9961722efe4dad49d71d20e6f2e19ec94e6a750e71c139d8dd292e014bdca3ced9bd127aa12547e536c7bd2574289751b78a23b5039f43ca532e90e96c9bd48a16baa8f00979b9d54b5e6645f7e9f6530c49423a9e28ba103eef7ca56adc71be1ef46c5b7026de3a4add8", 0x1000}], 0x3, &(0x7f00000016c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r9, @ANYRES32, @ANYRES32=r12, @ANYBLOB, @ANYRES32=r9, @ANYRES32, @ANYRES32, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r7, @ANYRES32=r15, @ANYRES32, @ANYRES32=r16, @ANYRES32=r7, @ANYRES32=r17, @ANYRES32=r18, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r25, @ANYRES32=r26, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r27, @ANYRES64, @ANYRES32=r28, @ANYRES32=r29, @ANYRES32=r11, @ANYRES32, @ANYBLOB="000000000000000000337d305b0e000000", @ANYRES32=r30, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000", @ANYRES32=r8, @ANYRES32, @ANYRES32=r31, @ANYBLOB='\x00\x00\x00\x00'], 0xe2, 0x2008044}, {&(0x7f0000001d00)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x8000}], 0x4, 0x4c010) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r11, 0x0) write$P9_RWALK(r11, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r11, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r11, 0xffffffffffffffff) setsockopt$inet_udp_int(r11, 0x11, 0x64, &(0x7f0000000000), 0x4) ioctl$LOOP_SET_CAPACITY(r11, 0x4c07) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x10d022, 0x8000000) r32 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r32, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) [ 333.250514][ T9443] IPVS: sync thread started: state = BACKUP, mcast_ifn = team0, syncid = 2, id = 0 13:09:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) syz_open_dev$vcsa(0x0, 0x6, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) io_submit(r1, 0x20000103, &(0x7f0000000040)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) socket$nl_generic(0x10, 0x3, 0x10) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) syz_genetlink_get_family_id$tipc(0x0) 13:09:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r2 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x3a69}, &(0x7f0000000200)=0x8) ioctl$CAPI_REGISTER(r2, 0x400c4301, &(0x7f00000003c0)={0x9, 0x1000, 0x1f}) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x483, &(0x7f0000000140), &(0x7f0000000000)=0x68) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000380)={'erspan0\x00', 0x0}) bind$packet(r4, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) r6 = socket$inet_smc(0x2b, 0x1, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0xdcf, 0x410000) setsockopt$IP_VS_SO_SET_STARTDAEMON(r6, 0x0, 0x48b, &(0x7f00000002c0)={0x2, 'team0\x00', 0x2}, 0x18) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@remote={[], 0x1}, 0xd, 'ip6gre0\x00'}) sendto$inet6(r4, &(0x7f0000000300)="0503004089063e0000c30600c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) accept(0xffffffffffffffff, &(0x7f00000000c0)=@nfc, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup3(r7, r8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$RTC_PLL_GET(r9, 0x80207011, &(0x7f0000000440)) connect$inet6(r1, &(0x7f0000d83fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 13:09:41 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="00000040000000005f0300000600000099010000000000000000000000000000286463d662327da35fe7467311aec0091cdb4c5024d59812fd58961ace6e330935e1cdfee74a986931f5bb80930d398d46ae7644e10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001395ba4801166888568300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022422a0e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000080da7b5d8088ed6e5b0300"/925], 0x39d) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:09:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r2 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x3a69}, &(0x7f0000000200)=0x8) ioctl$CAPI_REGISTER(r2, 0x400c4301, &(0x7f00000003c0)={0x9, 0x1000, 0x1f}) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x483, &(0x7f0000000140), &(0x7f0000000000)=0x68) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000380)={'erspan0\x00', 0x0}) bind$packet(r4, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) r6 = socket$inet_smc(0x2b, 0x1, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0xdcf, 0x410000) setsockopt$IP_VS_SO_SET_STARTDAEMON(r6, 0x0, 0x48b, &(0x7f00000002c0)={0x2, 'team0\x00', 0x2}, 0x18) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@remote={[], 0x1}, 0xd, 'ip6gre0\x00'}) sendto$inet6(r4, &(0x7f0000000300)="0503004089063e0000c30600c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) accept(0xffffffffffffffff, &(0x7f00000000c0)=@nfc, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup3(r7, r8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$RTC_PLL_GET(r9, 