22c/0x33e [ 245.609237] should_fail.cold+0xa/0x2f [ 245.609255] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 245.609270] ? __might_fault+0x192/0x1d0 [ 245.609295] __alloc_pages_nodemask+0x256/0x2a60 [ 245.609326] ? get_pid_task+0x130/0x1c0 [ 245.609344] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 245.609361] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 245.609377] ? lock_acquire+0x170/0x3f0 [ 245.609393] ? __fdget_pos+0xe3/0x100 [ 245.609412] ? find_held_lock+0x2d/0x110 [ 245.609426] ? ksys_write+0x241/0x2a0 [ 245.609443] ? lock_downgrade+0x750/0x750 [ 245.609454] ? find_held_lock+0x2d/0x110 [ 245.609473] cache_grow_begin+0xa1/0x9b0 [ 245.609494] cache_alloc_refill+0x2aa/0x410 [ 245.609513] kmem_cache_alloc+0x3b4/0x4a0 [ 245.609532] getname_flags+0xce/0x590 [ 245.609549] __x64_sys_execveat+0xce/0x120 [ 245.609566] do_syscall_64+0xf9/0x670 [ 245.609586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.609598] RIP: 0033:0x45de59 [ 245.609623] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 245.609634] RSP: 002b:00007f6571234c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 245.609650] RAX: ffffffffffffffda RBX: 0000000000002d40 RCX: 000000000045de59 [ 245.609659] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 245.609668] RBP: 00007f6571234ca0 R08: 0000000000001000 R09: 0000000000000000 [ 245.609678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 245.609692] R13: 00007ffedf47f0cf R14: 00007f65712359c0 R15: 000000000118bf2c [ 245.628376] sysv_free_inode: inode 0,1,2 or nonexistent inode [ 245.733149] FAULT_INJECTION: forcing a failure. [ 245.733149] name failslab, interval 1, probability 0, space 0, times 0 [ 245.733167] CPU: 0 PID: 14007 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 245.733175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.733180] Call Trace: [ 245.733201] dump_stack+0x22c/0x33e [ 245.733220] should_fail.cold+0xa/0x2f [ 245.733238] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 245.733253] ? lock_acquire+0x170/0x3f0 [ 245.733276] __should_failslab+0x153/0x1b6 [ 245.733295] should_failslab+0x5/0xf [ 245.733313] kmem_cache_alloc+0x2b1/0x4a0 [ 245.733337] dup_fd+0x85/0xc30 [ 245.733356] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 245.733370] ? lock_acquire+0x170/0x3f0 [ 245.733386] ? __fdget_pos+0xe3/0x100 [ 245.733414] unshare_files+0x16c/0x260 [ 245.733432] ? __ia32_sys_unshare+0x40/0x40 [ 245.733446] ? find_held_lock+0x2d/0x110 [ 245.733466] ? cache_alloc_refill+0x351/0x410 [ 245.733491] __do_execve_file+0x2c2/0x23c0 [ 245.733510] ? do_raw_spin_lock+0xcb/0x220 [ 245.733529] ? open_exec+0x70/0x70 [ 245.733543] ? check_preemption_disabled+0x41/0x2b0 [ 245.733563] ? __check_object_size+0x17b/0x3dd [ 245.733586] do_execveat+0x3d/0x50 [ 245.733607] __x64_sys_execveat+0xe1/0x120 [ 245.733639] do_syscall_64+0xf9/0x670 [ 245.733663] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.733677] RIP: 0033:0x45de59 [ 245.733695] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 245.733705] RSP: 002b:00007f6571234c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 245.733723] RAX: ffffffffffffffda RBX: 0000000000002d40 RCX: 000000000045de59 [ 245.733735] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 245.733743] RBP: 00007f6571234ca0 R08: 0000000000001000 R09: 0000000000000000 [ 245.733758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 245.733769] R13: 00007ffedf47f0cf R14: 00007f65712359c0 R15: 000000000118bf2c [ 245.763412] VFS: Found a V7 FS (block size = 512) on device loop1 [ 245.840386] sysv_free_inode: inode 0,1,2 or nonexistent inode [ 245.862443] FAULT_INJECTION: forcing a failure. [ 245.862443] name failslab, interval 1, probability 0, space 0, times 0 [ 245.862463] CPU: 0 PID: 14018 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 245.862472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.862477] Call Trace: [ 245.862498] dump_stack+0x22c/0x33e [ 245.862519] should_fail.cold+0xa/0x2f [ 245.862536] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 245.862551] ? lock_acquire+0x170/0x3f0 [ 245.862575] __should_failslab+0x153/0x1b6 [ 245.862593] should_failslab+0x5/0xf [ 245.862611] kmem_cache_alloc_trace+0x2b6/0x4b0 [ 245.862646] alloc_fdtable+0x9f/0x2a0 [ 245.862664] dup_fd+0x6bb/0xc30 [ 245.862696] unshare_files+0x16c/0x260 [ 245.862713] ? __ia32_sys_unshare+0x40/0x40 [ 245.862729] ? find_held_lock+0x2d/0x110 [ 245.862748] ? cache_alloc_refill+0x351/0x410 [ 245.862772] __do_execve_file+0x2c2/0x23c0 [ 245.862789] ? do_raw_spin_lock+0xcb/0x220 [ 245.862807] ? open_exec+0x70/0x70 [ 245.862822] ? check_preemption_disabled+0x41/0x2b0 [ 245.862845] ? __check_object_size+0x17b/0x3dd [ 245.862871] do_execveat+0x3d/0x50 [ 245.862893] __x64_sys_execveat+0xe1/0x120 [ 245.862915] do_syscall_64+0xf9/0x670 [ 245.862934] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.862948] RIP: 0033:0x45de59 [ 245.862965] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 245.862974] RSP: 002b:00007f6571234c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 245.862990] RAX: ffffffffffffffda RBX: 0000000000002d40 RCX: 000000000045de59 [ 245.862999] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 245.863008] RBP: 00007f6571234ca0 R08: 0000000000001000 R09: 0000000000000000 04:12:06 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0) 04:12:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x408, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x1e, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x1000000, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:06 executing program 5 (fault-call:3 fault-nth:4): clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 245.863017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 245.863028] R13: 00007ffedf47f0cf R14: 00007f65712359c0 R15: 000000000118bf2c 04:12:06 executing program 3: setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f00000000c0)=0x1, 0x4) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = open(&(0x7f0000000040)='./file0\x00', 0x400900, 0x33) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2c, r3, 0x13, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}]}]}]}, 0x2c}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80002004}, 0xc, &(0x7f00000004c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="170ec500", @ANYRES16=r3, @ANYBLOB="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"], 0x2bc}, 0x1, 0x0, 0x0, 0x40040d0}, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000080), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000080)=0x7, 0x4) [ 246.913619] VFS: Found a V7 FS (block size = 512) on device loop1 [ 246.922914] FAULT_INJECTION: forcing a failure. [ 246.922914] name failslab, interval 1, probability 0, space 0, times 0 [ 246.974012] CPU: 1 PID: 14039 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 246.981947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.991317] Call Trace: [ 246.993926] dump_stack+0x22c/0x33e [ 246.997555] should_fail.cold+0xa/0x2f [ 247.001463] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 247.006579] ? lock_acquire+0x170/0x3f0 [ 247.010562] __should_failslab+0x153/0x1b6 [ 247.014817] should_failslab+0x5/0xf [ 247.018543] kmem_cache_alloc_node_trace+0x244/0x4d0 [ 247.023670] __kmalloc_node+0x38/0x70 [ 247.027477] kvmalloc_node+0x61/0xf0 [ 247.031198] alloc_fdtable+0xee/0x2a0 [ 247.035002] dup_fd+0x6bb/0xc30 [ 247.038291] unshare_files+0x16c/0x260 [ 247.042180] ? __ia32_sys_unshare+0x40/0x40 [ 247.046498] ? find_held_lock+0x2d/0x110 [ 247.050557] ? cache_alloc_refill+0x351/0x410 [ 247.055079] __do_execve_file+0x2c2/0x23c0 [ 247.059315] ? do_raw_spin_lock+0xcb/0x220 [ 247.063547] ? open_exec+0x70/0x70 [ 247.067083] ? check_preemption_disabled+0x41/0x2b0 [ 247.072103] ? __check_object_size+0x17b/0x3dd [ 247.076706] do_execveat+0x3d/0x50 [ 247.080252] __x64_sys_execveat+0xe1/0x120 [ 247.084505] do_syscall_64+0xf9/0x670 [ 247.088308] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.093493] RIP: 0033:0x45de59 [ 247.096686] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 247.115588] RSP: 002b:00007f6571234c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 04:12:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x409, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 247.123294] RAX: ffffffffffffffda RBX: 0000000000002d40 RCX: 000000000045de59 [ 247.130560] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 247.137829] RBP: 00007f6571234ca0 R08: 0000000000001000 R09: 0000000000000000 [ 247.145115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 247.152383] R13: 00007ffedf47f0cf R14: 00007f65712359c0 R15: 000000000118bf2c 04:12:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x21, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:06 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x9, 0x0, 0x0) 04:12:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x2000000, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:06 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000040)={0x3, 'veth0_vlan\x00', {0x8}, 0x5e55}) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46ce27b90300060000000000000000b738000000000035f4c38422a3bc822000050034bf53380300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1000000000000000000536431c8dd3dd4f172a518a2fb851467310552"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 247.222974] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x40a, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x40b, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x22, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x4000000, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:07 executing program 5 (fault-call:3 fault-nth:5): clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 247.407648] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:07 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x60, 0x0, 0x0) 04:12:07 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8c6f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000504e9bad7ff070000ff7165cc61da3edba2d806f3394f2ba897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x410, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x23, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 247.520680] sysv_free_inode: inode 0,1,2 or nonexistent inode [ 247.548014] FAULT_INJECTION: forcing a failure. [ 247.548014] name failslab, interval 1, probability 0, space 0, times 0 04:12:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x5000000, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 247.644113] CPU: 1 PID: 14087 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 247.647899] VFS: Found a V7 FS (block size = 512) on device loop1 [ 247.652024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.652031] Call Trace: [ 247.652056] dump_stack+0x22c/0x33e [ 247.652083] should_fail.cold+0xa/0x2f [ 247.652105] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 247.652122] ? lock_acquire+0x170/0x3f0 [ 247.652153] __should_failslab+0x153/0x1b6 [ 247.691053] should_failslab+0x5/0xf [ 247.694768] kmem_cache_alloc_node_trace+0x244/0x4d0 [ 247.699878] __kmalloc_node+0x38/0x70 [ 247.703696] kvmalloc_node+0x61/0xf0 [ 247.707407] alloc_fdtable+0x15a/0x2a0 [ 247.711293] dup_fd+0x6bb/0xc30 [ 247.714601] unshare_files+0x16c/0x260 [ 247.718501] ? __ia32_sys_unshare+0x40/0x40 [ 247.722819] ? find_held_lock+0x2d/0x110 [ 247.726896] ? cache_alloc_refill+0x351/0x410 [ 247.731394] __do_execve_file+0x2c2/0x23c0 [ 247.735625] ? do_raw_spin_lock+0xcb/0x220 [ 247.739879] ? open_exec+0x70/0x70 [ 247.743415] ? check_preemption_disabled+0x41/0x2b0 [ 247.748447] ? __check_object_size+0x17b/0x3dd [ 247.753052] do_execveat+0x3d/0x50 [ 247.756611] __x64_sys_execveat+0xe1/0x120 [ 247.760875] do_syscall_64+0xf9/0x670 [ 247.764693] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.769879] RIP: 0033:0x45de59 [ 247.773067] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:12:07 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8bdffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1d7d7bfc07cadd36c8d7f08615b44d0659c8be2911c154c07dbf3272c49f8eb8f0eff2af7f90e027f2a7603525bfabcbe6122854429965ce6a2433953b4836ff7695b8c9bace2fb8ed2c9785a677d48103186ec0b69188600d3bf5b31b3e36720801c0bb4dfc4"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 247.791962] RSP: 002b:00007f6571234c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 247.799666] RAX: ffffffffffffffda RBX: 0000000000002d40 RCX: 000000000045de59 [ 247.806929] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 247.814196] RBP: 00007f6571234ca0 R08: 0000000000001000 R09: 0000000000000000 [ 247.821463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 247.828727] R13: 00007ffedf47f0cf R14: 00007f65712359c0 R15: 000000000118bf2c 04:12:07 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0xf0, 0x0, 0x0) 04:12:07 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101000, 0x0) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000200)={'syztnl1\x00', 0x0, 0x29, 0x6, 0x2, 0x8, 0x20, @private1, @private1={0xfc, 0x1, [], 0x1}, 0x80, 0x700, 0xfff, 0x1000}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000380)={'ip_vti0\x00', &(0x7f00000002c0)={'syztnl0\x00', r2, 0x7, 0x1, 0x50, 0x0, {{0x1c, 0x4, 0x1, 0x5, 0x70, 0x65, 0x0, 0x0, 0x2f, 0x0, @rand_addr=0x64010101, @rand_addr=0x64010101, {[@ra={0x94, 0x4}, @cipso={0x86, 0x52, 0x0, [{0x1, 0x11, "877366d7a8e61986e19b715ca42ea5"}, {0x1, 0xd, "610849dcccece5e9d5c5b2"}, {0x1, 0xf, "6f7ccc15116a6fe7b4d77f46ff"}, {0x5, 0xb, "3bdcc85a4ab27194ab"}, {0x2, 0x5, 'N2R'}, {0x7, 0xf, "c21a01d7a477a62017c9886ebc"}]}, @end, @ra={0x94, 0x4, 0x1}]}}}}}) [ 247.911305] sysv_free_inode: inode 0,1,2 or nonexistent inode [ 247.954374] Unknown ioctl 35312 04:12:07 executing program 3: clone(0x2110019bfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1d19e39a1d7c119ed88542153b899f021b48cac6297a9313f6fcf0edc7945d252074217a8d49cf64d5cf9c382b87c000000004000000068d4d772cf280fce28d0093a1ba9dc5b789ae9068168"], 0xd8) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x210900, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r2, 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r3, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r3, 0x8941, &(0x7f0000000180)=@get={0x1, &(0x7f00000001c0)=""/31, 0x80}) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r2, 0xf502, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x6000000, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x43e, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 248.088674] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:07 executing program 5 (fault-call:3 fault-nth:6): clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x24, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x2000, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7000000, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:07 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f00000000c0)={0x101, 0x4, 0x2}) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4fb8422a3bc8220000500000004020300a51800000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'tunl0\x00'}}, 0x1e) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'vlan1\x00', {0x2, 0x0, @dev}}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:07 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x273, 0x0, 0x0) [ 248.184178] sysv_free_inode: inode 0,1,2 or nonexistent inode [ 248.235297] FAULT_INJECTION: forcing a failure. [ 248.235297] name failslab, interval 1, probability 0, space 0, times 0 04:12:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0xc002, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 248.314098] CPU: 0 PID: 14151 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 248.322036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.331934] Call Trace: [ 248.334531] dump_stack+0x22c/0x33e [ 248.338174] should_fail.cold+0xa/0x2f [ 248.342073] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 248.347183] ? lock_acquire+0x170/0x3f0 [ 248.351178] __should_failslab+0x153/0x1b6 [ 248.355450] should_failslab+0x5/0xf [ 248.359176] kmem_cache_alloc_trace+0x2b6/0x4b0 [ 248.363862] __do_execve_file+0x370/0x23c0 [ 248.368111] ? do_raw_spin_lock+0xcb/0x220 [ 248.372366] ? open_exec+0x70/0x70 [ 248.375940] ? check_preemption_disabled+0x41/0x2b0 [ 248.380973] ? __check_object_size+0x17b/0x3dd [ 248.385574] do_execveat+0x3d/0x50 [ 248.389138] __x64_sys_execveat+0xe1/0x120 [ 248.393385] do_syscall_64+0xf9/0x670 [ 248.397199] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.402416] RIP: 0033:0x45de59 [ 248.405614] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 248.424519] RSP: 002b:00007f6571234c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 248.432234] RAX: ffffffffffffffda RBX: 0000000000002d40 RCX: 000000000045de59 [ 248.439534] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 248.446811] RBP: 00007f6571234ca0 R08: 0000000000001000 R09: 0000000000000000 [ 248.454083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 04:12:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x25, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x8000000, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 248.461380] R13: 00007ffedf47f0cf R14: 00007f65712359c0 R15: 000000000118bf2c 04:12:08 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000040)=""/43) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 248.531311] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x2, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:08 executing program 5 (fault-call:3 fault-nth:7): clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:08 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x900, 0x0, 0x0) 04:12:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0xa000000, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 248.633544] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:08 executing program 3: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300000000000000500004e9bad7ff070000a897ff080011000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a990900000047d1"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) r2 = eventfd(0x6) dup3(r1, r2, 0x80000) 04:12:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x26, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x3, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0xf000000, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 248.738378] FAULT_INJECTION: forcing a failure. [ 248.738378] name failslab, interval 1, probability 0, space 0, times 0 [ 248.798616] VFS: Found a V7 FS (block size = 512) on device loop1 [ 248.825283] CPU: 0 PID: 14199 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 248.833190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.842549] Call Trace: [ 248.845154] dump_stack+0x22c/0x33e [ 248.848795] should_fail.cold+0xa/0x2f [ 248.852721] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 248.857849] __should_failslab+0x153/0x1b6 [ 248.862094] should_failslab+0x5/0xf [ 248.865826] __kmalloc_track_caller+0x2d8/0x4e0 [ 248.870504] ? selinux_cred_prepare+0x44/0xa0 [ 248.875013] kmemdup+0x23/0x50 [ 248.878281] selinux_cred_prepare+0x44/0xa0 [ 248.882617] security_prepare_creds+0x50/0xb0 [ 248.887124] prepare_creds+0x32d/0x510 [ 248.891020] prepare_exec_creds+0xd/0xf0 [ 248.895079] __do_execve_file+0x3de/0x23c0 [ 248.899314] ? should_fail+0x142/0x7d8 [ 248.903200] ? fs_reclaim_release+0xd0/0x110 [ 248.907608] ? open_exec+0x70/0x70 [ 248.911148] ? check_preemption_disabled+0x41/0x2b0 [ 248.916167] ? __check_object_size+0x17b/0x3dd [ 248.920774] do_execveat+0x3d/0x50 [ 248.924333] __x64_sys_execveat+0xe1/0x120 [ 248.928574] do_syscall_64+0xf9/0x670 [ 248.932391] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.937587] RIP: 0033:0x45de59 [ 248.940777] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 248.959674] RSP: 002b:00007f6571234c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 248.967393] RAX: ffffffffffffffda RBX: 0000000000002d40 RCX: 000000000045de59 [ 248.974661] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 248.981946] RBP: 00007f6571234ca0 R08: 0000000000001000 R09: 0000000000000000 [ 248.989207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 04:12:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x100000, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:08 executing program 5 (fault-call:3 fault-nth:8): clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 248.996489] R13: 00007ffedf47f0cf R14: 00007f65712359c0 R15: 000000000118bf2c 04:12:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x27, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000140)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,nfs_export=on']) rmdir(&(0x7f0000000080)='./bus/file0\x00') 04:12:08 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x3f00, 0x0, 0x0) 04:12:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x4, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x10000000, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 249.120643] FAULT_INJECTION: forcing a failure. [ 249.120643] name failslab, interval 1, probability 0, space 0, times 0 [ 249.144449] sysv_free_inode: inode 0,1,2 or nonexistent inode [ 249.177426] CPU: 1 PID: 14227 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 249.185341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.194700] Call Trace: [ 249.197299] dump_stack+0x22c/0x33e [ 249.200947] should_fail.cold+0xa/0x2f [ 249.204843] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 249.209989] __should_failslab+0x153/0x1b6 [ 249.214226] should_failslab+0x5/0xf [ 249.217949] __kmalloc_track_caller+0x2d8/0x4e0 [ 249.222617] ? selinux_cred_prepare+0x44/0xa0 [ 249.227114] kmemdup+0x23/0x50 [ 249.230305] selinux_cred_prepare+0x44/0xa0 [ 249.234626] security_prepare_creds+0x50/0xb0 [ 249.239141] prepare_creds+0x32d/0x510 [ 249.243039] prepare_exec_creds+0xd/0xf0 [ 249.247097] __do_execve_file+0x3de/0x23c0 [ 249.251337] ? do_raw_spin_lock+0xcb/0x220 [ 249.255573] ? open_exec+0x70/0x70 [ 249.259109] ? check_preemption_disabled+0x41/0x2b0 [ 249.264128] ? __check_object_size+0x17b/0x3dd [ 249.268715] do_execveat+0x3d/0x50 [ 249.272256] __x64_sys_execveat+0xe1/0x120 [ 249.276491] do_syscall_64+0xf9/0x670 [ 249.280314] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.285506] RIP: 0033:0x45de59 [ 249.288693] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 249.307589] RSP: 002b:00007f6571234c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 249.315294] RAX: ffffffffffffffda RBX: 0000000000002d40 RCX: 000000000045de59 [ 249.322562] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 249.329825] RBP: 00007f6571234ca0 R08: 0000000000001000 R09: 0000000000000000 [ 249.337088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 249.344373] R13: 00007ffedf47f0cf R14: 00007f65712359c0 R15: 000000000118bf2c [ 249.405154] overlayfs: failed to resolve './file0': -2 04:12:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x6, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:09 executing program 5 (fault-call:3 fault-nth:9): clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:09 executing program 3: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) rt_sigsuspend(&(0x7f0000000100)={[0x80]}, 0x8) close(r2) bind$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x10000, @loopback, 0x8, 0x3}, 0x20) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000180)=0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d400000019001905000000000000000002200000ff02ff000000000000000100ac14140018009400111a8200040090f7c10f4b31901b77481e35fd008a0009"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000240)={'syztnl2\x00', &(0x7f00000001c0)={'ip6gre0\x00', 0x0, 0x2f, 0x3f, 0x20, 0x42971441, 0x24, @dev={0xfe, 0x80, [], 0x2a}, @private0, 0x700, 0x7, 0x1, 0x2}}) splice(r0, 0x0, r2, 0x0, 0x10000000004ffe0, 0x0) [ 249.438786] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:09 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x6000, 0x0, 0x0) 04:12:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x1e000000, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 249.526286] sysv_free_inode: inode 0,1,2 or nonexistent inode [ 249.533954] FAULT_INJECTION: forcing a failure. [ 249.533954] name failslab, interval 1, probability 0, space 0, times 0 [ 249.566760] CPU: 0 PID: 14253 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 249.574687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.584061] Call Trace: [ 249.586688] dump_stack+0x22c/0x33e [ 249.590326] should_fail.cold+0xa/0x2f [ 249.594233] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 249.599381] __should_failslab+0x153/0x1b6 [ 249.603637] should_failslab+0x5/0xf [ 249.607359] kmem_cache_alloc+0x2b1/0x4a0 [ 249.611608] __alloc_file+0x21/0x330 04:12:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x8, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 249.615331] alloc_empty_file+0x6d/0x170 [ 249.619415] path_openat+0x12b/0x2e90 [ 249.623260] ? kasan_kmalloc+0x139/0x160 [ 249.627344] ? path_lookupat+0x8d0/0x8d0 [ 249.631410] ? __kmalloc_track_caller+0x155/0x4e0 [ 249.636253] ? kmemdup+0x23/0x50 [ 249.639680] ? selinux_cred_prepare+0x44/0xa0 [ 249.644178] ? security_prepare_creds+0x50/0xb0 [ 249.648862] ? prepare_creds+0x32d/0x510 [ 249.652906] ? prepare_exec_creds+0xd/0xf0 [ 249.657125] ? __do_execve_file+0x3de/0x23c0 [ 249.661534] ? do_execveat+0x3d/0x50 [ 249.665230] ? __x64_sys_execveat+0xe1/0x120 [ 249.669622] ? do_syscall_64+0xf9/0x670 [ 249.673590] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.678948] ? kasan_kmalloc+0x139/0x160 [ 249.682993] ? mark_held_locks+0xf0/0xf0 [ 249.687049] do_filp_open+0x18c/0x3f0 [ 249.690839] ? may_open_dev+0xf0/0xf0 [ 249.694621] ? __lock_acquire+0x6ec/0x3ff0 [ 249.698873] ? lock_downgrade+0x750/0x750 [ 249.703018] ? lock_acquire+0x170/0x3f0 [ 249.706991] ? cache_alloc_refill+0xc5/0x410 [ 249.711403] ? mark_held_locks+0xf0/0xf0 [ 249.715454] do_open_execat+0x11d/0x5b0 [ 249.719412] ? __do_execve_file+0x834/0x23c0 [ 249.723803] ? __se_sys_uselib+0x400/0x400 [ 249.728025] ? lock_acquire+0x170/0x3f0 [ 249.731981] ? __do_execve_file+0x509/0x23c0 [ 249.736389] ? check_preemption_disabled+0x41/0x2b0 [ 249.741406] __do_execve_file+0x1ad4/0x23c0 [ 249.745713] ? open_exec+0x70/0x70 [ 249.749251] ? check_preemption_disabled+0x41/0x2b0 [ 249.754310] ? __check_object_size+0x17b/0x3dd [ 249.758928] do_execveat+0x3d/0x50 [ 249.762456] __x64_sys_execveat+0xe1/0x120 [ 249.766678] do_syscall_64+0xf9/0x670 [ 249.770468] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.775641] RIP: 0033:0x45de59 [ 249.778818] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 249.797704] RSP: 002b:00007f6571234c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 249.805420] RAX: ffffffffffffffda RBX: 0000000000002d40 RCX: 000000000045de59 04:12:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x29, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 249.812687] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 249.819938] RBP: 00007f6571234ca0 R08: 0000000000001000 R09: 0000000000000000 [ 249.827207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 [ 249.834504] R13: 00007ffedf47f0cf R14: 00007f65712359c0 R15: 000000000118bf2c 04:12:09 executing program 5 (fault-call:3 fault-nth:10): clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 249.908366] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:09 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x7302, 0x0, 0x0) [ 249.988291] FAULT_INJECTION: forcing a failure. [ 249.988291] name failslab, interval 1, probability 0, space 0, times 0 04:12:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x33000000, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2a, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xa, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 250.031862] sysv_free_inode: inode 0,1,2 or nonexistent inode [ 250.053794] CPU: 1 PID: 14280 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 250.061695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.071046] Call Trace: [ 250.073686] dump_stack+0x22c/0x33e [ 250.077347] should_fail.cold+0xa/0x2f [ 250.081267] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 250.086407] __should_failslab+0x153/0x1b6 [ 250.090678] should_failslab+0x5/0xf [ 250.094396] kmem_cache_alloc+0x2b1/0x4a0 [ 250.098556] selinux_file_alloc_security+0xe4/0x1c0 [ 250.103581] security_file_alloc+0x40/0x90 [ 250.107825] __alloc_file+0xc9/0x330 [ 250.111564] alloc_empty_file+0x6d/0x170 [ 250.115632] path_openat+0x12b/0x2e90 [ 250.119455] ? kasan_kmalloc+0x139/0x160 [ 250.123542] ? path_lookupat+0x8d0/0x8d0 [ 250.127609] ? __kmalloc_track_caller+0x155/0x4e0 [ 250.132478] ? kmemdup+0x23/0x50 [ 250.135850] ? selinux_cred_prepare+0x44/0xa0 [ 250.140349] ? security_prepare_creds+0x50/0xb0 [ 250.145019] ? prepare_creds+0x32d/0x510 [ 250.149082] ? prepare_exec_creds+0xd/0xf0 [ 250.153323] ? __do_execve_file+0x3de/0x23c0 [ 250.157759] ? do_execveat+0x3d/0x50 [ 250.161500] ? __x64_sys_execveat+0xe1/0x120 [ 250.165913] ? do_syscall_64+0xf9/0x670 [ 250.169895] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.175262] ? kasan_kmalloc+0x139/0x160 [ 250.179329] ? mark_held_locks+0xf0/0xf0 [ 250.183396] do_filp_open+0x18c/0x3f0 [ 250.187201] ? may_open_dev+0xf0/0xf0 [ 250.191005] ? __lock_acquire+0x6ec/0x3ff0 [ 250.195250] ? find_held_lock+0x2d/0x110 [ 250.199314] ? should_fail+0x142/0x7d8 [ 250.203208] ? fs_reclaim_release+0xd0/0x110 [ 250.207644] ? mark_held_locks+0xf0/0xf0 [ 250.211772] do_open_execat+0x11d/0x5b0 [ 250.215752] ? __do_execve_file+0x834/0x23c0 [ 250.220187] ? __se_sys_uselib+0x400/0x400 [ 250.224452] ? lock_acquire+0x170/0x3f0 [ 250.228452] ? __do_execve_file+0x509/0x23c0 [ 250.232867] ? check_preemption_disabled+0x41/0x2b0 [ 250.238239] __do_execve_file+0x1ad4/0x23c0 [ 250.242569] ? open_exec+0x70/0x70 [ 250.246114] ? check_preemption_disabled+0x41/0x2b0 [ 250.251143] ? __check_object_size+0x17b/0x3dd [ 250.255739] do_execveat+0x3d/0x50 [ 250.259290] __x64_sys_execveat+0xe1/0x120 [ 250.263551] do_syscall_64+0xf9/0x670 [ 250.267363] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.272573] RIP: 0033:0x45de59 [ 250.275771] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 250.294705] RSP: 002b:00007f6571234c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 250.302415] RAX: ffffffffffffffda RBX: 0000000000002d40 RCX: 000000000045de59 [ 250.309694] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 250.316997] RBP: 00007f6571234ca0 R08: 0000000000001000 R09: 0000000000000000 [ 250.324288] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000a 04:12:10 executing program 5 (fault-call:3 fault-nth:11): clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 250.331581] R13: 00007ffedf47f0cf R14: 00007f65712359c0 R15: 000000000118bf2c [ 250.449942] FAULT_INJECTION: forcing a failure. [ 250.449942] name failslab, interval 1, probability 0, space 0, times 0 [ 250.489187] VFS: Found a V7 FS (block size = 512) on device loop1 [ 250.526714] CPU: 0 PID: 14291 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 250.534619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.544004] Call Trace: [ 250.546599] dump_stack+0x22c/0x33e [ 250.550241] should_fail.cold+0xa/0x2f [ 250.554141] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 250.559269] __should_failslab+0x153/0x1b6 [ 250.563515] should_failslab+0x5/0xf [ 250.567238] __kmalloc_track_caller+0x2d8/0x4e0 [ 250.571920] ? kasprintf+0xbb/0xf0 [ 250.575467] ? select_task_rq_fair+0x759/0x3830 [ 250.580144] kvasprintf+0xb5/0x150 [ 250.583701] ? bust_spinlocks+0xe0/0xe0 [ 250.587698] kasprintf+0xbb/0xf0 [ 250.591076] ? kvasprintf_const+0x190/0x190 [ 250.595409] ? sched_exec+0x19c/0x1e0 [ 250.599213] ? get_iowait_load+0x180/0x180 [ 250.603454] ? lock_acquire+0x170/0x3f0 [ 250.607435] ? __do_execve_file+0x509/0x23c0 [ 250.611879] ? check_preemption_disabled+0x41/0x2b0 [ 250.616928] __do_execve_file+0x994/0x23c0 [ 250.621185] ? open_exec+0x70/0x70 [ 250.624755] ? check_preemption_disabled+0x41/0x2b0 [ 250.629786] ? __check_object_size+0x17b/0x3dd [ 250.634387] do_execveat+0x3d/0x50 [ 250.637964] __x64_sys_execveat+0xe1/0x120 [ 250.642212] do_syscall_64+0xf9/0x670 [ 250.646024] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.651218] RIP: 0033:0x45de59 [ 250.654416] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 250.673408] RSP: 002b:00007f6571234c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 250.681149] RAX: ffffffffffffffda RBX: 0000000000002d40 RCX: 000000000045de59 [ 250.688429] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 250.695700] RBP: 00007f6571234ca0 R08: 0000000000001000 R09: 0000000000000000 [ 250.702971] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000b [ 250.710244] R13: 00007ffedf47f0cf R14: 00007f65712359c0 R15: 000000000118bf2c 04:12:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x48, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x501}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_TXQLEN={0x8, 0xd, 0xffffffff}]}, 0x48}}, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) 04:12:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2b, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:10 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0xa3ee, 0x0, 0x0) 04:12:10 executing program 5 (fault-call:3 fault-nth:12): clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xc, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 250.742889] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x3f000000, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 250.894211] FAULT_INJECTION: forcing a failure. [ 250.894211] name failslab, interval 1, probability 0, space 0, times 0 [ 250.895614] batman_adv: Cannot find parent device [ 250.920658] VFS: Found a V7 FS (block size = 512) on device loop1 [ 250.928762] CPU: 0 PID: 14323 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 250.936681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.946056] Call Trace: [ 250.948645] dump_stack+0x22c/0x33e [ 250.952277] should_fail.cold+0xa/0x2f [ 250.956164] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 250.961274] __should_failslab+0x153/0x1b6 [ 250.965525] should_failslab+0x5/0xf [ 250.969240] kmem_cache_alloc+0x2b1/0x4a0 [ 250.973387] ? check_preemption_disabled+0x41/0x2b0 [ 250.978403] mm_alloc+0x19/0x100 [ 250.981768] __do_execve_file+0xb16/0x23c0 [ 250.986029] ? open_exec+0x70/0x70 [ 250.989593] ? check_preemption_disabled+0x41/0x2b0 [ 250.994615] ? __check_object_size+0x17b/0x3dd [ 250.999202] do_execveat+0x3d/0x50 [ 251.002745] __x64_sys_execveat+0xe1/0x120 [ 251.006981] do_syscall_64+0xf9/0x670 [ 251.010807] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.015992] RIP: 0033:0x45de59 [ 251.019189] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:12:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2c, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 251.038087] RSP: 002b:00007f6571234c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 251.045793] RAX: ffffffffffffffda RBX: 0000000000002d40 RCX: 000000000045de59 [ 251.053058] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 251.060322] RBP: 00007f6571234ca0 R08: 0000000000001000 R09: 0000000000000000 [ 251.067597] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000c [ 251.074861] R13: 00007ffedf47f0cf R14: 00007f65712359c0 R15: 000000000118bf2c [ 251.089695] ip6gretap1: activation failed 04:12:10 executing program 5 (fault-call:3 fault-nth:13): clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 251.094099] device ip6gretap1 entered promiscuous mode [ 251.114691] IPv6: ADDRCONF(NETDEV_UP): ip6gretap1: link is not ready 04:12:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x40000000, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:10 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0xeea3, 0x0, 0x0) 04:12:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xe, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x4020, &(0x7f00000001c0)=ANY=[]) 04:12:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2d, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 251.209126] sysv_free_inode: inode 0,1,2 or nonexistent inode [ 251.244179] FAULT_INJECTION: forcing a failure. [ 251.244179] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:12:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x8c000000, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 251.305997] CPU: 0 PID: 14340 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 251.313906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.323288] Call Trace: [ 251.325888] dump_stack+0x22c/0x33e [ 251.329552] should_fail.cold+0xa/0x2f [ 251.333450] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 251.338576] __alloc_pages_nodemask+0x256/0x2a60 [ 251.343350] ? unwind_get_return_address+0x51/0x90 [ 251.348312] ? __save_stack_trace+0x99/0x100 [ 251.352771] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 251.353468] VFS: Found a V7 FS (block size = 512) on device loop1 [ 251.357619] ? __do_execve_file+0xb16/0x23c0 [ 251.357632] ? do_execveat+0x3d/0x50 [ 251.357644] ? __x64_sys_execveat+0xe1/0x120 [ 251.357659] ? do_syscall_64+0xf9/0x670 [ 251.357677] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.385718] ? mark_held_locks+0xf0/0xf0 [ 251.389785] ? pointer+0x850/0x850 [ 251.393335] ? __kmalloc_track_caller+0x431/0x4e0 [ 251.398202] ? kasprintf+0xbb/0xf0 [ 251.401761] ? kvasprintf+0xe9/0x150 04:12:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2e, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 251.405507] alloc_pages_current+0x19d/0x2c0 [ 251.409928] __get_free_pages+0x8/0x40 [ 251.413824] pgd_alloc+0x7e/0x3f0 [ 251.417287] ? pgd_page_get_mm+0x40/0x40 [ 251.421359] ? __lockdep_init_map+0x100/0x5c0 [ 251.425868] mm_init+0x572/0x980 [ 251.429246] mm_alloc+0xb6/0x100 [ 251.432619] __do_execve_file+0xb16/0x23c0 [ 251.436870] ? open_exec+0x70/0x70 [ 251.440426] ? check_preemption_disabled+0x41/0x2b0 [ 251.445456] ? __check_object_size+0x17b/0x3dd [ 251.451728] do_execveat+0x3d/0x50 [ 251.455282] __x64_sys_execveat+0xe1/0x120 [ 251.459530] do_syscall_64+0xf9/0x670 [ 251.463369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.468587] RIP: 0033:0x45de59 [ 251.471783] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 251.490694] RSP: 002b:00007f6571234c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 251.498432] RAX: ffffffffffffffda RBX: 0000000000002d40 RCX: 000000000045de59 04:12:11 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0xf000, 0x0, 0x0) [ 251.505703] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 251.512978] RBP: 00007f6571234ca0 R08: 0000000000001000 R09: 0000000000000000 [ 251.520253] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000d [ 251.527526] R13: 00007ffedf47f0cf R14: 00007f65712359c0 R15: 000000000118bf2c [ 251.547745] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2f, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xf, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0xff000000, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:11 executing program 5 (fault-call:3 fault-nth:14): clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2d, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x30, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 251.754243] FAULT_INJECTION: forcing a failure. [ 251.754243] name failslab, interval 1, probability 0, space 0, times 0 [ 251.761316] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x10, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 251.849505] CPU: 1 PID: 14382 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 251.857419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.866774] Call Trace: [ 251.869398] dump_stack+0x22c/0x33e [ 251.873041] should_fail.cold+0xa/0x2f [ 251.876963] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 251.882113] __should_failslab+0x153/0x1b6 [ 251.886365] should_failslab+0x5/0xf [ 251.890088] kmem_cache_alloc+0x2b1/0x4a0 [ 251.894250] vm_area_alloc+0x1c/0x110 [ 251.898063] __do_execve_file+0xca0/0x23c0 [ 251.902316] ? open_exec+0x70/0x70 [ 251.905873] ? check_preemption_disabled+0x41/0x2b0 [ 251.910906] ? __check_object_size+0x17b/0x3dd [ 251.915506] do_execveat+0x3d/0x50 [ 251.919064] __x64_sys_execveat+0xe1/0x120 [ 251.923313] do_syscall_64+0xf9/0x670 [ 251.927127] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.932349] RIP: 0033:0x45de59 [ 251.935546] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 251.954448] RSP: 002b:00007f6571234c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 251.962164] RAX: ffffffffffffffda RBX: 0000000000002d40 RCX: 000000000045de59 [ 251.969450] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 251.976724] RBP: 00007f6571234ca0 R08: 0000000000001000 R09: 0000000000000000 [ 251.984000] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000e [ 251.991296] R13: 00007ffedf47f0cf R14: 00007f65712359c0 R15: 000000000118bf2c 04:12:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x60, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:11 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0xff0f, 0x0, 0x0) 04:12:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x31, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2d, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 251.999090] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xf0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:11 executing program 5 (fault-call:3 fault-nth:15): clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 252.174163] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:11 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x20000, 0x0, 0x0) 04:12:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x32, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 252.254538] sysv_free_inode: inode 0,1,2 or nonexistent inode [ 252.258382] FAULT_INJECTION: forcing a failure. [ 252.258382] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 252.306207] CPU: 1 PID: 14418 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 252.314144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.323521] Call Trace: [ 252.326118] dump_stack+0x22c/0x33e [ 252.329756] should_fail.cold+0xa/0x2f [ 252.333687] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 252.338807] __alloc_pages_nodemask+0x256/0x2a60 [ 252.343598] ? mark_held_locks+0xf0/0xf0 [ 252.347673] ? lock_downgrade+0x750/0x750 [ 252.351835] ? find_held_lock+0x2d/0x110 [ 252.355913] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 252.360760] ? current_time+0x6f/0x1c0 [ 252.364670] ? __lock_acquire+0x6ec/0x3ff0 [ 252.368923] alloc_pages_current+0x19d/0x2c0 [ 252.373344] get_zeroed_page+0x10/0x40 [ 252.377235] __pud_alloc+0x33/0x280 [ 252.380871] __handle_mm_fault+0x135e/0x4370 [ 252.385295] ? vmf_insert_mixed_mkwrite+0xa0/0xa0 [ 252.388071] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. [ 252.390141] ? find_held_lock+0x2d/0x110 [ 252.390167] ? mark_held_locks+0xa6/0xf0 [ 252.390182] ? check_preemption_disabled+0x41/0x2b0 [ 252.390201] handle_mm_fault+0x489/0xb90 [ 252.415973] __get_user_pages+0x58d/0x16b0 [ 252.420223] ? follow_page_mask+0x1db0/0x1db0 [ 252.424725] ? __se_sys_copy_file_range+0x410/0x410 [ 252.429751] ? fsnotify+0x99c/0xd80 [ 252.433386] ? __fsnotify_parent+0xd1/0x31c [ 252.437726] get_user_pages_remote+0x220/0x4a0 [ 252.442329] copy_strings.isra.0+0x499/0xa00 [ 252.446757] ? flush_old_exec+0x1c50/0x1c50 [ 252.451084] ? prepare_binprm+0x6d3/0x910 [ 252.455234] ? lock_downgrade+0x750/0x750 [ 252.459386] ? set_binfmt+0x130/0x130 [ 252.463196] copy_strings_kernel+0x9e/0x110 [ 252.467551] __do_execve_file+0x106d/0x23c0 [ 252.471904] ? open_exec+0x70/0x70 [ 252.475450] ? check_preemption_disabled+0x41/0x2b0 [ 252.480479] ? __check_object_size+0x17b/0x3dd [ 252.485096] do_execveat+0x3d/0x50 [ 252.488681] __x64_sys_execveat+0xe1/0x120 [ 252.492964] do_syscall_64+0xf9/0x670 [ 252.496776] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.501990] RIP: 0033:0x45de59 [ 252.505185] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 252.524113] RSP: 002b:00007f6571234c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 252.531826] RAX: ffffffffffffffda RBX: 0000000000002d40 RCX: 000000000045de59 [ 252.539095] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 252.546389] RBP: 00007f6571234ca0 R08: 0000000000001000 R09: 0000000000000000 04:12:12 executing program 3: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000fc0)=ANY=[@ANYBLOB="480000001000050700"/19, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0xfffffffe, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000001100250137b100000000000010000000", @ANYRES32=r6], 0x20}}, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) r8 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="4c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012800b0001006272696467650000140002800500070006000000060027000000000008000a00", @ANYRES32=r9], 0x4c}}, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001000)=@newtfilter={0x6874, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0x10}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x6844, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0x12}}, @TCA_BASIC_EMATCHES={0xe4, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x6}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xfff}}, @TCA_EMATCH_TREE_LIST={0xd0, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xcc, 0x1, 0x0, 0x0, {{0x8, 0x0, 0x5}, "43e67057865aca1977c74dee3a3cc06d4cd64617755a36330b7d03b8b7406988068749e432ad92467818ec89e39e053d3575ea85f17a7c236ca7a964d9f5c601106e5e938efe82a6d6415ed7099fb5907f2f79e7b26ebc97faf5bae7b0ac09b50579803df6be3c4b9e01a257341503ae6fa99c3a232dd485ea7c85cddc23ac8c379ba4077447eac826349f52de636fcd7c6b071b16f7d1dd6ca62793720d96d521f05c9e73e60a6f82af16968c7881071e7bbb414b5ce8ee243b1ffd7245ab"}}]}]}, @TCA_BASIC_ACT={0x4f08, 0x3, [@m_mirred={0x148, 0x11, 0x0, 0x0, {{0xb, 0x1, 'mirred\x00'}, {0x64, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x20, 0x6, 0x3, 0xfffffe00, 0x1}, 0x4, r3}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x4, 0x15ced787, 0x5, 0x81, 0x40}, 0x3, r3}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x8, 0x6, 0x10000000, 0x5}, 0x1, r6}}]}, {0xba, 0x6, "a9eb6bb269fa578dfc9aa612c79639c4a7aa98975dc1f96adab88e6e3b0c92141b3369c9cc42391c4f01df8f74157abf583a4e28b38c295dd37c7fa0e60083cc99aa0bd0630c5db2362988214e89edde5d6b694dd9ab115b25f02228f31b9320ae4d0e8be589a1029146e1d5d315f5ef702a88c3266cf282e4e2d696358664d38f3565291889cae4a9b25e8720e92ba7061e80c89923c22b5b14a9d38121d24870044a198619246b06e55379e227d1dd8a82e30ceb40"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_skbmod={0x104, 0x1d, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0x1c, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x2}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x40}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x3}]}, {0xbd, 0x6, "620bef03fd9b655af386c25b497a2844410cef4d70a627fb866286e8fe23300198093be951fc2fab84b5fe36bd87cdea7846e13cbfc9e2d2be9c1505ca20e5724fd56276ecdfdbd6104fddf33f36f0aabf33fc93bcb63e87d188a67ae93e1e988eb133d78b2a295d120100591925cfef74e314861d90e838bda8ec1d633737f7f995d7c91019d05fc0a4275e20f291203a7150f6a982530ddcafbca0e838ff916365195721ed48d54c2f8ac98986d081ca9004723dd602a92c"}, {0xc}, {0xc, 0x8, {0x1}}}}, @m_pedit={0x4a7c, 0xf, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x49bc, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe68, 0x2, {{{0x401, 0x5, 0x20000001, 0x0, 0x7fff}, 0x8, 0x5, [{0xfe000000, 0x6, 0x1000, 0x93, 0x9, 0x3}, {0x4fb, 0x1000, 0x100, 0x3, 0x3ff, 0xfff}, {0xfffffffc, 0x10000, 0x27d0, 0x3, 0x7fffffff, 0x7}]}, [{0x5, 0x9, 0x81, 0x2, 0x0, 0x7}, {0x7f, 0x1, 0x1, 0x8, 0x4, 0xfff}, {0x4, 0x40, 0x1, 0x6, 0xfbb2, 0xfffffffa}, {0x87, 0x4, 0x4, 0x6, 0xfffffa36}, {0x8, 0x8000, 0x7, 0xffff, 0x4, 0x800}, {0x401, 0x0, 0x6, 0x57a3aeb1, 0x9, 0x9}, {0x240000, 0x3, 0x7, 0x0, 0x1, 0xa49}, {0x0, 0x8, 0x1, 0x5, 0x20000000, 0x4}, {0x3f, 0x7, 0x1, 0x80000001, 0x6, 0x81}, {0x403, 0x0, 0x2, 0x1000, 0x5, 0x7}, {0x1, 0xfaf, 0xfffffffe, 0x9, 0x7f, 0x1b1}, {0x3, 0x1f, 0x2, 0x1, 0x1, 0x6}, {0x7fff, 0x9, 0x6, 0x7f, 0x0, 0xffff}, {0x8000, 0xd3a, 0x10001, 0x3ff, 0x0, 0x9}, {0x2, 0x401, 0x7, 0x4, 0x10000000, 0xfff}, {0x3, 0x2, 0xe279, 0x400, 0x2, 0x2}, {0x6, 0x5, 0x3, 0x4, 0x8001, 0xffff}, {0x20, 0xff, 0x6, 0x100, 0xb, 0x4}, {0x4, 0x7, 0xffffffff, 0x5f2, 0x724, 0x1}, {0x9, 0x9, 0x7, 0x4, 0x5, 0x8}, {0x4, 0x0, 0x10000, 0xff, 0x8, 0x3}, {0x1, 0x8, 0x400, 0x8, 0x6, 0x2}, {0x4, 0xd, 0x58f6, 0x4, 0x9, 0x40}, {0x8, 0x6, 0x0, 0x80000001, 0x6, 0xc057}, {0x330, 0x9, 0x6, 0x4, 0xffff, 0xffffe7d9}, {0x5, 0x81, 0x6, 0x8001, 0x7, 0xc5}, {0xaa94, 0x5, 0x800, 0x1241, 0x400, 0x1c}, {0x2, 0x7, 0x1, 0x8, 0x2, 0x7d28}, {0x1, 0x1f, 0x8, 0x6a7f15c1, 0x9b, 0xc5c}, {0xfffffbff, 0x5c5fc430, 0x2, 0xfffffff7, 0x401}, {0x0, 0x7, 0x0, 0x5, 0x6, 0x6}, {0x0, 0x7, 0x1f500000, 0x800, 0x5, 0x3ff}, {0x80000001, 0xfffffd10, 0x2, 0x4507, 0x7, 0x8}, {0x8, 0x1000, 0x3, 0x5, 0x3, 0x38d4}, {0x7a, 0x8, 0x3, 0x80000000, 0x9, 0x64}, {0x0, 0xffff319a, 0x4, 0x5, 0x80000001}, {0x2, 0x6, 0x7f, 0x200, 0x4d3796ea, 0x200}, {0x1, 0x7, 0x0, 0x8, 0xfc0b, 0x8}, {0x3, 0x9, 0x6, 0x80000001, 0x7fff, 0x1}, {0x7f, 0x1, 0x0, 0x3, 0x7f, 0xe9e5}, {0xfffffff8, 0x8, 0x1, 0x1000, 0x2bc1, 0x1}, {0x100, 0x4, 0x8, 0x3ef7, 0x7, 0x101}, {0x9b, 0x9, 0xfff, 0x4, 0x8, 0x200}, {0xfff, 0x0, 0xff, 0x1, 0x6, 0x3}, {0x8, 0x3ff, 0x1, 0x5, 0xef53, 0x5}, {0x101, 0x8000, 0x1f, 0x6, 0x0, 0x2}, {0x1, 0x5f, 0x5, 0x98, 0x1, 0x400}, {0x4, 0x399, 0x44b1b9b1, 0x0, 0x6, 0x48}, {0x5, 0x519, 0xdb, 0x4a19, 0x0, 0x2}, {0x8, 0x3, 0x20, 0x0, 0x7fff, 0x7fffffff}, {0x10000, 0x25, 0xfff, 0x7, 0x8, 0x1}, {0x7dba, 0x8001, 0x2, 0x6, 0x3, 0xad0a}, {0x1, 0xfffffff9, 0x8, 0x9, 0xffffffd5, 0x20}, {0x6, 0x2400, 0x101, 0x7, 0x7, 0x8}, {0x0, 0x2, 0x8001, 0x408, 0x5, 0x3}, {0x8, 0xffffdc51, 0x8, 0x0, 0x1, 0xfffffe00}, {0x1f, 0x4, 0x800, 0xd5a9, 0x20, 0x8}, {0x4, 0x1f, 0x9, 0x2, 0x0, 0x7fff}, {0x6, 0x40, 0x0, 0x6e3af730, 0x0, 0x1}, {0x3f, 0x1, 0x7, 0x6, 0x4, 0x1}, {0x95, 0xffffff01, 0x0, 0x7, 0x442d, 0x3}, {0x1f, 0x4, 0x7f, 0x72af, 0x10001}, {0x7, 0x6, 0x1, 0x5be, 0x8000, 0xfffffffd}, {0x8, 0x3f, 0xc49, 0x6, 0x81, 0x3}, {0x8, 0x10001, 0x2, 0x7, 0x3, 0xfe3}, {0x9, 0xffffffff, 0x20, 0x6, 0x4, 0x6}, {0x7, 0x2, 0x9, 0xfffff928, 0x7, 0x8}, {0x3, 0x9, 0x7f, 0x200, 0x7, 0x1}, {0xfffff801, 0x26c, 0x6, 0x0, 0x1, 0x7f}, {0x8, 0x80000001, 0x8, 0x8, 0xfffff001, 0x8}, {0x0, 0x23, 0x8001, 0x4, 0x1, 0xfffffffa}, {0x80, 0x70000000, 0x81, 0x2, 0xa5f1, 0x5}, {0x0, 0x4, 0x0, 0x4, 0x3, 0x7f}, {0x3, 0x2, 0xffffff80, 0x2}, {0x80000001, 0x7fffffff, 0x4, 0x404, 0x80000001, 0x4dde}, {0x7, 0x6, 0x81, 0x6, 0x0, 0xbbf}, {0x3, 0x7ff, 0x5, 0x9, 0x2, 0x4}, {0xe4a, 0x1, 0x9, 0x2646, 0x401, 0x4}, {0x81, 0xffffffff, 0x3, 0x8, 0x8941, 0x7}, {0x5, 0x470, 0x6, 0x6, 0x1, 0x1}, {0x4, 0xa1, 0x8, 0x6, 0x3, 0x4}, {0x100, 0xc6b1, 0x3, 0x9, 0x9, 0x6}, {0x4, 0x1f, 0x0, 0x9, 0x2, 0x1}, {0x200, 0x3, 0xa05, 0x810000, 0x10001, 0x8}, {0x8, 0x2, 0x32, 0x4, 0x13, 0x7}, {0x1, 0x3, 0x7, 0x1, 0x0, 0x80000001}, {0x0, 0x4, 0xb4c5, 0x61c0527d, 0x2, 0xd07d}, {0x9a, 0x4, 0xffffffff, 0x101, 0xfffffff9, 0x5}, {0x3, 0x5, 0x9, 0xffff0000, 0x520, 0x5}, {0x80000000, 0x6, 0xfffffffd, 0x10000, 0x7d9a, 0x800}, {0x7, 0x800, 0x40, 0x4b, 0x5, 0x2}, {0x1000, 0xcaac, 0x2, 0x7fff, 0x3, 0x5b41}, {0x4, 0xc8, 0x9, 0xfffffffc, 0xfffffffc, 0xc00}, {0xc2, 0x7fff, 0xfb, 0xf6, 0x1, 0x80000000}, {0x9, 0x8, 0xf8000000, 0x5, 0xffffffff, 0x7}, {0xe538, 0x14, 0x2, 0x8, 0x1ff, 0x8}, {0x7f, 0x6, 0x8, 0x9, 0xc6ab, 0x9}, {0x6, 0x1ff, 0x6, 0x242f, 