0x80207011, &(0x7f0000000440)) connect$inet6(r1, &(0x7f0000d83fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 13:09:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sched_setattr(0x0, &(0x7f0000000300)={0x30, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x4}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x2, &(0x7f0000001700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}]) getsockname$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @dev}, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth1_to_team\x00', &(0x7f0000001800)=ANY=[]}) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) 13:09:42 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:09:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r2 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x3a69}, &(0x7f0000000200)=0x8) ioctl$CAPI_REGISTER(r2, 0x400c4301, &(0x7f00000003c0)={0x9, 0x1000, 0x1f}) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x483, &(0x7f0000000140), &(0x7f0000000000)=0x68) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000380)={'erspan0\x00', 0x0}) bind$packet(r4, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) r6 = socket$inet_smc(0x2b, 0x1, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0xdcf, 0x410000) setsockopt$IP_VS_SO_SET_STARTDAEMON(r6, 0x0, 0x48b, &(0x7f00000002c0)={0x2, 'team0\x00', 0x2}, 0x18) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@remote={[], 0x1}, 0xd, 'ip6gre0\x00'}) sendto$inet6(r4, &(0x7f0000000300)="0503004089063e0000c30600c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) accept(0xffffffffffffffff, &(0x7f00000000c0)=@nfc, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup3(r7, r8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$RTC_PLL_GET(r9, 0x80207011, &(0x7f0000000440)) connect$inet6(r1, &(0x7f0000d83fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 333.871121][ T25] audit: type=1804 audit(1575378582.076:39): pid=9447 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir100743109/syzkaller.YECTHT/48/bus" dev="sda1" ino=16736 res=1 [ 333.895566][ C0] net_ratelimit: 332 callbacks suppressed [ 333.895575][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 333.895602][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 333.976777][ T25] audit: type=1804 audit(1575378582.186:40): pid=9447 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir100743109/syzkaller.YECTHT/48/bus" dev="sda1" ino=16736 res=1 13:09:42 executing program 4: mlockall(0x6) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 334.061818][ T9478] IPVS: sync thread started: state = BACKUP, mcast_ifn = team0, syncid = 2, id = 0 13:09:42 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:09:42 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:09:42 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f00000002c0)=0x6, 0x4) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000240)={0xe26e, 0x8, 0x1}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = socket(0x5, 0x8000a, 0x2) sendmmsg$alg(r3, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000001b00)={{{@in=@multicast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) write$P9_RWALK(r4, &(0x7f0000000300)=ANY=[], 0x6) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r5) r6 = syz_open_dev$audion(&(0x7f00000003c0)='/dev/audio#\x00', 0x100000000, 0x301000) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000003340)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000001a80)=0x1a2) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000300)=0x6) socket$nl_route(0x10, 0x3, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) close(r7) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r9 = getpid() write$cgroup_pid(r8, &(0x7f00000036c0), 0x12) open(0x0, 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000001d80)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) getresgid(&(0x7f0000001800)=0x0, &(0x7f0000001840), &(0x7f0000001880)) getgid() r12 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r12, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r12, 0x4028af11, &(0x7f0000000040)) r13 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r14 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r14, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r14, 0x4028af11, 0x0) r15 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000440)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe0\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r15, 0x4028af11, &(0x7f0000000040)) r16 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r16, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r16, 0x4028af11, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) r17 = getpid() getpgid(r17) r18 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r18, 0x0, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r18, 0x0) r19 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r18, r19) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.usage_percpu\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r20, 0x29, 0x22, &(0x7f0000001980)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000280)=0xfffffffffffffec8) r22 = getegid() r23 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r24 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r24, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r24, 0x4028af11, &(0x7f0000000040)) r25 = syz_open_dev$vcsa(&(0x7f0000001ac0)='/dev/vcsa#\x00', 0x400, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) r26 = getpid() sched_setscheduler(r26, 0x0, &(0x7f0000000380)) setuid(0x0) r27 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r27, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r27, 0x4028af11, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00)=[{&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x20000000}, {&(0x7f0000000300)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4010}, {&(0x7f0000000500)=@file={0x0, './bus\x00'}, 0xfffffffffffffec7, &(0x7f0000001680)=[{&(0x7f0000000580)="662e72720f2a216d54aa17e89c0d449032e652373ac558b7367ab3499e1527e088ccfe6e9e9da1cb7ef6af600fcc160d65b8cb23fcb40c603f34c8deab3dcea55f929ea931bcd0b1261ea7e8dca5c8efc159cd143b744301ee123b95d1efdcfab1", 0x61}, {&(0x7f0000000600)="9821d0f458fec4b2b88880057c6cbf1f75883f3d67c5ca23b788c472d59e9826fcb02b3cc96e881e4bb6c2f7a64506eda4f7d440b87ba40403a85446d4e222aad74f9bfc9ee12ef570fd", 0x4a}, {&(0x7f0000000680)="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", 0xf80}], 0x3, &(0x7f00000021c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB, @ANYPTR64, @ANYRES32, @ANYRES32, @ANYBLOB="000000003400000000000000010000", @ANYRES32=r12, @ANYRES32=r13, @ANYRES32=r7, @ANYRES32=r14, @ANYRES32, @ANYRES32=r15, @ANYRES32=0x0, @ANYRES32=r16, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r21, @ANYRES32=r22, @ANYBLOB="001ef61400000000000000010000000100000000", @ANYRES32=r23, @ANYRES32, @ANYRES32=r24, @ANYRES32=r25, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c8020a03319ef798d008de7d9a051a0ac240000ffb500007122", @ANYRES32=r26, @ANYRES32, @ANYRES32, @ANYBLOB="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"/579, @ANYRES32=r8, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xdc, 0x2008044}, {&(0x7f0000001d00)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x48012}], 0x4, 0x4c010) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000000)=0x8, 0x4) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/sequencer2\x00', 0x10d022, 0x8000000) r28 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r28, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) 13:09:42 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:09:43 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, &(0x7f0000000080)={0x1, 0x0, [{0x2, 0xa3, &(0x7f0000000280)=""/163}]}) r5 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r5, 0x0, 0x1420000a77, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r10, 0x800442d4, 0x0) ioctl$SNDCTL_DSP_GETIPTR(r10, 0x800c5011, &(0x7f0000000340)) r11 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}, @vti_common_policy]}}}]}, 0x38}}, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e22, 0x9, @mcast1, 0x43d3ce53}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001100010400000000d1c7192089b06407", @ANYRES32=r8], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 334.789684][ T25] audit: type=1804 audit(1575378582.996:41): pid=9501 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir599793732/syzkaller.m8HpIK/49/bus" dev="sda1" ino=16756 res=1 [ 334.851388][ T25] audit: type=1804 audit(1575378583.036:42): pid=9499 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir599793732/syzkaller.m8HpIK/49/bus" dev="sda1" ino=16756 res=1 13:09:43 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:09:43 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r3, 0x8943, &(0x7f0000000740)={'eth0\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\r\xbb?