0x5, 0x3}, {0x3, 0xfffffff8, 0x9, 0x8, 0x1, 0x20}, {0xc16, 0x5, 0x4, 0x0, 0x4, 0x1}, {0xf1, 0x5, 0x6, 0x10001, 0x7, 0x7}, {0xf3, 0x6, 0x1, 0x8, 0x3ff, 0x7c}, {0xff, 0x2, 0x6, 0xb, 0x574a8be0, 0x2}, {0x4, 0x1000, 0x6, 0x3, 0x4, 0x8}, {0x3e5a, 0x4000, 0x2, 0x9, 0x10001, 0x9}, {0x6, 0x1, 0x4, 0x4, 0x594, 0x20}, {0x7f, 0x9, 0xffffffff, 0x7, 0x3, 0x3}, {0x8001, 0x99f, 0x382, 0x8, 0x9, 0x38c7d44a}, {0x8, 0x7ff, 0x2, 0x20, 0x2, 0x7}, {0x7, 0x8, 0x2, 0x0, 0x0, 0xd95}, {0x5, 0x2, 0x6, 0x0, 0x5, 0x2}, {0x7ff, 0x8, 0xae2, 0x5, 0x3, 0x80000001}, {0x6, 0x5d5, 0x7fffffff, 0x10001, 0x400, 0x80}, {0x1, 0x80000001, 0xfe3, 0x1a, 0xfffffffa, 0x8}, {0x8, 0x8, 0x3f, 0xffffffff, 0x2, 0x1}, {0xf6c, 0x101, 0xfffffffa, 0xdd25, 0x5, 0x8c91}, {0x800, 0xffffff80, 0xffffffc1, 0xe53, 0xfffffffe, 0x10000}, {0x2, 0x0, 0x80, 0x6, 0x7, 0x8001}, {0x80, 0x0, 0x8d, 0xfe9, 0x1, 0x7}, {0x80, 0x9, 0x77, 0xa4, 0x9, 0xce5}, {0x81, 0x6, 0xfffffffc, 0xaaec, 0x29, 0x7ff}, {0x6, 0x9, 0x2, 0x8, 0x2, 0x7}, {0x1ff, 0xfffffffa, 0x2b, 0x80000000, 0x3, 0x6}, {0xffffff5f, 0x8000, 0x78f7cf69, 0xabec, 0x3, 0xe00000}, {0x3, 0xfffffc00, 0x2, 0xd80, 0x0, 0x400}, {0x80000001, 0x4, 0x7, 0x2, 0x7, 0x68a}, {0x5, 0x6, 0x8, 0x8, 0x41, 0xffff}, {0xfffffffe, 0x7fff, 0x2, 0x4, 0x101, 0x100}], [{0x1}, {0x4}, {}, {0x3, 0x1}, {0x5}, {0x0, 0x1}, {0x3}, {0x5, 0x1}, {0x4, 0x1}, {0x5}, {0x5, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x4}, {0x1}, {0x3, 0x1}, {0x3}, {0x2}, {0x3}, {0x1, 0x1}, {0x5, 0x1}, {0x2}, {0x2}, {0x2, 0x1}, {0x0, 0x1}, {0x3, 0xc51ca638f36b6175}, {0x0, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x2}, {0x4}, {0x5, 0x1}, {0x0, 0x1}, {0x1}, {0x2}, {0x0, 0x1}, {0x5}, {0x3, 0x1}, {0x5, 0x1}, {}, {0x2, 0x1}, {0x5}, {0x3, 0x1}, {0x1}, {}, {}, {0x4, 0x1}, {0x0, 0x1}, {0x4}, {0x5, 0x1}, {0x3, 0x1}, {}, {}, {0x0, 0x1}, {0x2}, {}, {0x0, 0x1}, {0x5, 0x1}, {0x5}, {0x1, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x1}, {0x4, 0x1}, {0x3}, {0x2}, {0x2, 0x1}, {}, {0x5}, {0x2, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x5}, {0x0, 0x1}, {0x3}, {0x0, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x2}, {0x2}, {0x4, 0x1}, {0x4}, {0x2, 0x1}, {}, {}, {0x4, 0x1}, {}, {0x3}, {0x5}, {0x1, 0x1}, {0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x1}, {0x2, 0x8ae10c179375a811}, {0x3}, {0x1}, {0x6, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {}, {0x3, 0x1}, {0x5}, {0x3, 0x1}, {0x4, 0x1}, {0x1}, {0x1, 0x1}, {0x4}, {0x2}, {0x3, 0x1}, {0x1}, {0x1}, {0x2}, {0x0, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {}, {0x4, 0x1}]}}, @TCA_PEDIT_PARMS_EX={0xe98, 0x4, {{{0x5b, 0x6c5, 0x7, 0x1, 0xfffffff8}, 0x0, 0x17, [{0x1, 0xa042, 0x4, 0x1, 0x843, 0x3ff}, {0x5, 0xffffffff, 0x7, 0x2, 0x7, 0x8}, {0xc6e, 0x6, 0x6, 0x101, 0x401, 0x1}, {0x3, 0x0, 0xff, 0x2, 0x2, 0x40}, {0x7, 0x9, 0x9, 0x5, 0x0, 0x4a}]}, [{0x101, 0x7b, 0xea, 0x3, 0x43, 0x5}, {0x9, 0xdf8f, 0x100, 0x0, 0xbb0c, 0xfffff6d2}, {0x0, 0xffffffff, 0xfffffff7, 0xffffffe0, 0x7, 0xe31c}, {0x2, 0xa1, 0x7, 0x7, 0x3f, 0x5}, {0x7, 0x4, 0x7fff, 0x20, 0x9}, {0x4, 0x7fff, 0x9, 0x7f}, {0x0, 0xb0, 0x1ff, 0x1, 0xfffffffe, 0xd00}, {0x7, 0x2, 0x2, 0x7, 0xba, 0x8}, {0x80000, 0xa60, 0x7, 0x3f, 0x0, 0x6}, {0x2, 0x1, 0xb5d, 0x9, 0x5, 0x40}, {0x3ff, 0xfb74, 0x9, 0x8000, 0x7, 0x40}, {0xa6, 0x6, 0x100, 0x5, 0x1000, 0x400}, {0x8, 0x6d08, 0x500, 0x9, 0x80000000, 0xff}, {0xf5, 0x49f, 0x1000, 0x6, 0x80000000, 0x91}, {0x7, 0x8001, 0x1, 0xbec4, 0x2, 0x855}, {0x3, 0x1, 0x5, 0x1, 0x1, 0x5}, {0x7f, 0x56d39f73, 0x7, 0x9, 0x80000001, 0x23b65874}, {0x5, 0x2, 0x42e, 0x10000, 0x3f, 0xa4}, {0x74c49496, 0x8001, 0x7, 0x2, 0x7fffffff, 0xffffffff}, {0xe, 0x401, 0x0, 0x1, 0x4, 0x4}, {0x2, 0x4, 0x8001, 0x0, 0x7ff, 0x9}, {0x3f, 0x8, 0x63d, 0x9, 0x7fffffff, 0xb3}, {0x2, 0x4, 0x1, 0x1, 0x3, 0x4}, {0x4, 0xb3d0, 0xffffff7f, 0x4, 0xff4b, 0x2}, {0x2ba, 0x7, 0xfffff267, 0xe035, 0x1, 0x7b6}, {0x4, 0x800, 0x5, 0x9, 0x2}, {0x7643, 0x9, 0x1, 0x7, 0x6, 0x5}, {0xa951, 0x1000, 0x8001, 0x8, 0x3, 0x4}, {0xa335, 0x9, 0x6492, 0x27f, 0x2, 0x400}, {0x7fff, 0x3, 0xe5, 0x4, 0x7, 0x800}, {0x80, 0x6, 0xa1, 0x80000000, 0x3, 0x7f}, {0x8, 0xfffffff9, 0x40, 0x6, 0x10001, 0x6}, {0x2, 0x0, 0xef, 0x12, 0x1000, 0xff}, {0x5, 0x8, 0xffffffe1, 0x4, 0x4, 0x1ff}, {0x1ff, 0xddd, 0x2, 0x0, 0x7, 0x9}, {0x4, 0x0, 0x80000001, 0x4, 0x9, 0x5}, {0x8, 0x7ff, 0x40, 0x1, 0x2, 0x101}, {0xffffffff, 0x3277, 0x4, 0xfff, 0x3, 0x3}, {0x9, 0x7f, 0x2ab5f886, 0x8000000, 0x0, 0x1f}, {0x3, 0x0, 0x20, 0x1, 0x9, 0xfff}, {0x1000, 0xc600, 0x4, 0x4, 0x1, 0x6}, {0x3ff, 0x8, 0x0, 0x800, 0xdc4, 0x7}, {0x7, 0x59, 0x80000000, 0x2c, 0x3, 0x96a8}, {0x2, 0x3ff, 0x9, 0x7f, 0x80000000, 0xbcab}, {0x0, 0x0, 0x6ce, 0x2, 0x1, 0x7}, {0x1, 0xf3, 0xfffff8ca, 0x6, 0x3ff, 0xef}, {0xfff, 0x9, 0x4, 0xff, 0xfffffff9, 0xffff}, {0x2, 0x318f, 0x7, 0x7ff, 0xf8dc, 0x4}, {0x1f, 0x7, 0x1, 0x6, 0x8, 0x1}, {0x9, 0x3, 0x0, 0x0, 0x3, 0x282c}, {0x7, 0xffffffff, 0x0, 0xfff, 0x1ff, 0x8}, {0xfffffc00, 0x7, 0xa3, 0x0, 0x8, 0x1}, {0x1, 0x7fffffff, 0x0, 0x0, 0x0, 0x8}, {0x8, 0x5, 0x5, 0x0, 0x9, 0xff}, {0x7fff, 0x88, 0x9204, 0xfffffffb, 0x2, 0x737}, {0x43, 0x4, 0x9, 0x9, 0x4, 0x4e}, {0xfffffffc, 0xd01, 0x3, 0xf76a, 0x1}, {0xfffffffe, 0x100, 0x20, 0x23a, 0x10001, 0x8}, {0x3, 0x7ff, 0x8, 0x1dd, 0x7f, 0x2979}, {0xef, 0x6, 0x10000, 0xffff, 0x4, 0x2}, {0x10000, 0xfffffff9, 0x10000, 0xfff, 0x3, 0x8}, {0x971f, 0x2, 0x8, 0x5, 0x10000, 0x80000000}, {0x80000001, 0x7f, 0x3, 0x7, 0xde, 0x3}, {0x603, 0x20, 0x41, 0x6, 0x80000001, 0xbc9e}, {0x8c4, 0x81, 0x1000, 0x1, 0x2, 0x3}, {0x9, 0x401, 0x2, 0x4aa, 0x1, 0xf8}, {0x9, 0x5, 0xfffffffc, 0x7, 0x0, 0xff}, {0x4, 0x6f, 0x4, 0xb712, 0x1, 0x7}, {0x3, 0x3996ef52, 0x85a, 0xc8, 0x1, 0x1}, {0x8, 0x8ab5, 0x9, 0x400, 0xffff, 0x2}, {0x1ff, 0x80000001, 0x2, 0x3, 0xa1, 0x1}, {0x6, 0x7, 0x9, 0x1, 0xfffff800, 0x5}, {0x20, 0x0, 0x4, 0x7, 0x2, 0x8}, {0xffff65cd, 0x3, 0x1, 0x67, 0xfff, 0x200}, {0x7, 0x1, 0xffffffe0, 0xe5, 0x2, 0x9}, {0x9, 0x5, 0x1000, 0x6, 0x1000, 0x4}, {0x0, 0x7ff, 0x5e8, 0x7, 0x8, 0x200}, {0x1, 0x5, 0x6, 0x6, 0x7, 0x10000}, {0x81, 0x7, 0x10001, 0x9, 0xfffffffe, 0x9}, {0x3996, 0x6, 0xfdb, 0x2}, {0x9, 0x4, 0x10001, 0x7f, 0xfb, 0x8}, {0x5, 0x2, 0x5, 0x8}, {0x8, 0x7, 0x8, 0x6, 0x7ff, 0x7f}, {0x1d, 0x365, 0xb53, 0x5a, 0x4, 0x1}, {0x8, 0x61c6, 0x5, 0x4, 0x4, 0x3f}, {0x800, 0xfffffeff, 0x5, 0x60, 0xfffffff7, 0x2}, {0xffffffe0, 0x10000, 0x1, 0x8, 0x6, 0x6}, {0x4, 0x81, 0x40, 0x400}, {0x80000001, 0x1, 0x3f, 0x9, 0x0, 0x5}, {0x2, 0x7, 0x0, 0x5, 0x40, 0x3}, {0x5b861eea, 0x2, 0x7, 0x8, 0x7, 0x200}, {0x40, 0x1000, 0x0, 0x1b8ac2fc, 0x7fffffff, 0x7}, {0x0, 0x9, 0x0, 0x4, 0x2, 0x7fffffff}, {0x401, 0x8000, 0xff, 0x1, 0x7f}, {0x400, 0x9, 0x4, 0xffffffff, 0x92, 0x1}, {0x200, 0x4, 0x5, 0x9, 0x5, 0x4}, {0x3ff, 0x2, 0x6, 0x3, 0x800, 0x8}, {0x2, 0x5, 0x7, 0x23ac, 0x4, 0x5}, {0xa0fc, 0x8d, 0x3f, 0xd833, 0x6, 0x5}, {0x2, 0x9, 0x7, 0x7fffffff, 0x2, 0x4}, {0x6, 0x10ac0763, 0x3f, 0x7f, 0x9, 0xffffffff}, {0x401, 0x0, 0x0, 0x71, 0xffffba5b, 0x3f}, {0x9, 0xa7, 0x8, 0x5cc, 0xfffeffff, 0x1}, {0x7, 0x9, 0x9, 0x1, 0x8, 0xb7}, {0x0, 0x1, 0x8000, 0x6c, 0x2, 0x3}, {0x8, 0x6, 0xfff, 0x400, 0x3, 0x9}, {0x8, 0x10000, 0x1, 0x7ff, 0x3, 0x3}, {0x7, 0x8, 0x14, 0x9, 0x3, 0xffffffe0}, {0x80, 0x1, 0x80, 0x6, 0x0, 0x3f}, {0xeaa8, 0x4, 0x2, 0x80, 0x5a3, 0x100}, {0x5, 0x8, 0x9, 0x9, 0x4, 0x64}, {0x8, 0x85, 0x20, 0x7, 0x6, 0x8}, {0x100, 0x1000, 0x9, 0xfff, 0x7, 0x2}, {0x10000, 0x0, 0x7fff, 0x3, 0x6, 0x800}, {0x1, 0x8667, 0x2, 0x1f, 0x7, 0x3}, {0x9, 0x8, 0xe6, 0x80, 0x7f, 0x5}, {0xfffffffc, 0x81, 0x82, 0x4, 0x40, 0xffff8000}, {0x0, 0xffffffff, 0x800, 0x20, 0xb7909ef3, 0x4c}, {0x9, 0x401, 0xffffffff, 0x8, 0x7, 0x9}, {0x6, 0x4, 0x5, 0x8000, 0x2, 0x7ddbcf4c}, {0x5, 0xb9, 0x8, 0x0, 0x1, 0x1}, {0x3f, 0x9, 0x1, 0x51b, 0x7}, {0x8001, 0x1000, 0x4, 0x0, 0xffffffff, 0xc00000}, {0x205, 0x1, 0x7, 0x9, 0x1, 0xffffff01}, {0x2, 0x7, 0x8000, 0x1, 0x8, 0xb211}, {0x4, 0x1ff, 0x10000, 0x3, 0x80, 0x5}, {0x5, 0x4, 0x1, 0x3ef1, 0x562d, 0x7f}, {0x800, 0x5c, 0x800, 0x7051, 0x1000, 0x9}], [{0x2}, {0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x4}, {0x2, 0x1}, {0x0, 0x1}, {0x4}, {0x5}, {0x3, 0x1}, {0x3}, {0x5, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x2}, {}, {0x2}, {0x0, 0x1}, {0x4}, {0x2, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x5}, {0x2}, {0x1, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x4}, {0x4, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x2}, {0x1, 0x1}, {0x5}, {0x5, 0x1}, {0x1}, {0x5, 0x1}, {0x3}, {0x3}, {0x3}, {0x1}, {0x3}, {0x3}, {0x2}, {}, {0x7, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x7}, {0x2, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x2}, {0x3}, {}, {0x0, 0x1}, {0x5, 0x1}, {0x3}, {0x5}, {0x3}, {0x3}, {0x3, 0x1}, {0x5, 0x1}, {0x5}, {0x1}, {0x2, 0x1}, {0x2}, {0x3, 0x1}, {0x3, 0x1}, {0x2}, {0x2}, {0x5}, {0x5}, {0x3, 0x1}, {0x4}, {0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x2}, {0xa, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x2}, {0x7, 0x1}, {0x0, 0x1}, {0x2}, {0x2}, {0x1, 0x1}, {0x5}, {0x4}, {0x4, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {}, {0x3}, {0x4}, {0x3, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x5}, {0x2, 0x1}, {0x2, 0x1}, {0x1}, {0x0, 0x1}, {0x4}, {0x3, 0x1}, {0x1, 0x1}, {0x7, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x4}]}}, @TCA_PEDIT_PARMS_EX={0xe80, 0x4, {{{0xffffffff, 0x7, 0x7, 0x73, 0xc7a4}, 0x7, 0x8a, [{0x9, 0x1, 0x9, 0xa0, 0x800, 0x3}, {0xffff, 0x10000, 0x0, 0x1, 0x4, 0x2}, {0x9, 0x1f, 0x7, 0x1, 0x9, 0x6}, {0x98ac, 0x0, 0x3b0e, 0x17bc, 0x48}]}, [{0x3, 0x2, 0x7, 0xb4d, 0xc9c, 0x2}, {0x10001, 0x6, 0xfff, 0x6, 0x8, 0xec}, {0x2, 0x3, 0x3, 0xfffffe87, 0x2, 0xfffffffa}, {0xfffffbff, 0x8, 0x5, 0x0, 0xffffffff, 0x10000}, {0x9, 0x1, 0x885, 0xe9fe, 0x1, 0xfffffffb}, {0x5, 0x1, 0x4a3c, 0x3ff, 0x7f, 0x5}, {0x7, 0x1, 0x0, 0x6, 0xc4, 0x9}, {0x81, 0x9, 0x2, 0x9, 0x7410, 0x4}, {0x5, 0x7, 0x4, 0x1, 0x1, 0x80}, {0x4, 0xfffffff8, 0xff, 0x1000, 0x200, 0x1}, {0x3, 0x3f, 0x3, 0x1, 0x6, 0x1}, {0x1, 0x4, 0x60000000, 0x0, 0x5, 0x400}, {0xffffff01, 0x0, 0x1, 0x80000001, 0x3d5a, 0x6fe}, {0x8, 0xfffffff7, 0x9, 0x0, 0x4, 0x6e77}, {0xc7, 0x0, 0xb61, 0x1, 0x0, 0x9}, {0x80000000, 0x2, 0xa97, 0x8, 0x3, 0x186e}, {0x400, 0x7, 0x8, 0x4, 0x6507, 0x5}, {0x4, 0x81, 0x8, 0x10000, 0x7, 0x800}, {0x401, 0x7ff, 0x9, 0x9, 0x87, 0x5}, {0xfffffda0, 0x7, 0x1, 0x349c2f30, 0x80, 0x5}, {0x7, 0x7, 0x8, 0xa5, 0x62bb, 0x4}, {0x9, 0x20, 0x3, 0xfffffffe, 0x3f, 0x1}, {0x800, 0x7f, 0xd3, 0x3b2, 0xfffffffe, 0x3}, {0x4, 0x4, 0x0, 0xff, 0x9, 0x1ff}, {0x5, 0xe05, 0x1f, 0x7, 0x5a, 0x1ff}, {0x4, 0x0, 0x4, 0x1000, 0x5, 0x9}, {0x200, 0x5, 0xacd, 0x9, 0x9d8, 0x2}, {0xb74a, 0xff, 0x0, 0x10000, 0x6, 0x10001}, {0x6, 0x69, 0x400, 0x20, 0x1, 0xffffffff}, {0x5, 0x200, 0x2, 0x3, 0x7, 0x1}, {0x1, 0x0, 0x6, 0xebe, 0xffffffff}, {0x9, 0x55e, 0x0, 0x10001, 0x2}, {0xb18c, 0x3, 0x5, 0xfffffffe, 0x2, 0x1}, {0xf2, 0x2, 0x4, 0x7ff, 0x6a86, 0x8}, {0x1, 0x8, 0x6, 0x9, 0xfffff43d, 0x6}, {0x6875, 0x7fff, 0x8000, 0x7, 0x7, 0x7}, {0xef7, 0xfff, 0x80000001, 0x8, 0x7, 0x9}, {0x5d, 0x9, 0x3ff, 0x5, 0x401, 0xfffffffc}, {0x6, 0x6, 0x7, 0x8, 0x7, 0x8}, {0x8, 0x81, 0x5, 0x8, 0xffffffff, 0x4}, {0x1, 0x7fff, 0x80, 0x1, 0x7f, 0x9}, {0x0, 0x400, 0x36bf, 0x80000000, 0x4}, {0x3, 0x9, 0x5, 0x2400000, 0x8, 0xbde7}, {0x7, 0xfffffffc, 0xfff, 0x91, 0x1, 0xfff}, {0x1ff, 0x0, 0x4, 0x1, 0x8a92, 0x4}, {0x8, 0x7, 0x1f, 0x9, 0xb2, 0xfffffff7}, {0x0, 0x3, 0x8, 0x4, 0xb89, 0x78762893}, {0x7, 0x9, 0x101, 0x1, 0x10000000, 0x10000}, {0x0, 0x3, 0xfffffffc, 0x7, 0x5de, 0x1}, {0x100, 0xd8c7, 0x101, 0xffffffff, 0x1f, 0x40000}, {0x400, 0x25, 0x9, 0x9, 0x7f, 0xfffffff9}, {0xc1, 0xcd, 0x4, 0x80000000, 0x49a, 0x28}, {0x5, 0xfffffffd, 0xda, 0xffffffff, 0x943a, 0xc8}, {0x5, 0x80, 0x8000, 0x7, 0xd1, 0x62}, {0x800, 0x1485, 0x69b, 0x400, 0x7ff, 0x8}, {0x5, 0x99, 0x7f, 0x7ff, 0x2, 0x6}, {0x1, 0x4, 0x8, 0xa2, 0x9, 0x65e}, {0x3, 0x2, 0x72, 0x4, 0x0, 0x100}, {0x6, 0x200, 0x2, 0x100, 0x9411, 0x1}, {0x60000, 0x8, 0x8, 0xffffffff, 0x800, 0xfffffffa}, {0x0, 0x8, 0x7, 0x7, 0x8, 0x3ff}, {0xa146, 0x782, 0x8, 0xffffffff, 0x6, 0x7}, {0x7, 0x2, 0x2, 0x0, 0x2, 0x1ff}, {0x9, 0x0, 0x3, 0x3, 0x4, 0x7}, {0x70f, 0x1, 0x401, 0xffffffff, 0x6, 0x332}, {0x9, 0x401, 0xaea9, 0x5, 0x1f, 0x713f}, {0x1f, 0xffffffff, 0x80000001, 0x369, 0xcf6a, 0x1}, {0x5, 0x0, 0x6, 0x800, 0x5, 0x1f}, {0x5, 0xb93c, 0x7f8, 0x81, 0x0, 0x5}, {0x0, 0xaede, 0x25, 0x81, 0x5, 0x5}, {0x2b, 0x0, 0x9, 0xa2f, 0x40, 0xee6}, {0x7fff, 0x1, 0x1, 0x80000000, 0x2, 0x7}, {0x0, 0x0, 0x7f, 0x0, 0x53, 0x9}, {0x6, 0x8001, 0x8001, 0x4, 0xfffffffb, 0x80}, {0x10000, 0x7, 0x1000, 0x40, 0x9, 0x1}, {0x4, 0x7, 0x2, 0x81, 0x800, 0xb6f}, {0x7, 0x8, 0x4, 0x9, 0xfffffffc, 0x407}, {0x80000001, 0x5, 0xfff, 0x7, 0x1622, 0x8}, {0x2, 0xae, 0x80000000, 0x4c, 0xfffffe01}, {0x7, 0x6, 0x2, 0x2f3f, 0x7, 0x8000}, {0xa6, 0x2, 0x0, 0x400, 0x1, 0x10000}, {0x2, 0x8, 0xb0b9, 0xfff, 0x10, 0x5}, {0x4, 0xfff, 0x2, 0x2, 0x80, 0x3}, {0x7, 0x8, 0xd22, 0x0, 0x100, 0x2}, {0xff, 0x101, 0xffffffff, 0x2, 0x1, 0xd}, {0x8cdf, 0x9, 0x7, 0xb4, 0xfc8, 0x4}, {0xaa2, 0xc1, 0x80000001, 0x8, 0x5, 0x4}, {0x5, 0x3, 0x7fffffff, 0x1, 0x2, 0x4}, {0x0, 0x10, 0x6, 0x2, 0x5, 0x20}, {0xfffffffc, 0x1, 0x6, 0x3, 0xffff, 0x1000}, {0x4, 0x6, 0x7fffffff, 0x8, 0x1, 0x80000001}, {0x7f, 0x4, 0x2, 0x6, 0xfffffe00, 0x5}, {0x101, 0x1, 0x9, 0x4, 0xcf, 0x8}, {0x9, 0x8000, 0x1, 0x3, 0x81}, {0x3a, 0x8, 0x80, 0x8, 0x687f, 0x5}, {0x4, 0x6, 0x40, 0x8001, 0x8, 0xc3}, {0x7, 0x5, 0x0, 0x8, 0x81, 0x1}, {0x2, 0x800, 0x93, 0xe, 0xa, 0x9}, {0x1, 0x8, 0x8a15, 0x7fffffff, 0x4017, 0x6}, {0x6, 0xfdd, 0x9, 0x6f, 0x3, 0x2}, {0x0, 0x1c9, 0xb6e, 0x7fffffff, 0x4, 0xa90}, {0x400, 0x3, 0x40, 0xffffff34, 0xfffffff8, 0x2}, {0x1, 0x7, 0xffffff7f, 0x8, 0x1, 0xbe}, {0x4, 0x6, 0x3f, 0x5, 0x8, 0x6}, {0x8, 0xff, 0x630e33a6, 0x4c, 0xfffffffb, 0x7ff}, {0x3, 0x5, 0x9, 0x0, 0x9, 0x5}, {0x400, 0x4, 0x1f, 0x7fff, 0x6, 0xfffffffd}, {0x9, 0x0, 0x2, 0x1, 0x1, 0x3}, {0xf31, 0x1ff, 0x80000000, 0x4, 0x0, 0xff}, {0x9, 0x3f, 0x80000000, 0xa14, 0x9, 0x2d800}, {0x2, 0xfffffff8, 0x5, 0x86, 0x0, 0x7}, {0x80000000, 0xb8e, 0x0, 0x1, 0x3}, {0x0, 0x3, 0x1, 0x3, 0x5}, {0xe2, 0x0, 0x7, 0x38f3, 0x4, 0x8e}, {0xffffff66, 0x9, 0x2, 0xfffff8f6, 0x97d1, 0xb14e}, {0x8, 0xd155, 0x7, 0x401, 0x101, 0x7}, {0x2e0, 0xf6b, 0x8, 0x6, 0x40, 0xffff}, {0x0, 0xffffff7f, 0x10000000, 0x1ff, 0x20, 0x3}, {0x5, 0xfffff800, 0x63e6feee, 0x3f, 0x0, 0x8}, {0x7, 0x77e, 0x7f, 0x6, 0x8000, 0x1}, {0x2e628dde, 0x5, 0x3, 0x3, 0x9, 0x7f}, {0x7, 0x3, 0x2, 0x1, 0x1, 0x400}, {0x8, 0xff, 0xffffffc0, 0x7, 0x7ff, 0xea87}, {0x1, 0x8000, 0x0, 0x0, 0x8, 0xfffffff9}, {0x7fff, 0xfffffff9, 0x9, 0xfffffff7, 0x2, 0x6}, {0x8869, 0x9, 0x1000, 0x6, 0x800, 0x49}, {0x3, 0x7, 0x4, 0x3, 0x80000000, 0x3f}, {0x2, 0x5, 0x0, 0x6, 0xa40, 0x8bbe}], [{}, {0x2, 0x1}, {0x5}, {0x4, 0x2d9ef3c8d10e72fa}, {0x1, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x1}, {0x2, 0x8e252a3706620011}, {0x3}, {0x3, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x2}, {0x5}, {0x2}, {0x2, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x5}, {0x5, 0x1}, {}, {0x2}, {0x4}, {}, {0x2, 0x1}, {0x5}, {0x2, 0x1}, {}, {0x5, 0x1}, {0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x3}, {0x1}, {0x0, 0x1}, {0x2}, {0x4}, {0x5}, {0x2, 0x1}, {}, {}, {0x4}, {0x3, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x1}, {0x5, 0x1}, {}, {0x4}, {0x3, 0x1}, {0x5, 0x1}, {0x3}, {}, {0x2}, {0x2, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x3}, {0x2}, {0x0, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {}, {0x2}, {0x1}, {0x4, 0x1}, {0x3}, {0x5}, {0x5, 0x1}, {0x5}, {0x0, 0x1}, {0x4}, {0x5, 0x1}, {0x4}, {0x0, 0x1}, {0x4, 0x1}, {0x5}, {}, {0x3, 0x1}, {0x4}, {0x2}, {0xc7fc8221c9f17c5b, 0x1}, {0x2}, {0x1}, {0x5}, {0x0, 0x1}, {0x4}, {0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x4}, {0x1}, {0x4}, {0x3}, {0x3}, {0x4}, {0x4, 0x1}, {0x2}, {0x0, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x4}, {0x2}, {0x2, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x5}, {0x1, 0x1}, {0x1}, {0x1}, {0x2}, {0x5, 0x1}, {0x2, 0x70b68f76ba47108e}, {0x2, 0x1}, {0x2}, {0x3}, {0x2, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x3, 0x1}]}}, @TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xf10, 0x4, {{{0xffffffc1, 0x5, 0x3, 0x1}, 0xc6, 0x81, [{0x7, 0x20, 0x3, 0x2, 0x7, 0xa4}, {0x2000000, 0xffff, 0x1000, 0x5, 0x2, 0x1}, {0x1, 0x3, 0x6e000000, 0x3, 0x10000, 0x81}, {0x100, 0x7, 0x5, 0x1, 0x40, 0x1f}, {0x7, 0x3, 0x3, 0x8, 0x800, 0x9}, {0xffff7fff, 0x1feb, 0x0, 0x9, 0x1f, 0x6}, {0x80, 0x4, 0x7f, 0xffffffc1, 0x6, 0x69389f7a}, {0xbfc, 0x401, 0x240000, 0x4, 0x401, 0x4}, {0x2, 0x1, 0x10000, 0x4, 0x6}, {0x9, 0x4a, 0x0, 0xff, 0x4, 0x9}]}, [{0x74, 0x5, 0x1f, 0xb12, 0x400, 0x1}, {0x9, 0x81, 0x3, 0xffff, 0xffffffff}, {0xfffffff9, 0x7, 0x80, 0x48, 0x4, 0x1000}, {0xcfe, 0x5, 0x0, 0x31c8, 0xffffffff, 0x4}, {0xfffffff8, 0x3ff, 0x5404, 0x3, 0x1, 0x8001}, {0x55, 0x2, 0xe2f, 0x2, 0x100, 0xffff8000}, {0x9000, 0x3ff, 0x4, 0xde49, 0xfffffc01, 0x10001}, {0x9, 0xe4e, 0x1ff, 0x0, 0x8, 0x6a88}, {0xfff, 0x1000, 0x3, 0x4, 0x5, 0xff}, {0x8, 0xcf, 0x1f, 0x4, 0x5, 0x8}, {0xfffffffe, 0x3, 0xc4, 0x400c069c, 0x400, 0x4}, {0x80000001, 0x4, 0x2, 0xffff, 0x4, 0x1}, {0x0, 0x44, 0x4, 0x4, 0x2, 0x2}, {0x2, 0x8d, 0x6, 0x81, 0x3, 0x2}, {0x20, 0x1, 0xffffffff, 0x401, 0x78f2, 0x400}, {0x0, 0xeb, 0x2, 0x1ff, 0x3, 0x8}, {0xc44, 0x1, 0xdd, 0xfffffe5b, 0x7, 0x4ce}, {0x101, 0xd01, 0x6, 0x48, 0xbd9, 0x654}, {0x98, 0x1f, 0x0, 0x400, 0x2, 0x1c7b6147}, {0x4, 0x4, 0x6, 0x0, 0x5b3, 0x8}, {0x400, 0x7, 0x1, 0x81, 0x5, 0x63}, {0x1, 0x2, 0x1, 0x9, 0x5924, 0x80000000}, {0x100, 0x2, 0x401, 0x95, 0x101, 0x3}, {0x9, 0x1, 0x2, 0x80000001, 0x2}, {0x5, 0xce21, 0x1dc, 0xffffffff, 0xfffffffe, 0x6}, {0x6, 0x200, 0x8, 0x1f, 0x1ff, 0x81}, {0x8, 0x3ff, 0x3, 0x2, 0x0, 0x7608}, {0x6, 0x593, 0x5, 0x2, 0x7f, 0x6}, {0x4c191078, 0x200, 0x0, 0x4000, 0x80000000}, {0xfffffffe, 0x7fffffff, 0xfff, 0x1, 0x0, 0x1}, {0x1f, 0x5, 0x8, 0x2, 0x400}, {0x2, 0xffffff81, 0x6, 0x7, 0x4, 0xffff}, {0x8, 0x6, 0x2, 0x0, 0x101, 0x1}, {0x1, 0x9, 0x400, 0x5, 0x8, 0x6}, {0x80000001, 0x7, 0x5da, 0x3, 0x1ff, 0x2f}, {0x9e3c, 0xf9c, 0x1000, 0x7, 0x9, 0x800000}, {0xcf, 0x101, 0x2, 0x1, 0x5, 0x7}, {0x8001, 0x101, 0x1, 0xdc, 0x7, 0x7}, {0x38, 0x7fffffff, 0x9, 0x2, 0x0, 0x76e6}, {0x1, 0x6, 0xffffffe1, 0x9, 0x20}, {0x3389e5e, 0x8, 0xfffffff9, 0x6, 0x2, 0x7}, {0x4, 0x20, 0x6, 0x7, 0x0, 0x9}, {0x1, 0xfffffff7, 0x4, 0x7f, 0x9a, 0xc68d}, {0xd356, 0x6, 0x7, 0x1, 0x1, 0x9}, {0x0, 0x40, 0x20, 0x7, 0x880, 0x7}, {0x4, 0x400, 0x5, 0x20, 0x81, 0x401}, {0x2, 0x8, 0x7, 0x7fff, 0xffffffff}, {0x6, 0x4, 0x8000000, 0x7be8, 0x3, 0x8}, {0x5, 0x80000000, 0x8, 0xc761, 0xff, 0x2}, {0x1ff, 0x7f, 0x4, 0x4, 0x40000000, 0xffff7fff}, {0x5192ed8a, 0x4, 0x8, 0x9, 0x5, 0xf11}, {0xfffff644, 0x101, 0x1, 0x0, 0xfffffff7, 0x44}, {0x7fffffff, 0x4, 0xfffffff8, 0x800, 0x1, 0x9}, {0x36, 0x0, 0x10001, 0x20, 0x5, 0x10001}, {0x3, 0x10000, 0x5, 0x80000001, 0x1a, 0x8}, {0x91a6, 0x0, 0x2, 0xffffffff, 0x5, 0x7802}, {0x0, 0x1, 0x7, 0x561, 0x0, 0x4}, {0xfff, 0x1, 0xffff, 0x4, 0x5, 0xf3d}, {0xfffffff7, 0x2, 0x4, 0x4, 0x5, 0x1ff}, {0x3ff, 0x10000, 0x7fffffff, 0x7fffffff, 0x8, 0xfffffbff}, {0x1, 0x4, 0xffff, 0x2, 0x8, 0x7}, {0x9, 0x200, 0x401, 0x200, 0x3f, 0x7}, {0x0, 0x8001, 0xfd, 0x2, 0x6, 0x1}, {0x9, 0x3, 0x200, 0x80000000, 0x100, 0x3}, {0x6, 0x1, 0x3, 0xf631, 0x8, 0x5}, {0x0, 0x8, 0x1, 0xe5, 0x80000000, 0x2}, {0x1, 0x5, 0x9, 0xfb, 0x1baad1a, 0x21}, {0x100000, 0x40, 0x2, 0x10000, 0x7, 0x7f}, {0x4, 0x7, 0x8, 0x3, 0xa8, 0x6}, {0x8000, 0x6, 0x7, 0x7fff, 0x9, 0xbdaa}, {0x1, 0x7e, 0x7, 0x10001, 0x8000, 0x2}, {0x4, 0xfb, 0xeff5, 0xf1, 0x5, 0x1000}, {0xff, 0x7, 0xed89, 0xce, 0x383, 0x4}, {0x2, 0xf7, 0x1, 0x3, 0x8, 0x1ff}, {0x5, 0x3ff, 0x7, 0x7a, 0x48fb, 0x7e5}, {0x200, 0x423a, 0xaa54, 0xfffffffa, 0xedc, 0x8aed}, {0x8, 0xd23, 0xffffc301, 0x9, 0x3, 0x2}, {0x3, 0x5, 0x3, 0xc4, 0xffffffff}, {0x401, 0x4, 0x7, 0xffffff25, 0x7, 0x4}, {0x1, 0x6, 0x7, 0x6, 0xbb, 0x800}, {0x64e, 0x9, 0x5, 0x2, 0x80000000, 0x5}, {0x0, 0x1, 0xfd0, 0x1, 0x20, 0xccd1}, {0x401, 0xdfb, 0x8, 0x7, 0xcdf, 0x9}, {0x8001, 0x9a2c, 0x7fff, 0xbc4, 0x4}, {0x8, 0xfffffffa, 0xffff, 0x1, 0x3}, {0x5, 0x7f, 0xc80c, 0x7f, 0x1ccc, 0x3c2b}, {0x1, 0x10001, 0xf95, 0x2, 0x6, 0x15e7b20e}, {0x7fffffff, 0x9921, 0x8, 0x3, 0xfffffff8, 0x100}, {0x97, 0x8, 0x1, 0xcf0, 0xd9, 0xffff}, {0x6, 0x0, 0x5, 0x4, 0xff, 0x5}, {0xffffffc1, 0x1, 0x8, 0x10001, 0xa, 0x1}, {0x10001, 0x65, 0x1, 0x80, 0x1, 0x6}, {0x5, 0x8, 0x0, 0xfe5, 0x7, 0x40}, {0x3ff, 0x20, 0x3, 0x2, 0x7, 0xffffffff}, {0x6, 0x401, 0x4, 0x9, 0xfffff15c, 0xff}, {0xffffffff, 0x101, 0x1, 0x200, 0x1, 0x4}, {0xaf3d, 0x8, 0x6, 0x101, 0x730a, 0x401}, {0x5, 0x80df, 0x62c, 0x4, 0x2, 0x4d8a}, {0x0, 0x16f5, 0xfffffbff, 0x4, 0x3, 0xb4}, {0x7, 0x9, 0x17d, 0x0, 0x2, 0x1}, {0x9, 0x7, 0x7, 0x0, 0x5, 0xfffffff8}, {0x1, 0x1000, 0x5, 0x0, 0x9, 0x7}, {0x7ff, 0x80000000, 0xa2, 0x2, 0x4, 0x40000000}, {0x1ff, 0x7, 0x3, 0x98, 0x2, 0x1}, {0x1ff, 0x9, 0x3, 0x8000, 0xffff4e15, 0x9}, {0x6, 0x2, 0xfffff259, 0x7, 0x7, 0x2}, {0x400, 0x5, 0x1, 0xff, 0x9, 0xfff}, {0x9, 0x7ff, 0x1, 0xfffffff7, 0x0, 0xd36}, {0xff, 0x2, 0x0, 0x7f, 0x20, 0x6}, {0x6, 0x2, 0x800, 0x3a, 0x4, 0x7113}, {0xfffffffd, 0x2d, 0x3f0000, 0x2, 0xe0, 0x9}, {0x8000, 0xfffffeff, 0xfffffc00, 0x3, 0x0, 0x20}, {0xffff7888, 0xa7b2, 0x7fff, 0x10001, 0x8, 0x9a03}, {0x5a9, 0x200, 0x6, 0x8001, 0x7, 0x1}, {0x3, 0x9, 0x401, 0xf1, 0x6, 0x7}, {0x1, 0x4, 0x1f, 0x401, 0x7, 0x1}, {0x401, 0x8, 0x80, 0xd751, 0xfffffff9, 0x6c08}, {0x800, 0xffffff80, 0x200, 0xfffffff8, 0x0, 0x80000001}, {0xfffffffc, 0xffffff8a, 0x0, 0x20, 0x3ff, 0x4}, {0x80000000, 0x723c, 0x2, 0x1, 0x0, 0x7ff}, {0x7, 0x3, 0x9, 0x9, 0x80000000, 0x3f}, {0x8, 0xcf03, 0x1, 0x800, 0x7f, 0x1}, {0x9, 0xfffff673, 0x9, 0x1, 0x3, 0x3}, {0x10000, 0x10001, 0x9, 0x3, 0x5, 0x1f}, {0xfab, 0x8, 0x0, 0x8, 0x8, 0x3}, {0x7, 0x8001, 0x8001, 0x7fffffff, 0xff}, {0x3, 0x6, 0x3ff, 0x8, 0x7, 0x1}, {0x9, 0x5, 0x4, 0x80000001, 0x100, 0x289}], [{0x5, 0x1}, {}, {0x4}, {0x5, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x1}, {0x5}, {0x5, 0x1}, {0x5}, {0x0, 0x1}, {0x2}, {0x5, 0x1}, {0x5}, {0x4}, {0x2, 0x1}, {}, {0x3, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x1}, {0x3}, {0x3}, {0x2, 0x1}, {}, {}, {0x4, 0x1}, {0x1}, {}, {0x2, 0x1}, {0x4, 0x1}, {0x9, 0x1}, {0x7}, {0x5}, {0x5, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x3}, {0x5}, {0x2}, {0x5}, {0x2, 0x274ccab60d83b1ed}, {0x3}, {0x2, 0x1}, {0x0, 0x1}, {}, {0x5, 0x1}, {0x5, 0x1}, {0x2}, {}, {0x0, 0x1}, {0x0, 0x1}, {0x1}, {0x2, 0x1}, {0xf3b173f6ff4de29, 0x1}, {0x3, 0x1}, {0x5}, {0x4}, {0x2}, {0x5, 0x1}, {}, {0x3, 0x1}, {0x0, 0x1}, {0x4}, {0x4, 0x1}, {0x2}, {}, {0x1}, {0x0, 0x1}, {0x1}, {}, {0x1, 0x1}, {0x4}, {0x5, 0x1}, {0x5}, {0x0, 0x1}, {0x0, 0x1}, {0x2}, {0x2}, {0x1, 0x1}, {0x3}, {0x5}, {}, {}, {0x3, 0x1}, {}, {0x4, 0x1}, {0x4}, {0x3}, {0x1}, {0x5}, {0x2, 0x1}, {}, {0x5}, {0x4, 0x1}, {0x5, 0x1}, {}, {0x5, 0x1}, {}, {0x3, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x1}, {0x0, 0x1}, {0x3}, {0x4, 0x1}, {0x1}, {0x3, 0x1}, {}, {}, {}, {0x4, 0x1}, {0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {}, {0x4}, {0x3}, {0x2, 0x2}, {0x4}, {0x43011edb791ca17b}, {0x4, 0x1}, {0x1}], 0x1}}, @TCA_PEDIT_PARMS={0xf10, 0x2, {{{0x9, 0x1, 0x8, 0x0, 0x7}, 0x4, 0x3, [{0x6, 0x1, 0x47d, 0x1, 0x9, 0x1}, {0xffff0001, 0x6, 0x26a4, 0x7, 0x401, 0x8}, {0x3f, 0x100, 0xfffffffa, 0xe98e, 0x200, 0x7}, {0x2, 0x7, 0x7, 0x7, 0x3f, 0x4}, {0xbb, 0xfff, 0x9cf7, 0x3, 0x1f, 0x3}, {0xe10b, 0x4, 0x400, 0x3, 0x3}, {0x9, 0x0, 0xd3, 0x4, 0x200, 0x7}, {0x80000000, 0x1, 0xad, 0x1, 0x6, 0x9}, {0x1, 0xb327, 0x401, 0x0, 0x9, 0x5}, {0xfffffffb, 0x400, 0x9, 0x4, 0x5, 0xb1}]}, [{0x80, 0x290e6c41, 0x1, 0x5, 0x2, 0x9}, {0x2, 0x0, 0x200, 0x425790d4, 0x800, 0x1ff}, {0xfffffffa, 0x1, 0x800, 0x1, 0x6, 0x3}, {0x2, 0x8, 0x3ff, 0x80, 0x5, 0x30b9f3f6}, {0x8, 0xfffffff7, 0x84, 0x3, 0x6206, 0x5}, {0x8, 0x6, 0x480, 0x1, 0x80000000, 0xe63c}, {0x427, 0x8, 0x8001, 0x7, 0x101}, {0x40, 0x7, 0x6, 0x101, 0x4, 0x1}, {0x8, 0x40, 0x6, 0x7361, 0x10000, 0x1f}, {0x401, 0x8000, 0x2, 0xffffffff, 0x400, 0x3}, {0xac94, 0xf19, 0x100, 0xfe2, 0x40, 0x7d6e}, {0xd2b, 0x3, 0x4, 0x8ada, 0x527}, {0x0, 0x604, 0x1000, 0x8, 0x78, 0x3}, {0x6, 0x1, 0x401, 0x4, 0x3, 0x1ff}, {0x1000000, 0x572, 0x6, 0x3ff, 0x6}, {0x6, 0x7f, 0x7, 0x1, 0x3046, 0xa63}, {0xa9, 0xfffffffc, 0xd755, 0x0, 0x8001, 0x9}, {0x613, 0x101, 0x401, 0xd9, 0x882, 0x80000001}, {0x0, 0x9, 0x7, 0x1ff, 0x3f, 0x3f}, {0x8, 0x6, 0x7, 0x594, 0x8000, 0x1000}, {0x8, 0x55fb, 0xe, 0x0, 0x4, 0x7}, {0x9, 0x7, 0x8001, 0xffffffff, 0x6, 0x100}, {0x81, 0x6, 0xff, 0x7a6, 0x4563bc9, 0x6}, {0x5, 0x3, 0x25, 0x1, 0x9, 0x6}, {0xfffff7c2, 0x3, 0x8ea7, 0x139b7cf3, 0x1, 0x8}, {0xdf, 0x3, 0x3, 0x2, 0x300, 0x7fffffff}, {0xd684, 0xfff, 0x10001, 0x7f, 0x5}, {0x40, 0x4, 0xcd0, 0x100, 0xffffffff, 0x1}, {0xffff, 0x5, 0x10001, 0x2, 0x6, 0x5}, {0x401, 0x7fff, 0xeb, 0x400, 0x9, 0x5e80}, {0xfffffbff, 0x8, 0x8, 0x7ff, 0x9780, 0xa8b6}, {0x8001, 0x3, 0x2, 0x1, 0x5, 0x40}, {0x1000, 0x7, 0xfa, 0x5a5b7834, 0xffffd3f9, 0x21fe0e26}, {0x401, 0x80000001, 0x9, 0x80000000, 0x1ff, 0x9}, {0x8, 0x1f, 0xff, 0x7, 0x9, 0x7ff}, {0x5, 0x9776, 0x98dd, 0x40}, {0xfffffff9, 0xed2, 0x5495, 0x1, 0xfff, 0x12d17463}, {0x9, 0x7fffffff, 0x8c6, 0x100, 0x7, 0x10000}, {0x548, 0x81, 0x6, 0xfe000000, 0x5, 0xc75}, {0x15, 0x3, 0x7, 0x1bd5, 0x200, 0x7}, {0x7, 0x0, 0x8, 0x7, 0x127a, 0x7e2}, {0x3a3c9660, 0x6, 0x1, 0x0, 0x66c6246e, 0x2}, {0x54, 0x3ff, 0xffffffff, 0x401, 0x3, 0x8001}, {0x8, 0x2, 0x8, 0x3, 0x8, 0x3}, {0xf6df, 0x1, 0x8, 0x81, 0x200, 0x7}, {0x0, 0xffff, 0x0, 0xff, 0xe795, 0x80000000}, {0xc, 0x2, 0x4e, 0x1, 0x400, 0xb10}, {0x3, 0x7, 0x0, 0x3, 0x5, 0x7f}, {0x8, 0x7, 0xfffffff7, 0x1000, 0x80, 0x5}, {0x8, 0x80, 0x2, 0x7, 0x7, 0x8}, {0x882, 0x5e, 0x5, 0x7aa, 0x7f, 0x9}, {0x4, 0x6, 0x7fff, 0x8, 0x4334, 0xffffffff}, {0x81, 0x0, 0x101, 0x7, 0x7, 0x5}, {0x3, 0x6c64d4b9, 0x9, 0x7, 0x6, 0x8}, {0x4277, 0x40, 0x1, 0x7, 0x8c44, 0x10}, {0x0, 0x6, 0xcc62, 0x6, 0x9, 0x7}, {0x4, 0x1, 0x5, 0x7, 0x200, 0x6}, {0xeafe, 0x89, 0x5, 0x3f, 0x8, 0x1}, {0x8, 0xe916, 0x8, 0x41d, 0x4b4, 0x3}, {0x10001, 0x5, 0x1, 0x3, 0x80000001, 0x10000000}, {0x1, 0x7fffffff, 0x0, 0x8, 0x9, 0x8000}, {0x80, 0x4, 0x5, 0x10000000, 0x2, 0xe2}, {0x5, 0xef53, 0x7, 0xfff, 0x7, 0x8000}, {0xda95, 0x100, 0x21f, 0x5, 0x1000, 0x1}, {0xffffffff, 0x80000000, 0x2, 0x1, 0x5, 0x80}, {0x0, 0xf5f4, 0x3, 0x2, 0x8, 0x2}, {0x80000000, 0x3f0, 0x1000, 0x0, 0xffff, 0x1}, {0x81, 0x3, 0x4, 0xb3df, 0x1ed, 0x80000001}, {0x6, 0x6, 0x5, 0x9, 0x2, 0x8}, {0x4, 0x3, 0x1, 0x3, 0x4ed, 0x5}, {0x10001, 0x80, 0x7c, 0x7ff, 0x20, 0x7f}, {0x5, 0x1, 0xa9, 0x9, 0x7fffffff, 0xffffff81}, {0x5, 0x5, 0x4, 0x59, 0x8, 0x8}, {0x5a8e000, 0x10001, 0x1ff, 0x8, 0xff, 0x800}, {0x3, 0xb13, 0x0, 0x8, 0xff, 0x2}, {0x3f, 0x1, 0x0, 0x4, 0x479a, 0x4}, {0x6, 0x2, 0x8, 0x10000, 0x8, 0x8}, {0x599, 0x81, 0x23fa, 0xe0b, 0x2d, 0x3f}, {0x8, 0x2e, 0x8, 0x2, 0x6}, {0x6, 0xffffffff, 0xf0, 0x4, 0x3, 0x4}, {0x279a, 0x80000000, 0x4, 0xd8ec, 0x2, 0x9e}, {0x1, 0xffffffff, 0x28, 0xc189, 0xffff, 0x1}, {0x7fff, 0x9823, 0x6, 0x2d4, 0xff, 0x95}, {0x0, 0x2, 0xffffffff, 0x4, 0x4, 0xfffffff9}, {0xb4, 0x1000, 0x6, 0x9, 0x1, 0x3543eb8c}, {0x80000001, 0x8, 0x9, 0x0, 0x0, 0x1}, {0x0, 0xfa79, 0x1, 0x0, 0x1000, 0x1f}, {0x6, 0x80000000, 0x7, 0x10000, 0x3, 0x3}, {0x3f, 0x3, 0x3f, 0x7fff, 0x9, 0xe8c6}, {0x8, 0x7, 0x4, 0x2b55, 0x3, 0x7}, {0x400, 0x2, 0x800, 0x4, 0x1, 0x4}, {0x40000, 0x3, 0x100, 0x0, 0x0, 0x8}, {0x7, 0x6, 0x2, 0x7fffffff, 0x8001, 0x7}, {0x1, 0xfff, 0x400, 0x7, 0x4, 0x8}, {0x3f, 0x9, 0x3, 0x10000, 0x2}, {0x10000, 0x401, 0xff, 0x23, 0x3, 0x2}, {0x4, 0x1, 0x1, 0x6, 0x6, 0xab}, {0x81, 0x2, 0x36, 0x5, 0x16e2, 0xffff}, {0x3, 0x5, 0x71f9a8ce, 0x1, 0xc3d, 0x80}, {0x1, 0x5, 0x4, 0x1, 0xffffffff, 0xffffffe0}, {0x0, 0x2, 0x8001, 0x9, 0x5, 0x800}, {0x4, 0x4, 0x3, 0x3f, 0x1, 0xe389}, {0x1, 0x0, 0xfffffff8, 0x20, 0x5, 0x2}, {0x4, 0x1, 0x3, 0x4, 0x0, 0x200}, {0xd4, 0x10000, 0x4, 0x4, 0x3, 0x1}, {0x101, 0xfff, 0xff, 0x7, 0x8, 0x200}, {0x1, 0x7, 0x40, 0x4, 0x400, 0xffffffad}, {0xffffffe0, 0x2, 0x372, 0x5, 0xa44, 0x4}, {0x80000000, 0x1, 0x1, 0x1, 0x7, 0x8}, {0x7fff, 0xe95, 0x9, 0x4, 0xca, 0x2}, {0x8000, 0x2, 0x1f, 0x1, 0xc1, 0x8}, {0x7, 0x5, 0xffffffff, 0x2000000, 0x3, 0xffffffc1}, {0x200, 0x8, 0x0, 0x2, 0x7fff, 0x101}, {0xfffffffc, 0x0, 0x7f, 0x7, 0x3, 0x6}, {0x200, 0x5, 0x4800000, 0x7fffffff, 0x1, 0x100}, {0x6, 0x3, 0x1, 0x14a, 0x2d0b}, {0x5, 0x4, 0x7, 0x10000, 0x7fffffff, 0x40}, {0x6, 0x10001, 0x9, 0x2, 0x9}, {0x1, 0xff, 0x8, 0x4, 0x0, 0x1}, {0x0, 0x200, 0x4, 0x4, 0x0, 0xfffffffa}, {0x7, 0x1400, 0x9837, 0x9, 0x3, 0x10000}, {0x7, 0x9, 0x7, 0x2, 0x60a13f9, 0x2}, {0x6, 0xb91, 0xfffff000, 0x7, 0x4, 0x1}, {0x2, 0xfffffbff, 0x40, 0x0, 0x7f}, {0x3, 0x7fff, 0x8, 0x8, 0x7fff, 0x1}, {0xec, 0x10000, 0x2, 0x9, 0x273, 0x5}, {0x5, 0x7, 0x2, 0x6, 0x7, 0x8}, {0x3f60, 0x80, 0x80000000, 0x8, 0xd812, 0x2}], [{0x4, 0x1}, {0x4}, {0x4}, {0x3, 0x1}, {0x5}, {0x3, 0x48aa7c497b77e005}, {0x1}, {0x4}, {0x2, 0x1}, {0x2}, {0x2, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x3}, {0x0, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x5}, {0x6}, {0x16b0d90320eca86b, 0x1}, {}, {0x3}, {0x3, 0x1}, {0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x2}, {0x2}, {0x4, 0x1}, {0x5}, {0x1}, {0x3}, {0x1, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x1}, {0x2, 0x1}, {}, {}, {0x3, 0x1}, {0x3}, {0x4}, {0x3, 0x1}, {0x5}, {0x1}, {0x3}, {0x1}, {0x2}, {}, {0x2, 0x1}, {0x4, 0x1}, {0x4}, {0x5, 0x1}, {0x3}, {0x4}, {0x1, 0x1}, {0x1, 0x1}, {0x3, 0x3}, {0x1, 0x1}, {0x1}, {0x3}, {0x3, 0x1}, {0x3, 0x1}, {}, {0x3}, {0x3, 0x1}, {}, {0x4, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x3}, {0x0, 0x1}, {0x3}, {0x2}, {0x4, 0x1}, {0x1}, {0x5, 0x1}, {0x3}, {0x2, 0x1}, {0x5}, {0x1, 0x1}, {0x5, 0x1}, {}, {}, {0x3, 0x1}, {0x4}, {0x4, 0x1}, {0x2}, {}, {0x5}, {0x1}, {0x5, 0x1}, {0x1}, {0x2, 0x1}, {}, {0x5, 0x1}, {0x4, 0x1}, {0x2}, {0x4}, {0x3}, {0x1}, {0x3}, {0x5, 0x1}, {0x4}, {0x5}, {}, {}, {0x2, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x1}, {0x0, 0x1}, {0x2, 0x1}, {}, {0x0, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x1}, {0x2}, {}, {0x4}, {0x3}, {0x5}, {}, {0x0, 0x1}, {0x1}], 0x1}}]}, {0x98, 0x6, "13122f1b0736d6622b4b7e8765fee0a134a5db1669b8731241d49d3573b5ad8f605ec7e97e85e4d2dcd2afe75c71b9ffb2a7977db47442c68efd7613a53151e8e8315c4f919403b03482a1ba203c63d8a7424b461f0b4adac5cb80d78b0742321d342355c71026a45bd73ad979d9525b583a196f583eaba48d93f1a3f79e9bc59979ca1ba24aa82e4a5786d6728a276823951ef7"}, {0xc}, {0xc, 0x8, {0x3, 0x4}}}}, @m_nat={0x98, 0x11, 0x0, 0x0, {{0x8, 0x1, 'nat\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0xd4, 0x3f, 0xffffffffffffffff, 0x81, 0x7ff}, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, 0xffffff00}}]}, {0x46, 0x6, "a885255a748d47858ea523808939332c8ce6126bbf5861ddaa2c64e5edc0c3db2b4efe344449ec0303865198e811b7f9211071081a08a0c020627c426b8a38d48ac0"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x3}}}}, @m_vlan={0x1a4, 0x16, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x8c, 0x2, 0x0, 0x1, [@TCA_VLAN_PARMS={0x1c, 0x2, {{0x5, 0xfffffff8, 0x1, 0x10001, 0x9}, 0x1}}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x9, 0x8, 0x4, 0x4, 0x8}, 0x2}}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x1}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x1, 0x1fc, 0x2, 0x4, 0x9ee}, 0x2}}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x46, 0x3, 0x3, 0xd9, 0x9}, 0x2}}]}, {0xef, 0x6, "775308931ca72545a436944a3702d61d765a95ad166938168ff6ff5be9a8dd98ed0854bb36c0a60df7a253c67be2a4b710fbd875e5b7ea9006888a040cb86dd012ad16001b9327c302dd49c8a0663164d3882b5fdf60928e580679ddcc5fa5c6275ba49c0fe9cbf80d19be749b5c8c1749e8dbe08e5720ffd063a346887a4e38e533232b1553d2f9779970fb37d3157f7b19aa10a3bef1ab09fb5218433fbc2347f5d7076bcd85f9884916d58fef92600f1c7e037c2e953ccfedb0f9237183e4eaf382d4bb259e1beaa7fc4773c2f690eaf1ddcfc3226c98ffe1effef2c833bb6e53a8ca538a823ed48ad3"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}]}, @TCA_BASIC_ACT={0x1450, 0x3, [@m_xt={0x127c, 0x1b, 0x0, 0x0, {{0x7, 0x1, 'xt\x00'}, {0x1204, 0x2, 0x0, 0x1, [@TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_TARG={0xfa, 0x6, {0x1, 'security\x00', 0x9, 0x124e, "94991e11e25a4907972b49537532d958605274449145687f20b2f1d548e46805333086cf7f352615aa98e9a84a2291ee6ea74e8a28b8b5b5a53577939cbe7ee5d64fbe85f0ef685ad0cb70636727453e35e4ab295073247da1b55e58ca3baa6435c6e0fbd36483d2479b06c763d2a887fc166248688add5cf3ae054fabaa70d04e74d5f8d5b252ed8c10e88a0795837965bcdfa25a825115edbb4689913d171e718dcddd45ab35aac823275fc33c5307265e5e0e367918615fb54e80125210486e655648942d1d1190018149ebd3184a"}}, @TCA_IPT_TARG={0x102a, 0x6, {0x8000, 'mangle\x00', 0x98, 0x3, "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"}}, @TCA_IPT_TARG={0xc8, 0x6, {0x0, 'nat\x00', 0x0, 0x4, "84e3893c6fe6ae4cab76deae237c31e6b51b3b0801cf20dfc707b11efe091d0c1f960ac6cb1427a1ec63f57ef4845068a0b48e1369da8c416d8d67231c838edc164f988b0aae3f84a04f6a90f2ea59168e703bb61144cd98d4a17cdb74455fe82e36b59631377043e7aca7ef9c17be8061a045f0b376be62677c67bbbbc9913bdc09050c1bfd6749ff71c6abeb9c7bc9344427ac9e47d07cbcf765f3158b"}}, @TCA_IPT_HOOK={0x8, 0x2, 0x4}]}, {0x53, 0x6, "8f62837653451645cef6be4f765dcc72740d6e8463b5936ffbc042c6c10eb187dd7259a7bb03ef78cbc1b5dfae8e11e1542ad8371b7cfec64b639b28d6226e3e58ce3a138e0c52b9cfe6e4c54d8c65"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_mirred={0x104, 0x3, 0x0, 0x0, {{0xb, 0x1, 'mirred\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x80000000, 0x3ff, 0x7, 0x9, 0xae}, 0x2, r9}}]}, {0xb7, 0x6, "8593e234d471a0df1da5b1c8b36182dc2ab83690a4aac56263739b5cd0673d420e9e2fa0c52e71928dad06d1d09194ac5ede020e65b3695c49dede1a56a6a738d17bef80cd2e36db3a712bce7b5e94bb1755b6a12dfe544ef61e96e0b58503e09de7126f78c0a6ad593f2f6df705116849ff71c7b4a12585536d68672321ff29f09bbcf570f560e88cdb227051da5b725e3f56cb1f4c0b29d61990a6025c764a73cbc30c74250577a29b01ed5936cca969b5c3"}, {0xc}, {0xc, 0x8, {0x7}}}}, @m_mirred={0xcc, 0xb, 0x0, 0x0, {{0xb, 0x1, 'mirred\x00'}, {0x64, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x6, 0x1000, 0xffffffffffffffff, 0x9, 0x4}, 0x3}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x2, 0x5, 0x4, 0x48a, 0xca81}, 0x4, r3}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x36be, 0x5, 0x20000000, 0xfffffffa, 0x2}, 0x2}}]}, {0x3f, 0x6, "fcb6b74e5169d92276019e802ec2c5295ba96e6a3c82f3a19bb64fbe184f1ac6067927876e44e1a7787d99378c70ee476050cb4251d4fc06e6cf04"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x3}}}}]}, @TCA_BASIC_EMATCHES={0x2c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x24, 0x2, 0x0, 0x1, [@TCF_EM_META={0x20, 0x2, 0x0, 0x0, {{0x6, 0x4, 0x8}, [@TCA_EM_META_RVALUE={0x14, 0x3, [@TCF_META_TYPE_INT, @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR, @TCF_META_TYPE_INT=0x7]}]}}]}, @TCA_EMATCH_TREE_LIST={0x4}]}, @TCA_BASIC_ACT={0x134, 0x3, [@m_xt={0x130, 0x1, 0x0, 0x0, {{0x7, 0x1, 'xt\x00'}, {0x80, 0x2, 0x0, 0x1, [@TCA_IPT_INDEX={0x8, 0x3, 0xfffffffd}, @TCA_IPT_TARG={0x3e, 0x6, {0x40, 'mangle\x00', 0x0, 0xffff, "9b8556995374eecef0049d1c85a1a9f7409d4b7b"}}, @TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_INDEX={0x8, 0x3, 0xffff}, @TCA_IPT_TABLE={0x24, 0x1, 'mangle\x00'}]}, {0x8c, 0x6, "ab164d8b25d40d6e2bdb1e6d81d6c33c8ad8159057aeace825d47a66a48d3bf3785d8ba1031fd2304d9fa86dea56df1171d1066c9edec1651be11d38b2c44555079744c1ea494eafeafe8204cb9b8e386e24646e92d46d4bbe813a04f791c5819ffb78224116e8f2161c950adc14b4c7a69b41df3bb8c4a2dffbf72e8f606f8cc729f9f65300ef12"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}]}, @TCA_BASIC_POLICE={0x18, 0x4, [@TCA_POLICE_RATE64={0xc, 0x8, 0x8}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x40}]}, @TCA_BASIC_ACT={0x284, 0x3, [@m_bpf={0xa8, 0x6, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x4c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x400, 0x7c71, 0x5, 0x6f, 0x7ff}}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0xc3, 0x2, 0x1, 0xfffffffc, 0x68}}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x8}]}, {0x37, 0x6, "fcd25ed94b9b60f0f2d825d2a158f85e59f15b8106d9c6b49936508ed1348220a77a94aa224026b6266e949014b3701cfb07ef"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_simple={0x50, 0x10, 0x0, 0x0, {{0xb, 0x1, 'simple\x00'}, {0x1c, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x1, 0xba2, 0x1, 0xfffffe01, 0x7}}]}, {0xa, 0x6, "9839ad3b9327"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x7, 0x7}}}}, @m_skbedit={0x118, 0x3, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x54, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x4}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x4}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0xfffffff9}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x5}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0x4, 0x4}}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xa, 0x4}}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x2}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x2}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x9}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xfff2, 0x7}}]}, {0x99, 0x6, "f7c4dbce66f9b447fbf3a094445248c828d8c3d1de603733e7734e8387d5135dd8afb32f13584f7745206a82d1e27662f45c47cdd040651d53af2014d0b1345802cec99af8411c2e4365b57337be31b8a87e829c2d6faf662e0bccabda1d176d996ae2e57bc60842e7ee6688cdabcbf9e983c9bd98c039c70e7b9bc3dc2e7cd6f4f69de0206cf9e9287befeea1a727aa74830f9a24"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_nat={0x70, 0xa, 0x0, 0x0, {{0x8, 0x1, 'nat\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x81, 0x0, 0x0, 0x401}, @dev={0xac, 0x14, 0x14, 0x22}, @private=0xa010100, 0x0, 0x1}}]}, {0x1f, 0x6, "389c1fc833a9bde1a723fee76d68563909c41ba16ca88af164602e"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}]}]}}]}, 0x6874}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 04:12:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x33, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x154, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:12 executing program 5 (fault-call:3 fault-nth:16): clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 252.553664] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000f [ 252.560935] R13: 00007ffedf47f0cf R14: 00007f65712359c0 R15: 000000000118bf2c [ 252.589083] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:12 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x600000, 0x0, 0x0) [ 252.652483] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 04:12:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 252.695450] sysv_free_inode: inode 0,1,2 or nonexistent inode [ 252.707096] FAULT_INJECTION: forcing a failure. [ 252.707096] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:12:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x300, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 252.737164] CPU: 0 PID: 14454 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 252.745238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.754682] Call Trace: [ 252.757281] dump_stack+0x22c/0x33e [ 252.760923] should_fail.cold+0xa/0x2f [ 252.764824] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 252.769950] __alloc_pages_nodemask+0x256/0x2a60 [ 252.774725] ? lock_downgrade+0x750/0x750 [ 252.778883] ? mark_held_locks+0xf0/0xf0 [ 252.782952] ? find_held_lock+0x2d/0x110 [ 252.787069] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 252.791897] ? current_time+0x6f/0x1c0 [ 252.795775] ? find_held_lock+0x2d/0x110 [ 252.799848] ? __pud_alloc+0xd6/0x280 [ 252.803639] ? lock_downgrade+0x750/0x750 [ 252.807787] ? lock_acquire+0x170/0x3f0 [ 252.811747] alloc_pages_current+0x19d/0x2c0 [ 252.816200] __pmd_alloc+0x37/0x480 [ 252.819819] __handle_mm_fault+0x1790/0x4370 [ 252.824231] ? vmf_insert_mixed_mkwrite+0xa0/0xa0 [ 252.829097] ? find_held_lock+0x2d/0x110 [ 252.833145] ? mark_held_locks+0xa6/0xf0 [ 252.837189] ? check_preemption_disabled+0x41/0x2b0 [ 252.842191] handle_mm_fault+0x489/0xb90 [ 252.846250] __get_user_pages+0x58d/0x16b0 [ 252.850492] ? follow_page_mask+0x1db0/0x1db0 [ 252.854997] ? __se_sys_copy_file_range+0x410/0x410 [ 252.860019] ? fsnotify+0x99c/0xd80 [ 252.863769] ? __fsnotify_parent+0xd1/0x31c [ 252.868079] get_user_pages_remote+0x220/0x4a0 [ 252.872651] copy_strings.isra.0+0x499/0xa00 [ 252.877051] ? flush_old_exec+0x1c50/0x1c50 [ 252.881367] ? prepare_binprm+0x6d3/0x910 [ 252.885538] ? lock_downgrade+0x750/0x750 [ 252.889680] ? set_binfmt+0x130/0x130 [ 252.893468] copy_strings_kernel+0x9e/0x110 [ 252.897799] __do_execve_file+0x106d/0x23c0 [ 252.902132] ? open_exec+0x70/0x70 [ 252.905666] ? check_preemption_disabled+0x41/0x2b0 [ 252.910695] ? __check_object_size+0x17b/0x3dd [ 252.915290] do_execveat+0x3d/0x50 [ 252.918840] __x64_sys_execveat+0xe1/0x120 [ 252.923076] do_syscall_64+0xf9/0x670 [ 252.926888] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.932100] RIP: 0033:0x45de59 [ 252.935290] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 252.954173] RSP: 002b:00007f6571234c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 252.961886] RAX: ffffffffffffffda RBX: 0000000000002d40 RCX: 000000000045de59 [ 252.969177] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 252.976458] RBP: 00007f6571234ca0 R08: 0000000000001000 R09: 0000000000000000 04:12:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x34, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 252.983724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000010 [ 252.990979] R13: 00007ffedf47f0cf R14: 00007f65712359c0 R15: 000000000118bf2c 04:12:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$CHAR_RAW_ROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000300)) removexattr(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_config_ext={0x0, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104063, &(0x7f0000001280)) dup(0xffffffffffffffff) syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='freezer.parent_freezing\x00', 0x0, 0x0) sendto$x25(r1, &(0x7f0000000140)="31ddee952186de5179c402168b7d70d370f0dd5ea43cecbd183a167b55a72aff32b02ddda616df89aa64a487bc661ab47e9c693a4b40bab8ca13733f010164f033cace5ebed5e96cb7ea1ebf406bfa912c2b73178018e92a23f0acc94e9254127fc52baa68c238088469ba006c888e998a08199889db8230744e0016e8f61fd557fda5d4164859ecbcaa", 0x8a, 0x4010, &(0x7f00000002c0)={0x9, @remote={[], 0x2}}, 0x12) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040)='NLBL_CIPSOv4\x00') setpgid(0x0, 0x0) 04:12:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0xb}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x600, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:12 executing program 5 (fault-call:3 fault-nth:17): clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x35, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 253.198039] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0xc}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 253.253125] FAULT_INJECTION: forcing a failure. [ 253.253125] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 253.321597] CPU: 0 PID: 14483 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 253.329538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.338894] Call Trace: [ 253.341491] dump_stack+0x22c/0x33e [ 253.345133] should_fail.cold+0xa/0x2f [ 253.349032] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 253.354156] __alloc_pages_nodemask+0x256/0x2a60 [ 253.358955] ? unwind_get_return_address+0x51/0x90 [ 253.363891] ? __save_stack_trace+0x99/0x100 [ 253.368322] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 253.373176] ? mark_held_locks+0xf0/0xf0 [ 253.377245] ? lock_downgrade+0x750/0x750 [ 253.381418] ? mark_held_locks+0xf0/0xf0 [ 253.385483] ? mark_held_locks+0xf0/0xf0 [ 253.389552] ? find_held_lock+0x2d/0x110 [ 253.393651] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 253.398503] ? current_time+0x6f/0x1c0 [ 253.402420] alloc_pages_current+0x19d/0x2c0 [ 253.406871] pte_alloc_one+0x16/0x1b0 [ 253.410682] __pte_alloc+0x21/0x370 [ 253.414342] do_anonymous_page+0x1094/0x1c80 [ 253.418768] ? lock_acquire+0x170/0x3f0 [ 253.422779] ? __pmd_alloc+0x147/0x480 [ 253.426677] ? __pte_alloc+0x370/0x370 [ 253.430574] ? do_raw_spin_unlock+0x171/0x240 [ 253.435105] ? _raw_spin_unlock+0x29/0x40 [ 253.439274] __handle_mm_fault+0x22ce/0x4370 [ 253.443698] ? vmf_insert_mixed_mkwrite+0xa0/0xa0 [ 253.448549] ? find_held_lock+0x2d/0x110 [ 253.452654] ? mark_held_locks+0xa6/0xf0 [ 253.456763] ? check_preemption_disabled+0x41/0x2b0 [ 253.461804] handle_mm_fault+0x489/0xb90 [ 253.465902] __get_user_pages+0x58d/0x16b0 [ 253.470158] ? follow_page_mask+0x1db0/0x1db0 [ 253.474666] ? __se_sys_copy_file_range+0x410/0x410 [ 253.479695] ? fsnotify+0x99c/0xd80 [ 253.483335] ? __fsnotify_parent+0xd1/0x31c [ 253.487677] get_user_pages_remote+0x220/0x4a0 [ 253.492289] copy_strings.isra.0+0x499/0xa00 [ 253.496719] ? flush_old_exec+0x1c50/0x1c50 [ 253.501052] ? prepare_binprm+0x6d3/0x910 [ 253.505211] ? lock_downgrade+0x750/0x750 [ 253.509395] ? set_binfmt+0x130/0x130 [ 253.513211] copy_strings_kernel+0x9e/0x110 [ 253.517546] __do_execve_file+0x106d/0x23c0 [ 253.521887] ? open_exec+0x70/0x70 [ 253.525438] ? check_preemption_disabled+0x41/0x2b0 [ 253.530476] ? __check_object_size+0x17b/0x3dd [ 253.535077] do_execveat+0x3d/0x50 [ 253.538634] __x64_sys_execveat+0xe1/0x120 [ 253.542886] do_syscall_64+0xf9/0x670 [ 253.546728] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.551923] RIP: 0033:0x45de59 04:12:13 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x6b6b6b, 0x0, 0x0) [ 253.555125] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 253.574053] RSP: 002b:00007f6571234c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 253.581765] RAX: ffffffffffffffda RBX: 0000000000002d40 RCX: 000000000045de59 [ 253.589057] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 253.596326] RBP: 00007f6571234ca0 R08: 0000000000001000 R09: 0000000000000000 [ 253.603626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000011 [ 253.610929] R13: 00007ffedf47f0cf R14: 00007f65712359c0 R15: 000000000118bf2c 04:12:13 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') bind$netrom(r2, &(0x7f00000000c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null]}, 0x48) perf_event_open(&(0x7f0000000240)={0x5, 0x70, 0x20, 0x0, 0xc9, 0x4f, 0x0, 0x100000000, 0x4cc10, 0xb, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0x7, 0x244}, 0x1, 0x7, 0x40, 0x5, 0x65b, 0x0, 0xd8e}, 0x0, 0xb, r1, 0x9) r3 = open(&(0x7f0000000000)='./bus\x00', 0x1141042, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x10400, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000200)={0x0, 0x1, 0xffffffffffffffff, 0x9, 0x80000}) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 04:12:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xa00, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:13 executing program 5 (fault-call:3 fault-nth:18): clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x36, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 253.637528] sysv_free_inode: inode 0,1,2 or nonexistent inode [ 253.718422] FAULT_INJECTION: forcing a failure. [ 253.718422] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:12:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x10}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 253.810143] CPU: 0 PID: 14501 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 253.818080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.827459] Call Trace: [ 253.830056] dump_stack+0x22c/0x33e [ 253.833697] should_fail.cold+0xa/0x2f [ 253.837598] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 253.842720] __alloc_pages_nodemask+0x256/0x2a60 [ 253.847489] ? unwind_get_return_address+0x51/0x90 [ 253.852474] ? __save_stack_trace+0x99/0x100 [ 253.856911] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 253.861803] ? mark_held_locks+0xf0/0xf0 [ 253.865895] ? lock_downgrade+0x750/0x750 [ 253.870058] ? mark_held_locks+0xf0/0xf0 [ 253.874125] ? mark_held_locks+0xf0/0xf0 [ 253.878201] ? find_held_lock+0x2d/0x110 [ 253.882273] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 253.887127] ? current_time+0x6f/0x1c0 [ 253.891030] alloc_pages_current+0x19d/0x2c0 [ 253.895452] pte_alloc_one+0x16/0x1b0 [ 253.899289] __pte_alloc+0x21/0x370 [ 253.902953] do_anonymous_page+0x1094/0x1c80 [ 253.907404] ? lock_acquire+0x170/0x3f0 [ 253.911385] ? __pmd_alloc+0x147/0x480 [ 253.915280] ? __pte_alloc+0x370/0x370 [ 253.919177] ? do_raw_spin_unlock+0x171/0x240 [ 253.923689] ? _raw_spin_unlock+0x29/0x40 [ 253.927870] __handle_mm_fault+0x22ce/0x4370 [ 253.932285] ? vmf_insert_mixed_mkwrite+0xa0/0xa0 [ 253.937126] ? find_held_lock+0x2d/0x110 [ 253.941472] ? mark_held_locks+0xa6/0xf0 [ 253.945548] ? check_preemption_disabled+0x41/0x2b0 [ 253.950565] handle_mm_fault+0x489/0xb90 [ 253.954627] __get_user_pages+0x58d/0x16b0 [ 253.958869] ? follow_page_mask+0x1db0/0x1db0 [ 253.963363] ? __se_sys_copy_file_range+0x410/0x410 [ 253.968379] ? fsnotify+0x99c/0xd80 [ 253.972166] ? __fsnotify_parent+0xd1/0x31c [ 253.976497] get_user_pages_remote+0x220/0x4a0 [ 253.981088] copy_strings.isra.0+0x499/0xa00 [ 253.985502] ? flush_old_exec+0x1c50/0x1c50 [ 253.989820] ? prepare_binprm+0x6d3/0x910 [ 253.993966] ? lock_downgrade+0x750/0x750 [ 253.998110] ? set_binfmt+0x130/0x130 [ 254.001918] copy_strings_kernel+0x9e/0x110 [ 254.006242] __do_execve_file+0x106d/0x23c0 [ 254.010585] ? open_exec+0x70/0x70 [ 254.014150] ? check_preemption_disabled+0x41/0x2b0 [ 254.019178] ? __check_object_size+0x17b/0x3dd [ 254.023795] do_execveat+0x3d/0x50 [ 254.027355] __x64_sys_execveat+0xe1/0x120 [ 254.031592] do_syscall_64+0xf9/0x670 [ 254.035412] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 254.040596] RIP: 0033:0x45de59 [ 254.043792] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 254.062687] RSP: 002b:00007f6571234c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 254.070412] RAX: ffffffffffffffda RBX: 0000000000002d40 RCX: 000000000045de59 [ 254.077697] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 254.084985] RBP: 00007f6571234ca0 R08: 0000000000001000 R09: 0000000000000000 [ 254.092249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000012 [ 254.099513] R13: 00007ffedf47f0cf R14: 00007f65712359c0 R15: 000000000118bf2c 04:12:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xc00, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 254.180589] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x14}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x37, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:13 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0xf0ffff, 0x0, 0x0) [ 254.286504] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xe00, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x38, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 254.426928] VFS: Found a V7 FS (block size = 512) on device loop1 [ 254.557442] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x38, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:14 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x1000000, 0x0, 0x0) 04:12:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xf00, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:14 executing program 5 (fault-call:3 fault-nth:19): clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x1c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x39, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 254.745533] FAULT_INJECTION: forcing a failure. [ 254.745533] name failslab, interval 1, probability 0, space 0, times 0 [ 254.785512] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x4000, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 254.809323] CPU: 1 PID: 14560 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 254.817221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.826603] Call Trace: [ 254.829203] dump_stack+0x22c/0x33e [ 254.832844] should_fail.cold+0xa/0x2f [ 254.836739] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 254.841856] __should_failslab+0x153/0x1b6 [ 254.846125] should_failslab+0x5/0xf [ 254.849870] kmem_cache_alloc+0x2b1/0x4a0 [ 254.854055] ptlock_alloc+0x1d/0x70 [ 254.857693] pte_alloc_one+0x68/0x1b0 [ 254.861496] __pte_alloc+0x21/0x370 [ 254.865131] do_anonymous_page+0x1094/0x1c80 [ 254.869545] ? lock_acquire+0x170/0x3f0 [ 254.873524] ? __pmd_alloc+0x147/0x480 [ 254.877415] ? __pte_alloc+0x370/0x370 [ 254.881306] ? do_raw_spin_unlock+0x171/0x240 [ 254.885808] ? _raw_spin_unlock+0x29/0x40 [ 254.889969] __handle_mm_fault+0x22ce/0x4370 [ 254.894389] ? vmf_insert_mixed_mkwrite+0xa0/0xa0 [ 254.899236] ? find_held_lock+0x2d/0x110 [ 254.903313] ? mark_held_locks+0xa6/0xf0 04:12:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x24}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 254.907383] ? check_preemption_disabled+0x41/0x2b0 [ 254.912409] handle_mm_fault+0x489/0xb90 [ 254.916478] __get_user_pages+0x58d/0x16b0 [ 254.920749] ? follow_page_mask+0x1db0/0x1db0 [ 254.925257] ? __se_sys_copy_file_range+0x410/0x410 [ 254.930284] ? fsnotify+0x99c/0xd80 [ 254.933919] ? __fsnotify_parent+0xd1/0x31c [ 254.938254] get_user_pages_remote+0x220/0x4a0 [ 254.942856] copy_strings.isra.0+0x499/0xa00 [ 254.947283] ? flush_old_exec+0x1c50/0x1c50 [ 254.951615] ? prepare_binprm+0x6d3/0x910 [ 254.955797] ? lock_downgrade+0x750/0x750 04:12:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x5401, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 254.959951] ? set_binfmt+0x130/0x130 [ 254.963763] copy_strings_kernel+0x9e/0x110 [ 254.968098] __do_execve_file+0x106d/0x23c0 [ 254.972460] ? open_exec+0x70/0x70 [ 254.976031] ? check_preemption_disabled+0x41/0x2b0 [ 254.981059] ? __check_object_size+0x17b/0x3dd [ 254.985661] do_execveat+0x3d/0x50 [ 254.989215] __x64_sys_execveat+0xe1/0x120 [ 254.993469] do_syscall_64+0xf9/0x670 [ 254.997282] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.002476] RIP: 0033:0x45de59 [ 255.005674] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 255.024580] RSP: 002b:00007f6571234c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 255.032287] RAX: ffffffffffffffda RBX: 0000000000002d40 RCX: 000000000045de59 [ 255.039552] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 255.046819] RBP: 00007f6571234ca0 R08: 0000000000001000 R09: 0000000000000000 04:12:14 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000000, 0x0, 0x0) 04:12:14 executing program 3: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0xf0ffff, 0x0, 0x0) [ 255.054097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 255.061361] R13: 00007ffedf47f0cf R14: 00007f65712359c0 R15: 000000000118bf2c [ 255.091227] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x5865, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x3a, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:14 executing program 3: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0xf0ffff, 0x0, 0x0) [ 255.242966] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x6000, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:15 executing program 5 (fault-call:3 fault-nth:20): clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:15 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2730000, 0x0, 0x0) 04:12:15 executing program 3: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0xf0ffff, 0x0, 0x0) [ 255.364136] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x3b, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x6558, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="740000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000440012800900010069706970000000003400028008000300ac1e0001050004007f000000060010000600000005000a0001000000050005003600000006000f000000000008000500", @ANYRES32=0x0, @ANYBLOB="08000a134f18ffab6ff1ecb91bfeb4fc0a894723064bd05ae806d07597589e3a72a6f635bd5ff07983f855445b751d70883b15be700004e8434ea902cd2a50e117f92b43e7b180546bd07f300f83f3cea4c19647bcfd7d340534234ac31a4e50e3634efe2a5d752cfbda149bdc89a4a736c26d1fc7c2160847888fd2f6050d68aceb9fd3970e74f6ab22a91013a9b21dc8deb93e40917ccb961a1bdae109fe68eb8d19ea87580227243448f447b49c1c645f1cde3bb9a100e5d1000000"], 0x74}}, 0x0) 04:12:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 255.503876] FAULT_INJECTION: forcing a failure. [ 255.503876] name failslab, interval 1, probability 0, space 0, times 0 [ 255.521457] VFS: Found a V7 FS (block size = 512) on device loop1 [ 255.549473] CPU: 1 PID: 14615 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 255.557388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.566744] Call Trace: [ 255.569351] dump_stack+0x22c/0x33e [ 255.572994] should_fail.cold+0xa/0x2f [ 255.576912] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 255.582032] __should_failslab+0x153/0x1b6 [ 255.586300] should_failslab+0x5/0xf [ 255.590028] kmem_cache_alloc+0x2b1/0x4a0 [ 255.594197] __anon_vma_prepare+0x2d3/0x560 [ 255.598526] ? _raw_spin_unlock+0x29/0x40 [ 255.602684] do_anonymous_page+0x14f6/0x1c80 [ 255.607115] ? lock_acquire+0x170/0x3f0 [ 255.611118] ? __pmd_alloc+0x147/0x480 [ 255.615013] ? __pte_alloc+0x370/0x370 [ 255.618928] ? do_raw_spin_unlock+0x171/0x240 [ 255.623430] ? _raw_spin_unlock+0x29/0x40 [ 255.627607] __handle_mm_fault+0x22ce/0x4370 [ 255.632028] ? vmf_insert_mixed_mkwrite+0xa0/0xa0 [ 255.636900] ? find_held_lock+0x2d/0x110 [ 255.641004] ? mark_held_locks+0xa6/0xf0 [ 255.645101] ? check_preemption_disabled+0x41/0x2b0 [ 255.650150] handle_mm_fault+0x489/0xb90 [ 255.654331] __get_user_pages+0x58d/0x16b0 [ 255.658606] ? follow_page_mask+0x1db0/0x1db0 [ 255.663134] ? __se_sys_copy_file_range+0x410/0x410 [ 255.668179] ? fsnotify+0x99c/0xd80 [ 255.671814] ? __fsnotify_parent+0xd1/0x31c [ 255.676151] get_user_pages_remote+0x220/0x4a0 [ 255.680783] copy_strings.isra.0+0x499/0xa00 [ 255.685234] ? flush_old_exec+0x1c50/0x1c50 [ 255.689569] ? prepare_binprm+0x6d3/0x910 [ 255.693899] ? lock_downgrade+0x750/0x750 [ 255.698052] ? set_binfmt+0x130/0x130 [ 255.701859] copy_strings_kernel+0x9e/0x110 [ 255.706202] __do_execve_file+0x106d/0x23c0 [ 255.710531] ? open_exec+0x70/0x70 [ 255.714068] ? check_preemption_disabled+0x41/0x2b0 [ 255.719108] ? __check_object_size+0x17b/0x3dd [ 255.723703] do_execveat+0x3d/0x50 [ 255.727246] __x64_sys_execveat+0xe1/0x120 [ 255.731482] do_syscall_64+0xf9/0x670 [ 255.735304] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.740487] RIP: 0033:0x45de59 [ 255.743680] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 255.762594] RSP: 002b:00007f6571234c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 255.770297] RAX: ffffffffffffffda RBX: 0000000000002d40 RCX: 000000000045de59 [ 255.777561] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 255.784829] RBP: 00007f6571234ca0 R08: 0000000000001000 R09: 0000000000000000 [ 255.792091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 04:12:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x8100, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:15 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x9000000, 0x0, 0x0) 04:12:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)="02", 0x1}], 0x1, 0x0, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) fallocate(r1, 0x0, 0x0, 0x10000101) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x4, 0x0) getsockname$l2tp(r3, &(0x7f0000000180)={0x2, 0x0, @broadcast}, &(0x7f00000001c0)=0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000200)=0x1, 0x4) close(r2) sendmsg$NL80211_CMD_AUTHENTICATE(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x98, 0x0, 0x8, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x19, 0x6}}}}, [@NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x3}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x3}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x98}, 0x1, 0x0, 0x0, 0x800}, 0x20008014) r4 = open(&(0x7f0000002000)='./bus\x00', 0x46042, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000000)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x381080, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r5, 0xc008ae09, &(0x7f0000000400)=""/113) sendfile(r2, r4, 0x0, 0x200fff) [ 255.799353] R13: 00007ffedf47f0cf R14: 00007f65712359c0 R15: 000000000118bf2c [ 255.822313] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x3c, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:15 executing program 5 (fault-call:3 fault-nth:21): clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x30}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:15 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x43}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xf000, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 256.033014] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x3d, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:15 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x300) 04:12:15 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x3f000000, 0x0, 0x0) 04:12:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x44}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 256.166402] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:15 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x500) [ 256.346182] VFS: Found a V7 FS (block size = 512) on device loop1 [ 256.417910] sysv_free_inode: inode 0,1,2 or nonexistent inode [ 257.107208] audit: type=1800 audit(1602648736.795:51): pid=14646 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16454 res=0 04:12:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x3e, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xf0ffff, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x48}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:16 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x600) 04:12:16 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x6b6b6b00, 0x0, 0x0) 04:12:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 257.145734] audit: type=1800 audit(1602648736.825:52): pid=14685 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=16454 res=0 04:12:16 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x700) [ 257.280902] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x1000000, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:17 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x900) 04:12:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4b}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x41, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:17 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0xebffffff, 0x0, 0x0) [ 257.424472] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x2000000, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:17 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xa00) 04:12:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x42, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 257.590569] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4f}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:17 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0xeea30000, 0x0, 0x0) 04:12:17 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 04:12:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x3000000, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x43, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:17 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xb00) [ 257.714341] sysv_free_inode: inode 0,1,2 or nonexistent inode [ 257.817007] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x50}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:17 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 04:12:17 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0xf6ffffff, 0x0, 0x0) 04:12:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x4000000, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:17 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xc00) [ 257.916670] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x53}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x44, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:17 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 04:12:17 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xd00) 04:12:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x6000000, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x54}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 258.127121] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x45, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x58}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:17 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0xff0f0000, 0x0, 0x0) 04:12:17 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xe00) 04:12:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x8000000, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 258.280635] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x5c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x46, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:18 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1002) [ 258.444832] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xa000000, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:18 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0xfffff000, 0x0, 0x0) 04:12:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x60}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x47, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 258.567375] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:12:18 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1003) 04:12:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xc000000, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x64}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:12:18 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1004) 04:12:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x48, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 258.740159] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x70}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:18 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0xffffffeb, 0x0, 0x0) 04:12:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xe000000, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:12:18 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1005) [ 258.856520] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x74}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x49, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:12:18 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1006) 04:12:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xf000000, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 259.064281] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x83}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:18 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0xfffffff6, 0x0, 0x0) 04:12:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4a, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 259.190209] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:18 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1007) 04:12:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x10000000, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 259.295408] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x84}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:12:19 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000000000000, 0x0, 0x0) 04:12:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4b, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 259.401211] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:19 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x102f) 04:12:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x40000000, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:12:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x8c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:19 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1048) [ 259.553592] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:19 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x60000000000000, 0x0, 0x0) 04:12:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:12:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x8f}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4c, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x54010000, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 259.646934] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:19 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x104c) 04:12:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 259.775349] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:12:19 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1068) 04:12:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x60000000, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:19 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x6b6b6b00000000, 0x0, 0x0) 04:12:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4d, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 259.907425] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x2}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:19 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x106c) 04:12:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 260.032158] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:19 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0xf0ffffffffffff, 0x0, 0x0) 04:12:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x65580000, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:19 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1074) 04:12:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4e, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 260.097866] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:19 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x107a) 04:12:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x81000000, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 260.269549] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4f, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:20 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x100000000000000, 0x0, 0x0) 04:12:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:20 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x10d8) 04:12:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:12:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x50, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 260.403408] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x88a8ffff, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:20 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 04:12:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:12:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 260.553403] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:20 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x200000000000000, 0x0, 0x0) 04:12:20 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1200) 04:12:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x51, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:12:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x9effffff, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:20 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x2000) [ 260.663678] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0xa}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:20 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x2f00) 04:12:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x52, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0xf}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xc3ffffff, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 260.885958] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:20 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x273000000000000, 0x0, 0x0) 04:12:20 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x4000) 04:12:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xf0ffffff, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x53, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x10}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 260.996862] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:20 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x4c46) 04:12:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xfcffffff, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x1e}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:12:20 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x20000) [ 261.170871] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x54, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:20 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x900000000000000, 0x0, 0x0) 04:12:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:12:21 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x40000) ioctl$BTRFS_IOC_RM_DEV(r1, 0x5000940b, &(0x7f00000001c0)={{r0}, "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"}) 04:12:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xfeffffff, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x33}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 261.262419] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:21 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0x60, 0x80800) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x55, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 261.417233] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x8c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:21 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80000000, 0x248000) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x6, 0x80000) sendmsg$NL80211_CMD_DEL_KEY(r1, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x84, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_KEY_DEFAULT_TYPES={0x14, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x10, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_SEQ={0x10, 0xa, "3b5aaafcc84b7ba843342de9"}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_SEQ={0xc, 0xa, "b2788be091c8b21b"}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x84}, 0x1, 0x0, 0x0, 0x4008001}, 0x4010) 04:12:21 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x3f00000000000000, 0x0, 0x0) 04:12:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xffffa888, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x56, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 261.566939] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:21 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="98454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x500}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:21 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000040)="f679412b414416c1ab18f323986a5fa8", 0x10) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:12:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x57, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xfffff000, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:21 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0xebffffff00000000, 0x0, 0x0) [ 261.753649] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x600}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:21 executing program 5: clone(0x21a0041ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000380)='\x03g\x8b\xfa`\xf1\xabV7\xa9\xcdB\xa7U\xd4\xba\xc1\xcdO\x0e\x126vw\xcb\x83\x16\xce0\x0e!\xb5R\xae\xd1\xc5<\x1c\xbd\x87\x9b\xc8]\x9bJ\xd3E\x0e;\xee\xc1s\x86\xb1\xef\x14\xd3\xd3\';*Hi\xab\x159BB/\'\xfd\xe50\x1em\xc6\xec(\x85\x98N\x03\xccg\xdc\xe6\xc7\xe8\xcdF\xf2\x17\xe1\xc5\x97\x87\x00\xbe\xc1\xab\xb6\xa6\x02.\x01\xe9/\xc1\"\x1d6\r\xf2lmpt\xad@\xe7\xdd\xe7\xa3Uq\x88\xd43\xa8\xc1\xd4\xd2\xbcW{\x94\xe4t\xdc\xb2\xad\xb1\xae\xd1\xb2\x1f\xe06\xf6\xd6W\xe8W\b\xf3\xa3V\xd5\xb8\xa7\x16?\xef\xdd@\xf4\x8fH\xa2\xce\xbd\xa6\x9c\xb2\xde=y1I\xca\xacj\xbc\x06\xf1\x87\xba\'.\x9f\x9b &\xd5\xe19\xb0\xf1\x90\x80\xa3\xc2\x0flX\x8d*m\x1eVJJ?g\xfd\xfc\x82\x02\xcd\x02cW\x89u\r\x14g\xf0\xa1\x87\xb9\xc1A\x9e\xa8\xf2\x7f\xa4\xaf\'NZ\x1e\x85\xc4\xc2\xba#\xbf\xc8\xb8\xfb6Q>\x995\xf2\x8e\x92\x88\xfe\r\xe9\xf4\xe61\x13\xed\xe5\x14\xde\xb9\xbb\xef\xd4V\x03\t\xf6T\x9d\xef\x16$\xc2\xebT\b\x0e\xab\xcbm=\xaf\xb3\x1a!\x1a\xf2\x8a\xd2O\xd8\x05\x97\xd0r\x1a{\xda\xc2\x05Du\x1d,VA\xab\xf7\xc8\xbc\x10\x18\b(\v8\xff\x1c\x9f\xdd\xe3\xb3^n\x8f\x1fwX\xffS\xa3\xf26\xb3N\xd1\xee\xfb\xb4D\xb6\xe0\xeaM\x88kr\x1e\x8cI\xc34\x9e\xf5\a \xea\x89uPa\xb1\xe7A5\xa7\x93uGg\x98*\x8c:X\"\xdc8=0\xd7\xa3\xdf;]\xe2p\xe9\x8b\x99<:\xc4D\xb4\xb6F\xd3\x93Y\xafY\xb8\x88\xfdX\x18\xac+\xc0u\xe8\x8a\xe3\x99?