\x89\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xc3\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xef\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f00000023c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009b89aab49ad30a704aa4f574f493a554bd08b3abf111160c5ee6746a0e9a03b182760e556f17156f9573e220fca116b02eea61fbb4a67b003702e307c1651bbcb8c09d5de2a33ac580443bdc788b1f00f9a3155816be58d23eb1733453372067f9ab361101b5271e4c24642ba2bf25dd22514b92ed55e28140c751b8d4d2a22b00"], 0x2}}, 0x0) pipe(&(0x7f0000002380)) sendmmsg(r3, &(0x7f0000002280)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000340)="96e8e6f14076f04a215858896879e8f96468dd9e519e9285a6fb117c39d6f3dd65407587f013c01ef3ee94cdf3bac7a9bb489c151c62d9a4703d06a9546af29ed411538e1d6cb1ac76d49c85917dd65afbbf8e8d1607bea9e50f0c466fb2c2c7", 0x60}, {&(0x7f00000003c0)="c6ff039682d1e788539b72cce031cb7d32579b49dbe725cdaa682a756e2cca7c8a0145dd8971832546b50c1d45dd5103d2feeb6abdb601cde58d59ef7fc965e04f1c33f34bff888cb524c8d786f9e52c0ed9546cd9e49d67560789d1c50dbf667d18e73c2be9789633527aa54eefc2434ba17bbb2faa6d1698fc260f4c123e9b43a394d9ff636927cbe5195dd648b475b9fc40622db603cc77d49f79c83d93573e447332c0a8641bfa9da65cf9555bd7c553a67e24e3b5fbd6e4d1e812ae1054765f1bda64a10f4a14330248a3854b93766cbbefb34f0d1a992c0c8d4baf8aa5024849d438eecb4801b7639cf5ffc321620aae908aaa9ce3dd", 0xf9}, {&(0x7f00000004c0)="dfa76115ffe7a4abe2078eeda6f7f3792ea1a793e29d47fa16198a32756af94844e9890a75fb340057186c6a36d3902e5e3576ac5edeb5dd49c3dcd8b98e2c2b942aea5a3e80aa855616fce81903205d4bc977549715ba83750e51bea8d6989f81b7870ad88de23b78ea364e2e805fcae6b63bd96dd111ebb91912be6278c4147624502408b21a03999a99db5ecc10d85f81c56ccc21e851b06239330d5583096916d985f344446f4dfa14614a3fdb1341fa6b499d9b65bf608ba6339de313c1bcea", 0xc2}], 0x3, &(0x7f00000005c0)=[{0xf8, 0x102, 0x0, "f97e7028713e2549d8aaa27532db1b200269b98cf7fa51e1e624363acb8e1adf0a5563dbb62cf5a4e06dcb6db2a6eae0c333dde5b561d9faf9b2e302254c5704f9274785ff679e792952de180b277cead1df6e162e84f65e66ed04ae58252f31a2038d859e26d8d4d971941f15bfa1c62f02708804c9cb8f61531e5f62693665872653b97771453f546a66224357cbc6e76142c33d539aab3c545d97a5591ba379d14d35b96273d6bd229db8e0b659f6cdf7b132c5dbb3af9b5c3d3f58736f960af2c8282223f31dd7b99b687f68b8bc90a2c56115890014345138eeef58d62d0a"}, {0x80, 0x114, 0x100, "d310a0210161e86185d790a9d921da85178862b17e2d41b84e7c8d17235af4ea47582e0cbc0c6b15d2ff493b13c94118f578f64b1e2f46f43bb40f9d2702b29f2e94a748e8bb19faa0286589d2e667504d47d9198eb5ab0808581fdc67ded90a1e4016a7389cfb5f83"}, {0x40, 0x116, 0x10000, "018c9b3fe511b5fb1f478431bd7d528d3388e770ac0dc73cdd21cd223ebb2ec591eb0e785c1a0bf0023d7d"}, {0x10, 0x0, 0x200}, {0xf0, 0x10c, 0x8000, "9b94c256df8f0c105263e8635a58aab596742ed68e08efb3468755026d5d91a49090f85e3915f8e7a09b2a35dd2266a2ce7973eeb68382828915075a1919f92a43838a43a2f696c6f075afc28a591a75418329098a3990ebc99df7565cdacfb9737091aabc9784524a2cfe8601a336f4d3521628b1feb9c1fa1fb7b0d128d98dfe24afab7546d7969cfee10d25a3228b38aa020ab1894df27b41d5a2b33258b5605f89f02f05844a630e03c40fa6886c66760e643856fe22ec17be87d0a9db21a85c2280419405485f2c2f47e323fbde7d260947f0c7ae62643c12"}], 0x2b8}}, {{&(0x7f0000000880)=@ll={0x11, 0x11, r7, 0x1, 0x5, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000900)="76c01784ac7c2bb0f95f23722c982e3e6a2eb7e898a8c4b698bc2c1728b8bcbd4df0f51e5018fad6a3df27bfb1e5329e91393db0147af4e83822305e32483242f12f5f96b4e73cb6bb6fda207eb527d392cf931ff86293863fb6fa8be2", 0x5d}], 0x1, &(0x7f00000009c0)=[{0x80, 0x119, 0x9, "052f3cfc366428f4a6a39ad628d9c1da90a2464d7bbb1b3dc1db33ac65f1e32e8eeb433c4eecd682e7e67e77a65bc2fb0b58866c93772670ba2673bcf293d92d37e5d2c0324bf15f9f27f0c468736d99ed1646caa7f4c0b74f99ffd8f1d1798f46d52216b6d981d4619be2"}], 0x80}}, {{&(0x7f0000000a40)=@nfc={0x27, 0x0, 0x1, 0x3}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000ac0)="269fb00bef1f9c23e2017bc508383c5255bc7e4dc681a7324fefc1b8b48bbc7f23985f4198201d54d0cebdfe130b7b5350dcda7f391c9e5f020f6d3ef15a6f58e31f85c0b5950fac49b9056836679fcaed4c6b2aabcbc20aaa47bc2d2d86e460", 0x60}, {&(0x7f0000000b40)="848eabba2e9cf3f12383637b1f54189d5a1cdb8f964d7ad73e681fd473af45db3d8007f0b0fe08252bb15baac3a7fb6d0dae818ffef08742220e213dc66b4cb47d3a0ecb9cc04650561f35bf44ff14cc69af594b96051142e7787f5503028b1f6682c00e13a791988bfff706cf5f9bbff5480adef6fd9ce45c3084a04b3e310ea910510db716cb734259c9a3a628518ccc99b8e2e3fbe36457abfa7454555d0dd7a0eb972e7d3f6565e05acbfb1be4038c24f3a4be37c78d889d9fc9c60985cdae6e94b1284ff13d5be6d7e1c97e8153080d4917795637ceae44460f497802fd7026888e03dcd25c2d9e", 0xea}], 0x2, &(0x7f0000000c80)=[{0x30, 0x101, 0x589, "5ef128c05676fbbd547376a0ca401aa4ee9e680c29429b7eeecf2c5a35"}, {0xe8, 0x88, 0x401, "07a6be0636958c5914f3c4c73fb2e1602eaf62e43ac4bdeb995ad822f05646d1b2ee3139b984143d80d37b52886b39aae8ec1b756d24e9eec9df3d61a853a96654d7792515ba1081abc58df0caf4fceec63e4fa3c8fdb3f49ea96a35c499b6229a813d4a18a0776d457c7eea97ff8c3fdff8fb521a6019dcb08925a0f8e88e94c33a6a6877db7d1bb49bc8114fa0b1cd227c013e71b05740f9f3ebe04c76f9bde0ba05016e824854ef63c6e1769f28fdda874b65a817dcbb397dacf3a801765fe0c49ce1c029256b30f954e11c2c6e9b360dcfd8e785882e"}, {0x1010, 0x84, 0x6, "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"}, {0x60, 0x31c, 