\x17\xc9\xe5\x91\xe3\xad\xbe\xe5&\xeb\xa7\x1a\xe5\x81\xdcycY8\x9c\xc5n\xdbsR\xb9\x97\xd7\xdc\xd90\x85\x89Z\x15\x1f|\v/\xb1\xfd\x9bPg\xf7\xe4\x1e\xdc\x1f\xe9\xf8\xe5\xdah\x93p\xdf1\xdd\xb5\xde\x00'/504, 0x6) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000040)={0x1f, @any, 0x9}, 0xa) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 261.813185] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x58, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xffffff7f, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:12:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x700}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 261.998902] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:21 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000001c0)=0x4) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYRES32=r0], 0xd8) ioctl$SNDRV_PCM_IOCTL_START(0xffffffffffffffff, 0x4142, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) readlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/186, 0xba) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000200)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @empty, @dev={0xfe, 0x80, [], 0x3a}, 0x7ff, 0x9, 0x1000, 0x400, 0x0, 0x20}) 04:12:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0xa00}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:21 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0xeea3000000000000, 0x0, 0x0) 04:12:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xffffff9e, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 262.112328] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x57, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0xf00}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x59, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:22 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000001380)='\x00'/17, 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) getpeername$llc(0xffffffffffffffff, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000001340)=0x10) r1 = syz_open_dev$video4linux(&(0x7f0000001300)='/dev/v4l-subdev#\x00', 0x168, 0x341d82) pwritev2(r1, &(0x7f0000001280)=[{&(0x7f0000000080)="cfc15df066d5a07666d9166ed6863dc90c871d85ba59ddc39e04d893", 0x1c}, {&(0x7f00000000c0)="e5f8e967f5d1cbfbb395fdda0bb54d9fc19f33d30800cc07b308ec671e43", 0x1e}, {&(0x7f0000000100)="0dd741fde4a9d3580a0976e5066144fdca753a53859f165da900bd0b2a16025a7a2b", 0x22}, {&(0x7f00000001c0)="fc06cca416bea5c0440a795396c53ee3c63106e54c65828b9a09984d553f46e457f4b11737b98e1dbde0416c30b7710410aa0d663e85e327ca75df6d7c7f5598128ae2ab89cbbbd375c8f540cfb0bbbaad9fb7f0b2234bf4ada1b1794c96434c3fe9be243c6d78da39ecb770597402ac6ebde9f7e47c9199bf8d2fc1a5c2b16fd8c8e4153a9d0a66684ae20d654cf0d395044ef985532d63ee583561c5e3f780a391ae9448fc02e288c5f0", 0xab}, {&(0x7f0000000280)="98f28c5eac530e89fef8503cf8250a6956cbd96623a338c4839125c49b7591fe00a2b5c52a3fa568d9f4f4339c398033984dafad386ef38bc92c30d1e9df4efc4a7a60f761c528b45f765a5a68f380a8b3d9143e028c324a00ae6a251daef1ab44afdc81574b0af26ea5b2b75c18d2b4a7a026011a3672e0cd84359e15841d718080163dc3b1aa504cfc534b3af2d6998b8e6a1dd05e49d8278e69a533b9543ef2ddeb570aaa7c38ed3587c5d71e69b2e49025923548bb0e3286a62ef5ae0152cf1b4d4215190e2fb68bda42c2cd410654f1037ea9b43d33f00fc8843a19bb549d9ff71638a58512ad6ea8b81594a60f72ca9fce9a10d207ba5cdee4339a36f2a2a324f40e501ef7a3075ad201b0e879d98aa74d92efc1ed6e2468bb2fe090dbffc10c4982129b0cbc61c004d60df9fa783e3847edc0f904d31d0e3fa8e4b07f57f4cc95bb82835e716f894ca0aa3c3e631f1bd75d3adc968ae6b42366f01005620db7d8dc0665c6a29fcd501d0716e67c10aa9017552615a7bc4474568febdab573a7da0a079e9123878157acedc51b552a546f48cc288f57ad405115b02c291e2aa4c8c7d01c55023d91c41f5f1f0deaefe4b8fc206922f8314000196de4a896aac22b7882ae3e99cd903f7b4bed4737260ffe594dd29d4d736b1caff384b30b659c11e4e73a205aba84a8f2b79911ecaf29dac2c27141e623369ef8e44561c9206956bf4d341efb68fe905d7f31793ee18ce2194abd96d2ddf312425a25ea2547489044776c53872eb1987dd4a2424ad78af05fbcafa67225aca3113c5aeacd0d42864073142767c27644a16ec7a700fa857b2a047f8541fa3579c63f0fd431f07ec82a6cc3da8fdb23ac49715966d13b74db7b15cbe857c86368c6ae06178832d5d5d0bcbeff0a9cefe1aed6c384286421e048fd9268be54596a37fae91096b621b53470808706b108a9449658df033369a754f91b1c046d63af73110a64bcc6703c030612d8c7abe89c18eb228b48bcacdd62eb627bc2cf6ca6c499bc6dc84d64d2b0049d1e99a1bea60e858c104175826c702ebf62aec45fb86246f58cefd80733853ffa5e766ee80ebd62972af1eeb29f9f7b5c67a5a297f43e5ed200958c23a2fc277a7321ac1fb6e0846179db29c6f14581aa5c6350b3ecb138293fe142eec295e5cf5d141bddc138b74bcdb46cdcdd96137ace8346a6a9ded8606a4b25ef94cb48fc228d9ccc362aafb8e85fd83d11b7ec5a32fef796528cda4c5828dd85f6ed1721874a18cc3a76bfa97e55c07ac295cac0921d19dc98c55e561a78f5fadc63cc5c04d747a0f91573394d30b18e7ff011070b6dbad56f99559bbbedbb0b45aebac0bebcd1bd80b789f7877467578791291cba940b1f3f2b04c6d7fff097b6e4017c8603432718938ab412971cbdac9fd894f5ccdaf2d4563aafab3be63d493c8c84c29f40887f178153df7bd3900353ef61f290b66f027ca10a2dd5b41a2a214db9f63436e2123f2ca60927a58a7cefcec4c7e78dc9cea964376cde773aabd97fa10516e8f8a5a44a4a16ef0a1db0840726b5814ab9d6a67e1814ed1dc39b2bcb31763781d704290f519f4bd80808df89dece0080af0f905099de30a76981892340e161b09013262f1c9630b2cee5b39dbd93adf6bcde77d0aa768c9747ba36aaf12854945d7d068d065615fe7025e0e2529efe0dc1673924486a3dae79b9ebb4eb96e691661fe0f3bc6df66196875a79a21886203a832fbda07fba4a3c28445029275684edcd16ef88ee3c20d1e0b477693ada5cae5e127d9a4bc8b9d2f21d20609aa7d583366aaf1ab3dfa48d924357a8892f02f0fb9021e610a6ec0f930a66c7289d795288ed9e2c52ea81917d1684c97bc5a1dca6acfc996e578b773a818ded5e68a533d754367478e261e3aad999e250c976a05aeb9ad639eef63da2ef7e659d246a5877383da80a03a0bd62178732d719ce751563fb10e62b6f7a043059fd007b1f368f93f1c97507f799ae03347fa331149d414c4f6ffdd91e7564ca83fad1af8ab8f595c39d5fe36875decdb179756efa3e3c5567f8517b04933c6ddc05df3aca43ec16f10da7437bc031a545e6ea8e7de3f2f92d4ce44a7c58839e7b01ec31535ab142d83cf540340cd2f205e24740331cb32c6d0901e336fc34ac117b41827b56c3d14bcacafc5738c203242bce547c451d8b066a076eeaea3c4d0315645bec83a78488a95b77fe74a1bd26215b34bdb97e8cb3762b428238757e920accbfecb96f30610e318b143817131582ba385a7a8a1104e2af5f20ab20375e5c819152f6b7dc3f79520c7efa91915071f653936cd418426a7ebe1ecbdeb0d07d670dfbe1b5410904378cb6ec69d3f421e48d44eee0f4ca5ea8ec42a2732ea539968b2ab9418c96665e07f6cef96bf1397c1b69615e74aed88b7ca604a1a9ff27b0f745ff674ca7064329830d72c64cab0560eadad43cb0cf3e4fadfc4955e626479b1e91092215c47c9719610c215c0faee3ed31d281ed4fc98d87ee437de42e36db9eb1224033c41fff545cdd16feaf7a4e44e38fe81ab6087976102376efbb125fbb9c261047736168047144b5ef1c9c84956fb365250864a5b426b9f1e64e77df218bcf6d14a1b34b1462edece8cce5296d4acceccbacd7eb5d06553774af2990bc91e4392cb7c154edb2ee78e0e78b84814d86d9c34f203f1c1205f858790f6fa61b5973459555ff509be162794b4308eaa28db1db775cc303f16df6c052898ac01b42166843400ad0ec7c0d10f5030d2b85a5db63cf54554599be78d08e5de674e0999b1db8db2b3a091b28dbd6417f6d5b62625d8e32b2a4883dccc34c262597796dc60625d735e95b007dd589585c3860dd5991129d9b0c7d2c8f1c2dbf399be3c7951f4c32320365bcf4f65a9d3119db078a39853f249391cab91cdeea449130f980f6c2fa8339a8b6685dd94a8f42ae95535c2cbeddc18810c0b7dc4df0df46b28ca21a4898b28719bfd32d8eabfcd4b83d771585ea48480efe68294f607f311c17b795a82e23200a7a634204a6d5d91deba43325ab3e29fff28e4442780829d20f821fc61eb4bdcf2c19b4aecc2925a70ce970d8d738c51a736d460b2fc159d3eebf0d0370fb1b0582797b8be4044b2d46f818a360b5f124db6992875503e261e455b6dcd350d72a0feac7e2f05249f8db069b77faf618b9eca642e43d60229d6b67941ae99e0d5b32eea8da6b13776d3724af1219d85d8aa5b66b1583157aed73c0ef1a946a06e81dc89849289af957756eabc9d936a40fbc1ba651e2308027ae917caec33106571665223ed51e666caa503511a78082fd9c8fa57469214cd0aa18d9c3d73fcda96cd065c03b22b2c89fdb6ba8d087f504fded0a092d5c1f15eb019715da46255f0daee27893430e1a36cebf0e1f3e4697f93675a2bf42fbea655f059c2a1d83dfef0e2bc9d8e7bb8ff717e6c57b456eafb57a9194cf58f993bcae9cbcec3925b20240526f787a8d469e9a96f8607751527931a20b4775e9855afeb96c9013a36a04c2f41708a38abb253376f5f8e555cf8389f937880cabbc3e715b9ac796d77b3337ea4acedfedd479e3c3581eda0c041c8577329b87568ed67a65b9e306556a9b9bb9794008ba56504314455f2d287fb9ab267ebe093395742d4ad603e252ccea935d25bf3e92e3843dc32f524c6fd21b638b47d54f8c2c73cf276bfb0280ffd225e701adcafea661bdb674d0556b5cc69a8f9f5b1ee948e8ec0e9dab3644e9fa588a3b220863a94e7041bba86b10df7bec98270ac33d8f10f8c84247c7f4aff4d28005e56dd84f46911de35db22d4396cc5b1ba81f9a4831125f7f77025e2e83e3093c91a410360bd23486053448231b2c8fb2eeaa97a5fd3343c51b8182ccb5bc3649e12192d4298d2365abba1396f849056c1f3275993e44fa95aab6b482e93837c660adb3b8a6af4933d28db04be87942190c28b2dc9386e6335439df8e7d97105b37e6b59d86ef1dc56ed52a30d32d220f7c23699eac061fe7953758386a808d16d007010f9c0fa544cd1c9c3f732d779a86e2dbfe4a1957acce60a7a1c1c33ef75a4dbdc35022e24043588d26b63e3b6b1727b7726650d84aded73d88255ee3b83955755fb693b5e8d44f450005a1a96d6ca330123acb1f05edaec327449d2a6d467030e8e0450a6fc2c9c4913e9a47e926313e83672055f5222b5c9a14fb8c973e5be73a239cba30076d075c1b8dec3698b0b9fc37a2e70ecd2b9356d1fda522f6fdc4cd73bc42630462187b022b5ef58cdc0bf7342f2a4d822e9903a52312dd54dbc16db0250975da19656afc7acd061f59417067436c356cf840b38b3be9bb949a6e50772a7f47aba58c58c020a358d1206b0f9b405caed9123f2ef2c8442bb207df8fd223fc18cceb07dcc164b716227cc43f80f8aa6cdaa597cf765d77467973b655e10d717687da65c32738f6d97eb1db933eb6dbc64699c228c170b77c73d17e08b67b9538770657f6344bdca2c16debea8d006ab9ca271c2f9363c769acfe86b44ffefa72515d81de8bd0e400bcd29ca3b807b1057243c997b7269cf4b325d89f401d94264a8e882234a49be8b528a3d026323a65664b5702b4a6c90f3ffc5a086d795e907add0b0f426a24afe6348cd5c63cfe892af8120d4e82304463642c528951128700b07230cf003fbbfcef23f28010a581783947e94d05b75eab308f4c429bca716ab51b5be01bedd8662b3f6c84baf09bc82d714115f66a847a64f5959cbea50769eca93777f735645d28a01ed3ccb8a7ce816df014f82a17c4d6356befc92b7df98bf08049b977846f2c504adbc740c6b06668e35b37942dbf334e62835c7b4a9b71c99656e37f349fdd702a0fd5622b6fd03fc176c262adaac37c87fa324437d567668f5c0bfd4d4b88fcd0cea7abc9d3f8ff42a1c9c73f4e7995edc69a48f45dff697fd6f291b31b6b973ef0186772fd8817ad81185cd43e2b875963dc1a0eb5ab4b5da35e1435b26f0e94d38c7e4c3f3d0450ac6dd86b1f171c6c1bd1abc153ef8a50a7956c5776a1e79372de4734b35d4a862c5c977e16e429478f3a40acef7f9563763a3c500e652cc7ee29aa989dfd0bed58853ee4d52bf9b328c61ef4fde0a9736d74ecf661855c29c4c60c273502f04e5b8ad58a3f1e955143dd4193c034eb6a6be1ff4a7005469caf5bff98753a3f7cbb33750c1ede7dc7745b0fec6b3cbf2903fe90654e2b42e9a2df0a555ddaa0bc5f9a0f313b7f6c424d0bee2f1776ac00252dd885296f03fd80a49f1fdc6c37ddedd45176c101dddedd401d32a338bc267b97a245f0290dd4a3a1608f8d20282af08e6e058599734db98651df79557e4bf95dbb1d412a151559ce95e536d1dbdfc06bc7c03338245d93ceffcfa9c01b8f20916e953dbcbbd474ccd61d041c8741774489207c4e4028b1060592c33b807f2ac7454da6b9b44f79c9a0a7f7468149093f497c4c686d99404db92475a80c4e587d3425196201c0ef275048ec10edf7f69eb84f5a8dd8e57bd64e0dd8a733bf4f9b45d17962101662e85eb9cd071d3970223faa7a005188387acc694d90951f97a90bdb385e4a018265f6d71add7ed41f6e830ac944c1dea847e77342061117b494fe6c5adc9d400e06b3bdb18566c0f850459c5b5edaf2c7ab2199abcced81966558c1a3114bb9a61e06cd990c1b185e0fc461793e8b91301fecfb0057b67e0e6fc20ee2f6c482231cb1c0afb816f50d5b0b65e1beb20f489e056a", 0x1000}], 0x5, 0xfffffffe, 0x200, 0x8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xffffffc3, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x53, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 262.289431] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:22 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r2, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="000000007fcd2b8b1cba1baf06bf2f01837e123d1f0ac0b40584da25fd45b5d829058421c2e1c0c4826196cdaf31", @ANYRESOCT=r0, @ANYRES16=r1, @ANYRESHEX=r2], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:22 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0) 04:12:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x67, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x1e00}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 262.415746] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:22 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f453c46ea385724d750c4592cf597edd94e5566b225bfd903e1647f78064f3d0e007979d5b396de894f519cc341ae889605e56003564275670b85f9dbd0f792403c5be583c6369ef10000000008"], 0xd8) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='freezer.self_freezing\x00', 0x0, 0x0) execveat(r1, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x1000) 04:12:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xfffffff0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4d, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x2000}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 262.560917] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0xb4, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:22 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='G\xae\x12\xb6lg\xac@3\xf4X\x90+f\x9c\x94\x19\n\xa7k\xaa\xd1\xb1\xc5\xac\xc3\b$3\x00\xcf2\x81\x0eT\x8ec\x99A/b\xfa\x1b\x02Bvm\x96\xd4\x0e\xb7\xdcH&b\xe0I\xef\xbb\x1a\xbe\x03\x8b=\xf8\x8ey\xb3e6a\a\xec\xab`\x00\xc7l\xa1\x00^\xcb\xd5p?s\x9a\xdcj\x11\xb4RJ*D\xf85\xc4\xfe\x1b\xc3cSh&\x12\xab\xb4\xb0+\xda\x05N\xef\x8a\x8b%\x8e\xa8J$M\x03\x9d(\xc0\xa4;*\xa8)\xfa\xf1F\xc7\xa8\xe9b\xb3\xa7\xec(n9 \x8cr\f\xf8\xe6\xac\xba\xbaj\x97-\xc6n\xd1G\xa8\x18!\x0f\xefv\x96^\xac\xaa\x0f\t(a\x14#\xbaV\xa1\xec\xe4\x8e\xf7q\x93\xed5\xa9', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:22 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0xff0f000000000000, 0x0, 0x0) 04:12:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x49, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 262.682912] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:22 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x82, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x1512c1, 0x0) sendmsg$AUDIT_USER_AVC(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0xb8, 0x453, 0x400, 0x70bd26, 0x25dfdbff, "e959d8090dbdfddf730eda28a97cee2f185e3ae7ea8fa7f8143e7f729538e585fee97f0b8821a78439f0d2b6f44bc3e1d23377330aefc75acb91ae4c4da1351f5f969a9e9e05295a35a1af4bff9189ae521f4dae66cfa5b4237e5a8307f8887229364ea76e42fd3b03908408e455532e11fde0090717faeee4946719804ba19203fb2f0be62e4f234f90bd1a45213500bd3a4b2b5aee27ffe83453a17055aadfb423d39ac788", ["", ""]}, 0xb8}, 0x1, 0x0, 0x0, 0x404c050}, 0xc40) ioctl$RTC_AIE_OFF(r1, 0x7002) 04:12:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x3300}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0xc0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:22 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) ioctl$CHAR_RAW_ROGET(0xffffffffffffffff, 0x125e, &(0x7f00000003c0)) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x408001) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000240)={0x5, @win={{0x9, 0x6, 0x20, 0x3}, 0x3, 0x7, &(0x7f0000000100)={{0x9, 0x8, 0x51f8121e, 0x2}, &(0x7f00000000c0)={{0x1, 0x8b0d, 0x80000000, 0x1}, &(0x7f0000000080)={{0x1, 0x80006, 0x4, 0x2}}}}, 0x7ff, &(0x7f00000001c0)="de5139a4c7332dd6e491e40fe434d22920bb496fa0c81074d0f7a3c1a364e364470a4e004cbfcd0058ca6ce972b321b7ac5be6eb7c3faddbb54bc28f4583045a620cd09599d0a7d45dc2da91e11decad0a805481f3ef6e1f993427e2aaa825d64dca2ce05904d9ffbfc1fda9", 0x2}}) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB='_ELF'], 0xd8) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r2, 0x0, 0x0) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000340)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x2, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 262.836931] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:22 executing program 3 (fault-call:0 fault-nth:0): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xfffffffe, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x3f00}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:22 executing program 5: clone(0x218c009f7c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) getpgrp(r1) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:22 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0xffffffff00000000, 0x0, 0x0) [ 262.958473] FAULT_INJECTION: forcing a failure. [ 262.958473] name failslab, interval 1, probability 0, space 0, times 0 [ 262.991287] sysv_free_inode: inode 0,1,2 or nonexistent inode [ 263.053335] CPU: 0 PID: 15428 Comm: syz-executor.3 Not tainted 4.19.150-syzkaller #0 [ 263.061269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.070650] Call Trace: [ 263.073249] dump_stack+0x22c/0x33e [ 263.076909] should_fail.cold+0xa/0x2f [ 263.080811] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 263.085923] ? lock_acquire+0x170/0x3f0 [ 263.089921] __should_failslab+0x153/0x1b6 [ 263.094172] should_failslab+0x5/0xf [ 263.097924] kmem_cache_alloc_node_trace+0x244/0x4d0 [ 263.103038] ? cred_has_capability+0x1d9/0x2e0 [ 263.107637] __get_vm_area_node+0x128/0x3b0 [ 263.112001] ? bpf_prog_alloc+0x5f/0x290 [ 263.116070] __vmalloc+0x13e/0x220 [ 263.119619] ? bpf_prog_alloc+0x5f/0x290 [ 263.123694] ? vmalloc_32_user+0x160/0x160 [ 263.127978] ? security_capable+0x8f/0xc0 [ 263.132152] bpf_prog_alloc+0x5f/0x290 [ 263.136080] bpf_prog_load+0x4ac/0x1390 [ 263.140068] ? avc_has_perm_noaudit+0x341/0x3e0 [ 263.144748] ? bpf_prog_inc_not_zero+0x1f0/0x1f0 [ 263.149515] ? __might_fault+0x11f/0x1d0 [ 263.153607] ? lock_downgrade+0x750/0x750 [ 263.157760] ? lock_acquire+0x170/0x3f0 [ 263.161744] ? __might_fault+0xef/0x1d0 [ 263.165734] ? selinux_bpf+0x114/0x150 [ 263.170592] __se_sys_bpf+0xf99/0x3b60 [ 263.174488] ? check_preemption_disabled+0x41/0x2b0 [ 263.179512] ? bpf_prog_load+0x1390/0x1390 [ 263.183775] ? vfs_write+0x393/0x540 [ 263.187502] ? fput+0x2b/0x190 [ 263.190711] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 263.196087] ? trace_hardirqs_off_caller+0x6e/0x210 [ 263.201145] ? do_syscall_64+0x21/0x670 [ 263.205134] do_syscall_64+0xf9/0x670 [ 263.208946] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.214165] RIP: 0033:0x45de59 [ 263.217392] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.236323] RSP: 002b:00007fe6f2529c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 263.244051] RAX: ffffffffffffffda RBX: 0000000000001cc0 RCX: 000000000045de59 04:12:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0xffffffff, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x2, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0xce, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x4000}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 263.251321] RDX: 0000000000000015 RSI: 0000000020000440 RDI: 0000000000000005 [ 263.258593] RBP: 00007fe6f2529ca0 R08: 0000000000000000 R09: 0000000000000000 [ 263.265892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 263.273190] R13: 00007fffe5f749df R14: 00007fe6f252a9c0 R15: 000000000118bf2c 04:12:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x3, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 263.379397] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:23 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0xfffffffffffff000, 0x0, 0x0) [ 263.474657] sysv_free_inode: inode 0,1,2 or nonexistent inode [ 263.502219] syz-executor.3: vmalloc: allocation failure: 4096 bytes, mode:0x6280c0(GFP_USER|__GFP_ZERO), nodemask=(null) [ 263.552747] syz-executor.3 cpuset=/ mems_allowed=0-1 [ 263.568490] CPU: 1 PID: 15428 Comm: syz-executor.3 Not tainted 4.19.150-syzkaller #0 [ 263.576387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.585741] Call Trace: [ 263.588336] dump_stack+0x22c/0x33e [ 263.591979] warn_alloc.cold+0x7b/0x18f [ 263.595987] ? check_preemption_disabled+0x41/0x2b0 [ 263.601015] ? zone_watermark_ok_safe+0x300/0x300 [ 263.605865] ? __get_vm_area_node+0x128/0x3b0 [ 263.610395] ? kmem_cache_alloc_node_trace+0x3a7/0x4d0 [ 263.615686] ? cred_has_capability+0x1d9/0x2e0 [ 263.620305] ? __get_vm_area_node+0x2e2/0x3b0 [ 263.624812] ? bpf_prog_alloc+0x5f/0x290 [ 263.628902] __vmalloc+0x1b4/0x220 [ 263.632454] ? vmalloc_32_user+0x160/0x160 [ 263.636703] ? security_capable+0x8f/0xc0 [ 263.640864] bpf_prog_alloc+0x5f/0x290 [ 263.644759] bpf_prog_load+0x4ac/0x1390 [ 263.648762] ? avc_has_perm_noaudit+0x341/0x3e0 [ 263.653440] ? bpf_prog_inc_not_zero+0x1f0/0x1f0 [ 263.658206] ? __might_fault+0x11f/0x1d0 [ 263.662280] ? lock_downgrade+0x750/0x750 [ 263.667044] ? lock_acquire+0x170/0x3f0 [ 263.671021] ? __might_fault+0xef/0x1d0 [ 263.675010] ? selinux_bpf+0x114/0x150 [ 263.678909] __se_sys_bpf+0xf99/0x3b60 [ 263.682819] ? check_preemption_disabled+0x41/0x2b0 [ 263.687874] ? bpf_prog_load+0x1390/0x1390 [ 263.692116] ? vfs_write+0x393/0x540 [ 263.695861] ? fput+0x2b/0x190 [ 263.699068] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 263.704439] ? trace_hardirqs_off_caller+0x6e/0x210 [ 263.709485] ? do_syscall_64+0x21/0x670 [ 263.713472] do_syscall_64+0xf9/0x670 [ 263.717285] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.722482] RIP: 0033:0x45de59 [ 263.725679] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.744584] RSP: 002b:00007fe6f2529c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 263.752298] RAX: ffffffffffffffda RBX: 0000000000001cc0 RCX: 000000000045de59 [ 263.759571] RDX: 0000000000000015 RSI: 0000000020000440 RDI: 0000000000000005 [ 263.766861] RBP: 00007fe6f2529ca0 R08: 0000000000000000 R09: 0000000000000000 [ 263.774127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 263.781406] R13: 00007fffe5f749df R14: 00007fe6f252a9c0 R15: 000000000118bf2c [ 263.808460] Mem-Info: [ 263.810907] active_anon:240542 inactive_anon:4118 isolated_anon:0 [ 263.810907] active_file:7439 inactive_file:76987 isolated_file:0 [ 263.810907] unevictable:0 dirty:169 writeback:0 unstable:0 [ 263.810907] slab_reclaimable:19143 slab_unreclaimable:127276 [ 263.810907] mapped:61218 shmem:4346 pagetables:6716 bounce:0 [ 263.810907] free:1033736 free_pcp:686 free_cma:0 [ 263.856993] Node 0 active_anon:962168kB inactive_anon:16472kB active_file:29616kB inactive_file:307948kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:244872kB dirty:672kB writeback:0kB shmem:17384kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 647168kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 263.887549] VFS: Found a V7 FS (block size = 512) on device loop1 [ 263.927279] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 263.966842] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 263.993232] sysv_free_inode: inode 0,1,2 or nonexistent inode [ 264.023335] lowmem_reserve[]: 0 2501 2503 2503 2503 [ 264.030667] Node 0 DMA32 free:340280kB min:35784kB low:44728kB high:53672kB active_anon:960040kB inactive_anon:16472kB active_file:29616kB inactive_file:307948kB unevictable:0kB writepending:672kB present:3129332kB managed:2567336kB mlocked:0kB kernel_stack:14208kB pagetables:26716kB bounce:0kB free_pcp:2740kB local_pcp:1444kB free_cma:0kB [ 264.062042] lowmem_reserve[]: 0 0 2 2 2 [ 264.067789] Node 0 Normal free:16kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2420kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 264.103779] lowmem_reserve[]: 0 0 0 0 0 [ 264.107787] Node 1 Normal free:3781432kB min:54068kB low:67584kB high:81100kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870168kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 264.138599] lowmem_reserve[]: 0 0 0 0 0 [ 264.142629] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 264.157533] Node 0 DMA32: 142*4kB (UME) 204*8kB (UME) 84*16kB (UME) 46*32kB (UE) 40*64kB (UME) 26*128kB (U) 16*256kB (UM) 5*512kB (UE) 3*1024kB (UM) 3*2048kB (ME) 77*4096kB (M) = 342168kB [ 264.180667] Node 0 Normal: 0*4kB 2*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 16kB [ 264.192589] Node 1 Normal: 74*4kB (UME) 392*8kB (U) 279*16kB (UME) 59*32kB (UE) 20*64kB (UME) 10*128kB (UM) 7*256kB (UM) 6*512kB (UME) 2*1024kB (M) 1*2048kB (U) 918*4096kB (M) = 3781432kB [ 264.215869] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 264.226239] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 264.235512] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 264.246519] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 264.258556] 52594 total pagecache pages [ 264.262548] 0 pages in swap cache [ 264.269887] Swap cache stats: add 0, delete 0, find 0/0 04:12:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x8c00}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:24 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x3, &(0x7f0000000380)=[{&(0x7f00000001c0)="a1d5154cda229c2339e786fe7109221d981cfefe444834c96ac79e8211a39e9475c2449a485d03453d22effb0fdf518c8403b6eb421e21dc37af78a4fb020d9c553f064725429ae38b008bfcc29fc7db8af2fde8acbc3a9713544625fce7854d97287414aa8a816a2b8e91b41f15287e5e30a17fb862d647388d6f22c932caccc6e95a9f3dfd4cddc8d74424990f648377d595aee921", 0x96, 0x8001}, {&(0x7f00000000c0)="76dc5085652e74f7e135592e7204d56fb9fc05fa8ea8c068aed0dbaf", 0x1c, 0x1f}, {&(0x7f0000000280)="6542f9f862568ca4bd4857637596e7537f7ff377163b59af51f1e8cc05ad8badb46940cc8aed2206d6371874a08dc349bd7e178d082850506192e6bf59bcfcdf801ca065edcef2bfdb860a9711b1a8563b63047d8b822027865188301c67a303d08713c75d6c5f9cd0a192897b24a6edd0681b85e28ee649dbbfa65dd98ec9dae2c009566486dce0c0d3b092acf24d066af259c82ce8c4465d7a86b7ace75a2733662e571b936284c2e704a438811234f9ee8b1ab7dacdaaa6cf7e1b1e85a210b89d1a14e2ebdb6743500979ed71c4c09ee3de9b10241b", 0xd7, 0x9b8}], 0x0, &(0x7f0000000100)={[], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x00\x04\x00'}}, {@subj_role={'subj_role'}}]}) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x3a) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x800) 04:12:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0xe0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:24 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, 0x0) [ 264.278693] Free swap = 0kB [ 264.281726] Total swap = 0kB [ 264.288751] 1965979 pages RAM [ 264.291895] 0 pages HighMem/MovableOnly [ 264.299850] 352021 pages reserved [ 264.303332] 0 pages cma reserved 04:12:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x6, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 264.433321] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfstransmute. [ 264.449768] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0xfe, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:24 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) socket$nl_xfrm(0x10, 0x3, 0x6) 04:12:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0xff00}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:24 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x9, 0x0) 04:12:24 executing program 3: bpf$PROG_LOAD(0x2, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 264.577855] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:24 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000800)=ANY=[@ANYBLOB="9feb01001800000000000000bd180000bd0000000b000000020000000000000c03000000090000000000000c03000000040000000000000a010000000100000000000008030000000d00000000000008010000000e00000001000006040000000f000000ff0300000c0000000117ab0466bd69cf00000f01000000010000000300000002000000c90000000000000003000000000300000003000000060000001000000003000004000000801000000001000000fffffeff0a00000000000000ff000000080000000100000000000000030000000000000a0100000000000000003061005f2e00002e00"], &(0x7f00000002c0)=""/192, 0xe3, 0xc0}, 0x20) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f000000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f0000000040)={0x0, 