0x7fff, "0c4759459890fd76a54cc28f003a172b8611a954b0b623951325ef89435199adb47ae04ea3ed4ec6dfe0bcf47f024ba8b7a23929623cb634ab01a17fdb8e57cfaad95880b6af4b827c"}, {0x60, 0x88, 0xa28c, "4c01d38bb5c1bbdf9c80c5041efa80a9c191878d34b27149edb1a93a55706e4daa74e2eb4a64cd698f1ce6d80d392cf58d27e2614c67ce9dd9d70afbe855c2926265ecb72c5516eb6ac71f8c"}, {0x110, 0x10e, 0xc1, "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"}, {0x70, 0x88, 0x1, "ad9658d288c39d3f998b6bc7a89bfe65c09f5fa34c4b9f5f77ee1fc1011044bc95014a6f06159fd2d8257399f4d91259ae86f71e9c357fe1353a14d56a91b21d0b621ada0ac1806c4c06f345d9a57052811f122bbcc92d1dace0"}], 0x1368}}, {{&(0x7f0000002000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2, 0x1, {0xa, 0x4e23, 0x1, @remote, 0x999}}}, 0x80, &(0x7f0000002240)=[{&(0x7f0000002080)="1caca842472e45a4c0450afc26b3e80bd90919e4d3119d", 0x17}, {&(0x7f00000020c0)="f2cd670701d98cb0f5ef84beb60efaac91c77e7caeac92133fc0197b9908bb9c8a209498806c104f109b35e5d5f3c419a0cb2fec2081df18391c6b489ea4d649279d3003b1cd6c8996946e4647f8b85d661ffaee9295ba0c2f87ae8a88e4f936541b3f1ee6073b35e72c4b35a51c19094c1034824bedb01809ee93d5f8ce3a3c3a4abce3acbb6ee33cacb0306e82499ba4bc", 0x92}, {&(0x7f0000002180)="4bf24b6a4cfc59a18915b44abb8d9203412c367e53f0f218cb0fdb958a112e6f084dbffad7d478cd7c5119fb736ac72bcb1b4dc27c790484aa257d9fc6b33ac7728a64f87af5ee0b6047d997f6cfe63f821e4efb097354ede0d8a8a61ebcc363917f302368bf2c3c982d9c57bf4799cd231fc6916183faffae2931fb84614c8d5acd6c8e9c360dfd9d843df21973fc5606f119574b30243c774363366c6a919e14dfe946aa445867da787b5ff44c", 0xae}], 0x3}}], 0x4, 0xa1407deb0294d13) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x200, 0x0) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r8, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="74000002", @ANYRES16=r9, @ANYBLOB="00002bbd7000fcdbdf25100000005800010014000300ac1414bb0000000000000000000000000c0007000800000020000000080002000c00000008000800010000800800080005000000080002000400000014000300ffffffff0000000000000000000000000800040000000000"], 0x74}, 0x1, 0x0, 0x0, 0x40080}, 0x2000d0cc) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r9, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x81}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x10008050) r10 = socket$inet_udp(0x2, 0x2, 0x0) close(r10) socket(0x10, 0x3, 0x0) r11 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r11, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="5500000018007f5f00fe01b2a4a280930206000100000001", 0x18}], 0x1}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r10, 0x0, 0x4ffe2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 13:09:43 executing program 3: setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18) socket(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10) lstat(&(0x7f0000000040)='./bus\x00', &(0x7f0000000240)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000080)='./bus\x00', &(0x7f00000006c0)=""/4096, 0x1000) fcntl$setstatus(r2, 0x4, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/297], 0x129) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 335.033314][ T9517] virtio_net virtio1 eth0: refused to change device tx_queue_len 13:09:43 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 335.109751][ T9519] netlink: 57 bytes leftover after parsing attributes in process `syz-executor.2'. 13:09:43 executing program 4: mlockall(0x6) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 335.231739][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 335.237541][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 335.363672][ T25] audit: type=1804 audit(1575378583.576:43): pid=9504 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir599793732/syzkaller.m8HpIK/49/bus" dev="sda1" ino=16756 res=1 [ 335.363704][ T9524] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 335.417707][ T9524] FAT-fs (loop3): Filesystem has been set read-only [ 335.425650][ T9524] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 335.494099][ T25] audit: type=1804 audit(1575378583.706:44): pid=9504 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir599793732/syzkaller.m8HpIK/49/bus" dev="sda1" ino=16756 res=1 13:09:43 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6(0xa, 0x80003, 0x80) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:09:44 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000001140)=@nat={'nat\x00', 0x19, 0x4, 0xb42, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000cc4], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xe3be17f80b7aed97}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x3, 0x10, 0x88be, 'veth0\x00', 'vcan0\x00', 'bcsh0\x00', 'syz_tun\x00', @dev={[], 0xd}, [0x80, 0xff, 0x0, 0x101, 0x0, 0xff], @broadcast, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0x6e, 0xa6, 0xde, [], [@snat={'snat\x00', 0x10, {{@dev={[], 0x29}, 0xffffffffffffffff}}}], @snat={'snat\x00', 0x10}}, {0x5, 0x8, 0x884c, 'ifb0\x00', 'veth1_to_team\x00', 'syzkaller1\x00', 'ip6erspan0\x00', @local, [0x465f1bbaf54deb8a, 0xff, 0x0, 0x0, 0xff], @empty, [0x181, 0x0, 0x0, 0xff, 0xff], 0x856, 0x88e, 0x8c6, [@u32={'u32\x00', 0x7c0, {{[{[{0x2, 0x2}, {0x8df, 0x3}, {0x0, 0x3}, {0x4, 0x1}, {0x5, 0x3}, {0x4}, {0x8}, {0x0, 0x1}, {0xffc00000, 0x1}, {0x3, 0x1}, {0x5, 0x3}], [{0x9, 0xc8}, {0x0, 0x80000000}, {0x9}, {0x7, 0xa2f}, {0x6, 0x4}, {0x6, 0x10000}, {0x4, 0x7}, {0x1ff, 0x2}, {0x8, 0x8}, {0x81, 0x9}, {0xa8000000, 0xffff}], 0xb, 0x5}, {[{0xfff, 0x1}, {0xfffffffe}, {0xc6}, {0x10001, 0x48de3f89eb128947}, {0x2, 0x3}, {0x8000, 0xbdb16fc31330789f}, {0x0, 0x1}, {0x80000000, 0x2}, {0x8, 0x2}, {0x6}, {0x200}], [{0x9}, {0x7}, {0xff80000, 0x7389}, {0x8001, 0x9}, {0x8, 0x2}, {0x300000, 0xfffffff7}, {0x80000001, 0x800}, {0x3, 0x55c1e255}, {0x401, 0x2aa}, {0x0, 0x7}, {0x7, 0xfffffffa}], 0xb, 0x6}, {[{0xfb, 0x1}, {0x7, 0x3}, {0x6, 0x4}, {0x1, 0x3}, {0x3, 0x2}, {0x1400}, {0x7}, {0x10001}, {0x4}, {0x9, 0x3}, {0x7fff, 0x3}], [{0x10000, 0xb0}, {0x400, 0x8000}, {0xd04, 0x4}, {0x9, 0x3}, {0x8}, {0x7f, 0x3}, {0x4, 0xa3b2a4e6}, {0x7f, 0x4}, {0xffffffff, 0x8}, {0x0, 0x400}, {0xca, 0x654}], 0x2}, {[{0xffffffff}, {0x3f, 0x1}, {0x200}, {0x1, 0x1}, {0x9, 0x2}, {0x2, 0x3}, {0x401}, {0x3, 0x3}, {0x1}, {0xe, 0x1}, {0x1, 0x4}], [{0x1}, {0x5, 0xff0}, {0x10001, 0x7}, {0x7, 0x7}, {0x4}, {0x2, 0x9}, {0x1, 0x8001}, {0x40, 0x8}, {0x9}, {0x8, 0x1}, {0x1, 0x87}], 0xa, 0xa}, {[{0xffff, 0x3}, {0x34983a76}, {0x3ff, 0x1}, {0x10000, 0x3}, {0x126}, {0x3}, {0x5}, {0xc25}, {0x4, 0x2}, {0xe85, 0x3}, {0x6, 0x3}], [{0x1, 0x4dda}, {0x7f, 0x2}, {0x80000001, 0x5}, {0xffffffff, 0x4a}, {0x0, 0x3eb68102}, {0xdd6, 0x5}, {0x8000, 0xffffff00}, {0x40, 0x8001}, {0x5}, {0x22b79486, 0xfffff801}, {0x10000, 0x8}], 0x0, 0x3}, {[{0xcf, 0x3}, {0x5, 0x3}, {0x1, 0x2}, {0xe4}, {0xdbc00000, 0x3}, {0x4, 0x1}, {0x8}, {0x8}, {0x0, 0x3}, {0x1}, {0x8}], [{0x101, 0xe42}, {0x7, 0xffffff68}, {0x6, 0x81}, {0x7, 0x240000}, {0x8, 0x4}, {0xbb9d, 0x8}, {0x4, 0x9d46}, {0x9, 0x6}, {0x4, 0x3}, {0x1f, 0x31f}, {0x349f, 0xf91}], 0x8, 0x6}, {[{0xba, 0x3}, {0xfff}, {0x80000001, 0x1}, {0x0, 0x1}, {0x5}, {0x6, 0x3}, {0x5d95}, {0x4}, {0x9}, {0x7}, {0x4020, 0x918826bae5a92126}], [{0x4, 0x8001}, {0x5, 0x7eaf6650}, {0x5, 0x3}, {0x80, 0x8a}, {0x9, 0x1000}, {0x7, 0x401}, {0x6, 0xfffffffb}, {0x4, 0x3}, {0x40, 0x3}, {0x2, 0x4}, {0x400, 0x15}], 0x5, 0x8}, {[{0x7f, 0x1}, {0x1b7, 0x4}, {0xf5e}, {0x2, 0x3}, {0x80, 0x7e984d8ce3016725}, {0x479, 0xb6a79d2562c692b1}, {0x4, 0x1}, {0x5, 0x3}, {0x800, 0x1}, {0x6, 0x1}, {0x8}], [{0x8, 0x4}, {0x1ff, 0x1}, {0x0, 0x2}, {0x80000000, 0x100}, {0x1000, 0x7}, {0xa22}, {0x5, 0x8a2c}, {0x0, 0xff}, {0x0, 0x6e22d361}, {0x2, 0x800}, {0xa9e, 0xad}], 0x3, 0x1}, {[{0x1, 0x1}, {0x401, 0x3}, {0x1}, {0x7e0, 0x2}, {0x8}, {0xfffffffc, 0x1}, {0x10000}, {0x1ff}, {0x80000001}, {0xe0b}, {0x9}], [{0x9, 0x4}, {0x1, 0x8}, {0x9, 0x1}, {0x6edd, 0x7}, {0x8, 0x9}, {0xfffffe01, 0x3}, {0x8}, {0x8, 0x4}, {0xff, 0xc0}, {0x3, 0xc4ac}, {0x1}], 0x3, 0x2}, {[{0xb4}, {0x7, 0x1}, {0x1cbf, 0x3}, {0x61}, {0x9, 0x1}, {0x6, 0x2}, {0x5, 0x1}, {0x6}, {0x1, 0x2}, {0x3d6d}, {0x640}], [{0x2e, 0x50}, {0x0, 0x1}, {0x4, 0x3}, {0x7, 0x3f}, {0x1}, {0x675, 0x9}, {0x20000000}, {0x6, 0x8}, {0x0, 0x7}, {0x3, 0x742d}, {0x2, 0x6}], 0x4, 0x5}, {[{0x3ff, 0x2}, {0x1, 0x3}, {0x71, 0x1}, {0x8add, 0x3}, {0xfffffff7, 0x1}, {0x4}, {0x3ff, 0x3}, {0x8dba, 0x1}, {0x80, 0x2}, {0x4, 0x1}, {0x1}], [{0x4, 0xee3}, {0x8001, 0x8}, {0x3, 0x7d4}, {0x3, 0x7e}, {0x8, 0x8e6}, {0x6, 0x8}, {0x5a28a13a, 0x2}, {0x8, 0x8000}, {0x8, 0x1}, {0x8a, 0x2}, {0x16}], 0xb, 0x6}], 0x3, 0x1}}}], [@snat={'snat\x00', 0x10, {{@remote}}}], @arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x7ffffffffffffffc, 0x1, [{0x11, 0x8, 0xd027, 'gre0\x00', 'teql0\x00', 'bridge0\x00', '\x00', @remote, [0x0, 0x0, 0x0, 0x0, 0xff, 0x7f], @local, [0x0, 0xff, 0xff, 0x255eda7ba2d4763f, 0xff], 0x6e, 0xa6, 0xde, [], [@arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 0xb4e45a9a2cf04a75}}}], @common=@dnat={'dnat\x00', 0x10, {{@remote, 0xffffffffffffffff}}}}]}]}, 0xbba) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) preadv(0xffffffffffffffff, 0x0, 0x0, 0x100000) shmctl$SHM_LOCK(0x0, 0xb) r2 = open(0x0, 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r2, 0x40086602, 0x0) shmdt(0x0) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(0x0) r3 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = ioctl$TIOCGPTPEER(r4, 0x5441, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000000e40)={0x0, 0x0, 0x7, 0x0, [], [{0x8, 0x21, 0x8, 0x9, 0x7, 0x6}, {0x2, 0x3, 0x3f, 0x97, 