0x21}) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r3 = geteuid() r4 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8983, &(0x7f0000000380)={0x6, 'lo\x00', {0x3}, 0xd6b}) syz_mount_image$efs(&(0x7f00000000c0)='efs\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0xaaaaaaaaaaaaada, &(0x7f0000000700)=[{&(0x7f00000003c0)="f2896dc277baa2adab07aa82095c9253545c7f5ee3ccc6b9d69666f4ca312e713ebf49795f0e346128ea6de1e77b0310177a8b2e85a115cfda6c86d9afb58678aeb626832f8c057e56e616baebf69f0d6bebc3ac81175823f0b19c30553591e8ae53a53830ded7a03a50aa1ae3995106fa23dc5d01f4525fe37e5781b5a515e8accac8ebc469aa2983b386c28fcc231d919f36341e361ca94691b9316c9b9e219c32665c63a00206201b7a17102f2ba83f428e4e29497e4135659db30670dfb4b6a543b892df3bfe1c3f7c71e2114458811d7e9965640f58cd96265679ab7765c522ae0cd512bed41555e46fba147fc7b6ad39f1111cb449", 0xf8, 0x3}, {&(0x7f0000000900)="ac9f7a41cdc64502f02d350357a4d342c106130111f67ab6c57366102bd2f47821c02376b9f76f59525a48cfe046b7c5a790074d91858d0800f42a0e13550b5c9a7b41d7df406844145f2b948db21cfa5b7c30615737ba3236f1c07ad2c07b013e0eb241864beb9d8df7febc74a3ca94d015874cc59e9f47e700000000000000082f242af2f0b0a6399533feef9f8a4ffb871b32f784e323c09dac14013df7493e78239b6afe5bddf387d08a15348c6f0f06cb0ce1ae27fb92dd8a6b6876c923e392437b55b8c4e69f1e306396e094f57616731391dd58de2c9eda2a0f14eeec24d53383af87b5cc0cc8a52c1482c4c811abf15a6480a5fa94a79819468ad5ce6d84330e5bd2d8428429d5f64319baea942ccead0ba7a9b118497e", 0xdf, 0xe}, {&(0x7f00000005c0)="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", 0xff, 0x800}, {&(0x7f00000006c0)="018ad65e4035f7eb458cfb", 0xb, 0x5}], 0x1104000, &(0x7f00000001c0)={[{'('}, {'\x00\x04\x00'}, {',]'}, {'\x00\x04\x00'}, {'{&*^(,\x1b'}, {'\x00\xdao{\xe9pj\xed\x04'}, {'@)^+'}], [{@hash='hash'}, {@context={'context', 0x3d, 'staff_u'}}, {@uid_eq={'uid', 0x3d, r2}}, {@uid_eq={'uid', 0x3d, r3}}]}) 04:12:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x8, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x300, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x100000}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:24 executing program 3: bpf$PROG_LOAD(0x3, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 264.754032] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:24 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x60, 0x0) 04:12:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x200000}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 264.833779] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x390, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xa, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:24 executing program 3: bpf$PROG_LOAD(0x4, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:24 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454cec"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) getsockopt$PNPIPE_INITSTATE(r1, 0x113, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:12:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x1000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 265.036865] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:24 executing program 3: bpf$PROG_LOAD(0x6, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:24 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="b10000ac"], 0xd8) sync() execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xc, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x500, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:24 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf0, 0x0) 04:12:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x2000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 265.199204] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:25 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r2, 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/keycreate\x00') write$binfmt_elf32(r3, &(0x7f0000000180)=ANY=[@ANYRES16=r1], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x600, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:25 executing program 3: bpf$PROG_LOAD(0x7, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x4000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xe, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 265.399844] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:25 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x273, 0x0) 04:12:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x5000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:25 executing program 3: bpf$PROG_LOAD(0x8, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x700, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 265.493989] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:25 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="200026bd7000fcdb122d174fd4b820df253700000008000300", @ANYRES32=0x0, @ANYBLOB="0c0099004355f43d21000000080057000500000008005700050000000800570009000000080026006c0900000800a1001b0000000800260085090000080057007949f13831727d506c0900000800a000060000000800a0000800000008005700070000000800570000000000"], 0x88}, 0x1, 0x0, 0x0, 0x8040000}, 0x44000) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000000c0)=0xdafd, 0x4) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) r0 = memfd_create(&(0x7f0000000040)='+\"~g;\xa1\xcb\x82\xaa\xc2\xc7\xed\x0fWn3\x8d\xd0\xf5\xee\x94\"\xeaOm\x1b\xb8\x8a\x8d\xdeH)\xf9&\xa6\r\x1f\xach\xb8W\xf8\x10\x9a\xe3\xfd|\x0fS\xd5\xe2\xa1\x0fk\x0f$\\\x941\a\xca\xcb\xb6\xd6u\x85\xff\x02M:\xb0mC\xda\xd1\xbf8X\xcb\xdcB1\x16\xcf\x97\xf3B', 0x0) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYRES64], 0xd8) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1400) 04:12:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xf, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x6000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:25 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000280)='\x00\x04\x00\x00', 0x4) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f455a46e8eb6c287eb95f82832963b606ff5eef26611c362969d07e38606fd593fe77e96e58c3229c823e498ce19e859b604bb3196e7941c2b829fb6982cd71eaa995d960298beb88d6df9141cd2422d1f813959d9f21a3cb2853f61ce78f9b5660c3f24bebe8e4b1119c74c54087ea06e3099bd9e6c16d3b748234dc21983da5e366b7a35753c1c97be74ec1b68e29f7fabbd1090a1efb8f5150d78e014832844f520a9a1c07c5f75b7db005d8f4745abeee2de701615103161066399a5d"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000140)="12a24fa584d5ab7d36378adbd17a516c", 0x10) readlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=""/233, 0xe9) 04:12:25 executing program 3: bpf$PROG_LOAD(0x9, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 265.706756] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x10, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x7000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x900, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:25 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x900, 0x0) 04:12:25 executing program 3: bpf$PROG_LOAD(0xa, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 265.852387] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x8000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x60, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0xa00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:25 executing program 3: bpf$PROG_LOAD(0xb, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 265.983365] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:25 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00, 0x0) 04:12:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xf0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0xa000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 266.096225] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:25 executing program 3: bpf$PROG_LOAD(0xc, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0xf000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0xb00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x154, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 266.222190] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:26 executing program 3: bpf$PROG_LOAD(0xd, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x10000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:26 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6000, 0x0) 04:12:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0xc00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x300, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 266.397751] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:26 executing program 3: bpf$PROG_LOAD(0xe, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x1e000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 266.528044] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0xd00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:26 executing program 3: bpf$PROG_LOAD(0xf, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x600, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x33000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:26 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7302, 0x0) [ 266.678524] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:26 executing program 3: bpf$PROG_LOAD(0x10, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0xe00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x3f000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xa00, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:26 executing program 3: bpf$PROG_LOAD(0x11, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 266.822521] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:26 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0xa3ee, 0x0) 04:12:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x40000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0xf00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 266.943591] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:26 executing program 3: bpf$PROG_LOAD(0x12, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xc00, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0x8c000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:26 executing program 3: bpf$PROG_LOAD(0x13, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 267.095369] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:26 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0xeea3, 0x0) 04:12:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88, 0xff000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xe00, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x1100, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:26 executing program 3: bpf$PROG_LOAD(0x14, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 267.202073] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xf00, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:27 executing program 3: bpf$PROG_LOAD(0x25, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 267.327247] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x1200, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:27 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf000, 0x0) 04:12:27 executing program 3: bpf$PROG_LOAD(0xc0, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 267.463609] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x4000, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x2, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:27 executing program 3: bpf$PROG_LOAD(0x20001, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x1300, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 267.635886] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x5401, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x4, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:27 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0xff0f, 0x0) 04:12:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 267.737933] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x5865, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x5, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x1400, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 267.902514] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x6, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:27 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) 04:12:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x6000, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 267.999323] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x1500, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x7, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 268.089698] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x6558, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:27 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x600000, 0x0) [ 268.184303] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x8, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x1600, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x8100, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0xa, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 268.320146] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xf, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:28 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6b6b6b, 0x0) [ 268.430418] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x164c, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xf000, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0xf, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x12, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 268.551370] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x1700, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:28 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf0ffff, 0x0) 04:12:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xf0ffff, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x15, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x2, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 268.667734] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x2, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x1800, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 268.776802] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x3, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x1000000, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:28 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000, 0x0) [ 268.866379] Bluetooth: hci4: command 0x0406 tx timeout [ 268.872223] Bluetooth: hci0: command 0x0406 tx timeout [ 268.907437] Bluetooth: hci1: command 0x0406 tx timeout 04:12:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 268.928421] sysv_free_inode: inode 0,1,2 or nonexistent inode [ 268.929606] Bluetooth: hci2: command 0x0406 tx timeout 04:12:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x1900, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 268.971859] Bluetooth: hci3: command 0x0406 tx timeout 04:12:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x4, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x2000000, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 269.092630] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x1a00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x5, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:28 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000, 0x0) 04:12:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x3000000, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x6, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 269.224949] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x1b00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0xa, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x7, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 269.401397] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:29 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2730000, 0x0) 04:12:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x4000000, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0xa, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0xb, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x1c00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 269.493108] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x20001, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0xb, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 269.660428] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x1d00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x6000000, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:29 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x9000000, 0x0) 04:12:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0xe, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 269.768754] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x8000000, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x1e00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 269.900854] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:29 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f000000, 0x0) 04:12:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xa000000, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 270.008100] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x2, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x2, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x1f00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xc000000, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 270.200457] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x4, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x4, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:30 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6b6b6b00, 0x0) 04:12:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x5, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 270.326271] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2000, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xe000000, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x6, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x6, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 270.494153] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:30 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0xebffffff, 0x0) 04:12:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2100, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x7, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xf000000, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x7, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 270.608596] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x8, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2200, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 270.770981] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x10000000, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:30 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0xeea30000, 0x0) 04:12:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 270.907485] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0xa, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x40000000, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2300, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0xf, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0xe, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 271.057022] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:30 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff, 0x0) 04:12:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x54010000, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 271.155834] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2400, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x10, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0xf, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 271.315067] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x60000000, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2500, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x1e, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:31 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0xff0f0000, 0x0) [ 271.437383] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x33, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2600, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x65580000, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 271.548937] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:31 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffff000, 0x0) 04:12:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x8c, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x2, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 271.617754] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2700, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x500, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x81000000, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 271.764313] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:31 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffeb, 0x0) 04:12:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x4, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 271.837646] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2800, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x600, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x88a8ffff, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x5, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 272.031502] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:31 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffff6, 0x0) 04:12:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x700, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x9effffff, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2900, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x6, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 272.153120] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x7, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0xa00, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2a00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xc3ffffff, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 272.373410] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x8, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0xf00, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:32 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000000000, 0x0) [ 272.494457] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0xa, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2b00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xf0ffffff, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x1e00, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 272.633876] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0xe, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:32 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x60000000000000, 0x0) [ 272.731774] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2c00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x2000, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0xf, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xfcffffff, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2c98, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 272.907889] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x3300, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:32 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6b6b6b00000000, 0x0) 04:12:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xfeffffff, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 273.025310] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x3f00, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x2, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2d00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xffffa888, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x4000, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 273.201635] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:32 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf0ffffffffffff, 0x0) 04:12:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x4, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2e00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 273.299832] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xfffff000, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x8c00, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x5, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 273.442810] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0xff00, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x2f00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:33 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x100000000000000, 0x0) 04:12:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xffffff7f, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x6, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 273.583734] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x7, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x3000, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 273.718577] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xffffff9e, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:33 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x200000000000000, 0x0) 04:12:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x8, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 273.821815] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xffffffc3, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x3100, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0xa, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 273.971414] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:33 