0x1f, 0xef3c}], [[], [], [], [], [], [], []]}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000)=0x2, 0x4) 13:09:44 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21b, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r6, 0x1, &(0x7f0000258f88)) msgsnd(r6, &(0x7f0000000340)={0x3}, 0x0, 0x0) msgctl$IPC_SET(r6, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) r7 = socket$inet(0x2, 0x0, 0x19) r8 = socket(0x10, 0x400000000080803, 0x0) write(r8, &(0x7f00000001c0)="240000001a0025f00485bc04fef7001d020b49ffed000000800328000800030001000000", 0x24) getsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@broadcast, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r9}}, {{@in6, 0x0, 0x2b}, 0x0, @in6=@loopback}}, 0xe8) r10 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r10}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, {&(0x7f0000000ec0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001080)=[{&(0x7f0000000f40)="62d9b9d62ee09936fce881b2550fdc2981e99c581a741e243d7b763d190c717200238d3de1a1ed4149f4604efd5c917eb4f32db14eb5cfdd73c37282c004d5b3ed9942ee14657bdf6224d8eb6b9958612d3cf0a4c4e3f10922e8c6de354421403c2d01b2b7e6fa53ffa7210c8d0b5bcaa7f376d26f49fcef2357b4d7be156eafb98ffd", 0x83}, {0x0}], 0x2, &(0x7f00000010c0), 0x0, 0x40044}, {0x0, 0x0, 0x0}], 0x3, 0x20000000) ioctl$NS_GET_OWNER_UID(r5, 0xb704, &(0x7f0000000280)=0x0) r12 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r12}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, {&(0x7f0000000ec0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001080)=[{&(0x7f0000000f40)="62d9b9d62ee09936fce881b2550fdc2981e99c581a741e243d7b763d190c717200238d3de1a1ed4149f4604efd5c917eb4f32db14eb5cfdd73c37282c004d5b3ed9942ee14657bdf6224d8eb6b9958612d3cf0a4c4e3f10922e8c6de354421403c2d01b2b7e6fa53ffa7210c8d0b5bcaa7f376d26f49fcef2357b4d7be156eafb98ffd", 0x83}, {0x0}], 0x2, &(0x7f00000010c0), 0x0, 0x40044}, {0x0, 0x0, 0x0}], 0x3, 0x20000000) r13 = getpid() sched_setscheduler(r13, 0x5, &(0x7f0000000380)) msgctl$IPC_SET(r6, 0x1, &(0x7f0000000340)={{0x101, r9, r10, r11, r12, 0x2, 0x800}, 0x40, 0x3, 0x5, 0x10000, 0x3f, 0x10001, r13}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000140)={{0x6351bc117dc4110d, 0x0, @identifier="7350644538e175261641abb66789cc88"}}) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r5, 0x40405515, &(0x7f0000000040)={0x4, 0x0, 0x7, 0x1bd, '\x00', 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0xc101, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 335.791717][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 335.797498][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:09:44 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r1, 0x0) creat(0x0, 0x0) r2 = getpgrp(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006200)={{{@in6, @in6=@ipv4={[], [], @loopback}}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000006300)=0xe8) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)) open_by_handle_at(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) socket$netlink(0x10, 0x3, 0x8) syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) setpriority(0x0, r2, 0x9) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f00000001c0), 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') preadv(r4, &(0x7f0000000480), 0x10000000000001e2, 0x0) ioctl$TIOCMBIS(r4, 0x5416, &(0x7f0000000200)=0x101) fchdir(r3) r5 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x8, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r5, &(0x7f0000000600)='4', 0x4100) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r6 = openat$vcs(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$GIO_FONT(r6, 0x4b60, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x2466199710887143, 0x0) r7 = syz_open_procfs(0x0, 0x0) accept4$packet(r7, 0x0, 0x0, 0x0) [ 335.871721][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 335.877518][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 335.919509][ T9562] bond0: (slave bond_slave_1): Releasing backup interface [ 335.951727][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 336.069580][ T9558] EXT4-fs: Warning: mounting with data=journal disables delayed allocation and O_DIRECT support! [ 336.100760][ T25] audit: type=1800 audit(1575378584.306:45): pid=9573 uid=255 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16778 res=0 [ 336.142608][ T9558] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 336.197327][ T9558] EXT4-fs error (device loop3): ext4_fill_super:4489: inode #2: comm syz-executor.3: iget: root inode unallocated 13:09:44 executing program 4: mlockall(0x6) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 336.290956][ T9558] EXT4-fs (loop3): get root inode failed [ 