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x273000000000000, 0x0) 04:12:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0xe, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xfffffff0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 274.092609] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x3200, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0xf, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 274.259457] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x10, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xfffffffc, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x3300, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:34 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x900000000000000, 0x0) 04:12:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x1e, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 274.394484] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xfffffffe, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0xa}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x30, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 274.533357] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x3400, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:34 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00000000000000, 0x0) 04:12:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0xb}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0xffffffff, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 274.620224] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x13}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x32, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x3500, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 274.791562] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:34 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0xebffffff00000000, 0x0) 04:12:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x20001}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x500, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 274.896184] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x3600, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x600, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 275.061506] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x700, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:34 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0xeea3000000000000, 0x0) 04:12:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x3700, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x2, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x3, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 275.172865] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0xa00, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x4, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x3800, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 275.349935] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x4, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0xe00, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:35 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0) 04:12:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x5, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 275.455031] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x3900, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0xf00, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x6, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x6, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 275.627101] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:35 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0xff0f000000000000, 0x0) 04:12:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x3a00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x1e00, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x7, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 275.757493] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x8, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x3b00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x2000, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x8, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 275.914670] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:35 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffff00000000, 0x0) 04:12:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0xa, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0xa, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 276.017525] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x3000, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x3c00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 276.150141] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0xc, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0xf, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:35 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffffffff000, 0x0) 04:12:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x3200, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 276.273602] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x3d00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x3f00, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x10, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0xe, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 276.379676] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:36 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x44000, 0x0) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, &(0x7f0000000180)) 04:12:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x4000, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 276.479704] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x1e, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x3e00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0xff00, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0xf, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:36 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000180)={0x0, "98ea6197cde7380986d78110d14da51f"}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000001180)={0x1, 0x7, {0x1, @usage=0xcc6, 0x0, 0x58a, 0x36, 0x10001, 0x6, 0x7ff, 0x400, @usage=0x8000, 0x4, 0x6, [0x2, 0x7fff, 0x762, 0x4, 0x6, 0x42]}, {0x1, @usage=0xfffffffffffffffc, r1, 0x38000000, 0x8, 0x1, 0x4, 0xffffffffffffffd8, 0x83, @struct={0x1, 0x101}, 0x5, 0x6, [0x7, 0xfffffffffffffd78, 0x15c, 0x1ff, 0x3, 0x5]}, {0x10000, @usage=0x5, 0x0, 0xe600000, 0x6, 0x5, 0x5, 0x7fffffff, 0x482, @struct={0x20, 0x2}, 0x2, 0x7, [0x1, 0x81, 0x1, 0x2, 0x80000001, 0x2694]}, {0x4, 0x8, 0x1}}) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = accept4(r2, &(0x7f0000000080)=@l2tp={0x2, 0x0, @dev}, &(0x7f0000000100)=0x80, 0x80800) sendmsg$TIPC_NL_KEY_FLUSH(r3, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000000180)=ANY=[], 0xfffffffffffffd81) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000040)={'geneve0\x00'}) 04:12:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x33, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 276.669987] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x3f00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:36 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=""/106) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x10, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:36 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x200, &(0x7f0000000180)) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0xa, 0x2, 0x73) syz_open_dev$radio(&(0x7f00000003c0)='/dev/radio#\x00', 0x0, 0x2) getsockopt$PNPIPE_HANDLE(r2, 0x113, 0x3, &(0x7f0000000280), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000380)={0x7, 0x8, 0xfa00, {r4, 0x5942}}, 0x10) shutdown(r3, 0x0) recvmmsg(r3, &(0x7f0000006fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10061, 0x0) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 04:12:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x8c, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 276.842251] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x2, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4000, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:36 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB='F\x00\x00\x00'], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 276.984289] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x60, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:36 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x400) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 04:12:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x4, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x2, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4100, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 277.133793] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:36 executing program 5: r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000001c0)}}, 0x10) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) fcntl$setown(r0, 0x8, 0xffffffffffffffff) 04:12:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x4, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 277.300102] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4200, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x5, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:37 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f8beb5e6505000000454c4678bfea33eff2f7128ba0eb5f076427724472463bdf78efeb1120"], 0xd8) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:37 executing program 1: pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x2000) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x20) r1 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}, {&(0x7f0000000180)="91f2d7e0f5b728b33e40e96d680526ef234a38065716eac0ebf247e7110b9b3d45799800cfe7119f67725038915ee56a575318e3810f2c3af8c17ccee87a7c9c2301e7b4d4aba715a5fa5d1de6643dd42189d4d2f06b8bbcea91955fa640e4d80f1cb9a5092dda6d1b977690192a1c7aab84e6b54a2003fc5441890c6b843651daa23e52e4133ac8590b5b307ef91e1e52f3ae35eb0aa5419f4c09c021bf45bc944105b3e8297543", 0xa8, 0x2}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r1, &(0x7f0000000080)='./file0\x00', 0x6000, 0x0, 0x0) 04:12:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x2, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 277.448659] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4300, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x5, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x6, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:37 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000300)='\x00\x04\x00\x00\xe4\x9b\xb6\x1f\xec(H\x90\xadn\v\xa7[\x1b\x93\ni\x90\xf1\xfa~\"C\x8fJ\x81\x8c\x01S\xd0\x8d^\xa7\x96\x8b\x91\xa9\xc5@\xba\xda\x97\x18\xc8;2\x02\xa9$4\x9e?\x1e\x00h\xfe\xf4\xbf\xa9\x8dT]l\xf6\x87A.\x8fN\xd4 y\xa5\x81\xd2\x83\xa0\xd7I*\xdc\x160xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x3, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x6, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:37 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f00000000c0)={0x3, 0x10, [0x5, 0x7, 0x0, 0xa3]}) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 04:12:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4400, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x7, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 277.730527] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x4, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x8, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:37 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000040)) [ 277.886302] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x8, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:37 executing program 1: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvme-fabrics\x00', 0x2, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000180)='\xc8^%\x00') r1 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d1094f613c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) r2 = fcntl$dupfd(r1, 0x406, r0) ioctl$IOCTL_VMCI_QUEUEPAIR_SETPF(r2, 0x7a9, &(0x7f00000001c0)={{@hyper, 0x3}, 0x1, 0x400, 0x5, 0xf1, 0x9, 0x2, 0x5}) statx(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 04:12:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4500, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x6, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 277.998403] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0xa, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:37 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x200100, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0xa, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:37 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="dd454c4621a48f476c55c67da74d2aeb1b2494e89b07059f24467965c2647e995bb0897b41da594f7de22b28a3d57404b7308bad80830a681e0ab678bd4df8518906ba0566f7cbf0d950263f02bb8875ddef45eea28d3915136659acff0127e8723161c869c4bcc98b70ff17959ca323c63a81d99619d31e11739241914dc373619a08746854fc3fdb7b2c0c99040142f533654e41ca77f88d157676280f7efeeb8181478053b4e9db96d0b9ecbc13d669d18000b314564559ea690d8bd7b051"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 278.148873] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4600, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0xf, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x8, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0xe, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:37 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe, &(0x7f00000000c0)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d00bcfe7a624c29bb1a3eb4c80000000000547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r1 = shmget(0x3, 0x3000, 0x1, &(0x7f0000ffc000/0x3000)=nil) r2 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000001c0)={r2}) shmctl$IPC_INFO(r1, 0x3, &(0x7f0000000180)=""/50) [ 278.298671] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:38 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r2, 0x0, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f00000000c0)={0x7fff, 0x1, 0x4, 0x2, 0x1, {0x0, 0xea60}, {0x2, 0xc, 0x8, 0x2, 0x1, 0x81, "26aa652e"}, 0x0, 0x3, @planes=&(0x7f0000000080)={0x236e2489, 0xf3, @userptr=0xff, 0x401}, 0xffffffff}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040)=0x8, 0x4) 04:12:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4700, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x10, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0xf, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0xa, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 278.439549] VFS: could not find a valid V7 on loop1. 04:12:38 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\xdd\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x1e, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 278.518480] VFS: could not find a valid V7 on loop1. 04:12:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4800, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0xc, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x10, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:38 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000000c0)='\x9b\x04~\xb7\xb0\x00\x95\xa7P\xcd\xb6\xbe$l\xe2y\x00\x02\xc9\xd2\x1c\x97\x84f\xe3\x9c3\x9c\v\xe99\xbd\x8d\xd5\x9f\xa3\xa8\x85U\n3\xd9\xbc\xa5\xe4\x0fa\xd5\x82q\xefNN\x80>;F%f\xee\xd5\fB\xb2\xe7,\xf4\x06\xd7\x95\xc6\x86\x03\x9b&VU\xad\xe8\xae\xe3K\xcd\xd6\xc91K\x00x\x06ID\xf9G\xdc\x03t\x19:\xe6A\x83\x87\xda\x0f,\x11%\xe8\t\x15_)\xe5\xfd\x7f\x81p?\x1b\xe6\xfddL\xaa\xa4\xd96\x10\xf3Q\xf5[\xdb\xf8`\x05\x14\xb2!/\x81\xa0\xd1\xe4\xb5\x03\xdaS\xb7n\x0f\xbcV_\xc0\xa4\xd6n,y_\x9e\x96Z\xf7\x84\x95\\t\xb2DJ\x87\x00\x00', 0x1) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:38 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x28) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x7, 0x6200) sendto$unix(r1, &(0x7f00000001c0)="12da522316475026fb79941c705ffeba93b5c2bbe84f9d2ebd9fd1fa71217b0d14b2a4ddbeb53260cd4a232b2301f6d74c69be31f8", 0x35, 0x20008814, &(0x7f0000000200)=@abs={0x1, 0x0, 0x4e20}, 0x6e) 04:12:38 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x20080, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT=r1], 0xffffffa3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x1e, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x33, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4900, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0xe, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) [ 278.813169] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x30, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:38 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r3 = syz_mount_image$minix(&(0x7f0000000180)='minix\x00', &(0x7f00000001c0)='./file1\x00', 0x1, 0x3, &(0x7f0000000400)=[{&(0x7f0000000200)="39c2bdcce9518b0e1b3169c7f5b069b2dff541b9b2402e8a3caf893cb44e2789e62283596caa49ae6555b63b8413e6def9793d2b9059a01f468e3628e831a1a1384dd5607a8fbddb8d5be35162289f95bb4ce6f797d45517ae6f0dfb24f3afa90f334729252a51617b70e86ee3ee4f2a803daeedf876606bb75218da99c7137cfe9de027735a356e379ae4aa9f07ca52742df5dbe061454ed627785a49f5c908e4a0e5b56bbeec12a990e9", 0xab, 0x6}, {&(0x7f00000002c0)="28b69af269bef5b801fb8c95b6616f9e7d8bd279831feda98b2ade7826459ecd960655e1c56f856c089d01e071b77d98fb4d60f1", 0x34, 0xe3}, {&(0x7f0000000300)="9462f79fe67167bc51fa8abb19735332bea0dd51cc77aae92fe8e23f8de1c539f5a73ed664d912448b5bc34f1e5c8f43660c415fb87903a2e853f271974747b4415a9ce7120633ecac1d71f5297fbe74ac3b1765a2257508b846ff7af6dbd68711a4c6e6353b5fd277c7112c2070cc00d434bbeabea0bab6e287245c69ead36b5152985faa27482a743e6365fd472b6178c623a0ac6bb8b2c890689d7e8c184f23bb6e911c88a1fde5bf2ecbb72c68670a4a9ee7241a7523efd7eca02b376142bdcc8f74784c367b87f124402fb1f253b64f7d4c313fd67b9e6d958ac7dbc020546e7d35bdb597d2d6a3c479511de086392e69d6be9a6a", 0xf7, 0x81}], 0x2284800, &(0x7f0000000600)=ANY=[@ANYBLOB="7637002c2e2528262c2c402c2525292c8fd42899d17c840b305b44b1851a4458705fc05cefa055709bd8d0ade742ad970932309f6b3632d16b605133c39bd51ed0df26ffd1ec90ecd54a4f7d8711fddcaad896629c8d62236f4985288638f116addcd7b513a39471186ffcf9fbbdb15ae6874b529d49678d13579ff9530f333431bb06c491beecc75e5abf7601166c746d329369a043afa74b5d6e42d91af7d1e412a03783b6386689dd7b6e42a9dedfc568cd1640ba3362ae1b406b49c128c7a409512f52403bac94b8bd252b0000002c7637002c646f6e745f61707072616973652c7375626a5f757365723d7637002c666f776e65723e", @ANYRESDEC=r2, @ANYBLOB=',fsmagic=0x0000000000000000,obj_role=v7\x00,euid=', @ANYRESDEC, @ANYBLOB="2c61942eb332b92a2e63c3"]) r4 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsetxattr(r3, &(0x7f0000000580)=@known='system.posix_acl_default\x00', &(0x7f00000005c0)='appraise', 0x8, 0x2) sendmsg$TIPC_NL_KEY_FLUSH(r4, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r4, 0x4b68, &(0x7f00000000c0)={0xffff, 0x3, 0x2}) r5 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ocfs2_control\x00', 0x2000, 0x0) ioctl$SNAPSHOT_FREE(r5, 0x3305) 04:12:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x8c, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 278.919228] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4a00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0xf, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x32, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x500, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 279.101602] VFS: Found a V7 FS (block size = 512) on device loop1 [ 279.248297] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:39 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c46ad7d67956163f46154e21105eee7320637b777fbf1d1f2e6bdb3339a7a1a754a5810cb7518dbab85f17b132fb453b3956ee9ce6af1c64783e0e9d01640c156e08162715184c75466638654e4f66679176373008c92750af25d7896cfdf1a84e933617a31f933d7c8e905f0337de9cdc31974d895a358538c2c11e887492a4b6ca1b4874fa600"/147], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) fanotify_mark(r1, 0x40, 0x10, 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 04:12:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4b00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:39 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x500, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x10, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:39 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0xa0, 0x3, 0x3, "ae04efb61b8ec0d3eed90e04ba0be803", "bf98482bfb52e2db755e548adf1ab7b9f07f52ad110e60b06c5a3d9569d99b7fcff38804c895a9db8c8d023d0be26757b31a802a72433cb7ee0dc02e212dbc8522539b9d3abdec4c5b7cb23e5435156d88ba006cbb922f2b460d24bf298c746437f59073f5c7701cad23f5a486910c9f69c8298c2d9281013225e878793c52dc9e615fcdf7060c6ef8d60c"}, 0xa0, 0x0) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000580)=""/4096) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000340)={r1, 0x7ff, 0x280000000, 0x1}) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000380)={0xffe0, 0x2, 0x1, 0x3, 0x1, 0x3, 0x2, 0x9}, 0x20) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r3, 0x0, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000280)=""/107, &(0x7f0000000300)=0x6b) 04:12:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x600, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:39 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, &(0x7f0000000040)) [ 279.441765] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x700, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x60, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:39 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x600, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4c00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:39 executing program 1: r0 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000100)="b82953d2f785ce8d3d10941313c3afae88bbf763f72b62abd0a1cedc8f8c3cff20efb579887a1b8b17396dbf5d02bcfe7a544c29bbe6fb8461e9b4935ce2547b4100000273eea3e0", 0x48, 0x401}], 0x0, &(0x7f0000000c00)=ANY=[]) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) socket$nl_rdma(0x10, 0x3, 0x14) 04:12:39 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="5f29471fb3a34e06dc09ec137ac2baf68bc56a0a4466df1e0500000000000000768af44cfa0a219371fe186158ffd1306debf0ecf8fedd50fd8493e9ac61db4f295a0c348db0741e6a06e1eccb0ff7ee013c17f05aa2a11ea9ae500132660209a202e8af1c0c5ddc6b40e4a0a2a0f3a0802e7592f764e6411af04f07b8bbbd945316a259436e5a6596893edfb7bd2edb4a3edc2e1589dcd307c8d62e47a8ab96bae97c0a1fd469b6d49ad48cb106562a3acbd4c63f44"], 0x137) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) [ 279.596052] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0xa00, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:39 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x700, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:39 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$isdn_base(0x22, 0x3, 0x0) r0 = memfd_create(&(0x7f0000000140)='\x00\xb8\x04\x00', 0x1) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x522, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x20}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x81}]}, 0x24}, 0x1, 0x0, 0x0, 0xc0}, 0xc000013) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4d00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) [ 279.778651] VFS: Found a V7 FS (block size = 512) on device loop1 04:12:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x2, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:39 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0xa00, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:39 executing program 1: statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x100, 0x0) 04:12:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0xf00, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 279.911963] sysv_free_inode: inode 0,1,2 or nonexistent inode 04:12:39 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x05\x00\x00', 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r3 = socket$phonet(0x23, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_KEY(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010900000000000000000c00000008000300", @ANYRES32=r4, @ANYBLOB="08001b0000080000000006000010000000000000"], 0x30}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r7 = socket$phonet(0x23, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_KEY(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x30, r6, 0x901, 0x0, 0x0, {{}, {@val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x1}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_DEL_PMK(r5, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8818009}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x7c, r2, 0x4, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x7c}, 0x1, 0x0, 0x0, 0x404c0d1}, 0x4000) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f455c46"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:12:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000040)="e9", 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, 0x0, 0x1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8a) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x4e00, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:12:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x3, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_LEARNING={0x5}]}}}]}, 0x44}}, 0x0) 04:12:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x1e00, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) 04:12:39 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0xe00, 0x61, 0x11, 0x2c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x10, 0x0}, 0x15) [ 280.050033] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 280.095527] ================================================================================