336.300031][ T9558] EXT4-fs (loop3): mount failed 13:09:44 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6(0xa, 0x80003, 0x80) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:09:44 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r1, 0x0) creat(0x0, 0x0) r2 = getpgrp(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006200)={{{@in6, @in6=@ipv4={[], [], @loopback}}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000006300)=0xe8) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)) open_by_handle_at(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) socket$netlink(0x10, 0x3, 0x8) syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) setpriority(0x0, r2, 0x9) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f00000001c0), 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') preadv(r4, &(0x7f0000000480), 0x10000000000001e2, 0x0) ioctl$TIOCMBIS(r4, 0x5416, &(0x7f0000000200)=0x101) fchdir(r3) r5 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x8, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r5, &(0x7f0000000600)='4', 0x4100) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r6 = openat$vcs(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$GIO_FONT(r6, 0x4b60, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x2466199710887143, 0x0) r7 = syz_open_procfs(0x0, 0x0) accept4$packet(r7, 0x0, 0x0, 0x0) 13:09:44 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f00000002c0)=0x6, 0x4) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000240)={0xe26e, 0x8, 0x1}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = socket(0x5, 0x8000a, 0x2) sendmmsg$alg(r3, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000001b00)={{{@in=@multicast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) write$P9_RWALK(r4, &(0x7f0000000300)=ANY=[], 0x6) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r5) r6 = syz_open_dev$audion(&(0x7f00000003c0)='/dev/audio#\x00', 0x100000000, 0x301000) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000003340)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000001a80)=0x1a2) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000300)=0x6) socket$nl_route(0x10, 0x3, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) close(r7) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r9 = getpid() write$cgroup_pid(r8, &(0x7f00000036c0), 0x12) open(0x0, 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000001d80)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) getresgid(&(0x7f0000001800)=0x0, &(0x7f0000001840), &(0x7f0000001880)) getgid() r12 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r12, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r12, 0x4028af11, &(0x7f0000000040)) r13 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r14 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r14, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r14, 0x4028af11, 0x0) r15 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000440)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe0\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r15, 0x4028af11, &(0x7f0000000040)) r16 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r16, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r16, 0x4028af11, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) r17 = getpid() getpgid(r17) r18 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r18, 0x0, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r18, 0x0) r19 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r18, r19) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.usage_percpu\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r20, 0x29, 0x22, &(0x7f0000001980)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000280)=0xfffffffffffffec8) r22 = getegid() r23 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r24 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r24, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r24, 0x4028af11, &(0x7f0000000040)) r25 = syz_open_dev$vcsa(&(0x7f0000001ac0)='/dev/vcsa#\x00', 0x400, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) r26 = getpid() sched_setscheduler(r26, 0x0, &(0x7f0000000380)) setuid(0x0) r27 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r27, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r27, 0x4028af11, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00)=[{&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x20000000}, {&(0x7f0000000300)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4010}, {&(0x7f0000000500)=@file={0x0, './bus\x00'}, 0xfffffffffffffec7, &(0x7f0000001680)=[{&(0x7f0000000580)="662e72720f2a216d54aa17e89c0d449032e652373ac558b7367ab3499e1527e088ccfe6e9e9da1cb7ef6af600fcc160d65b8cb23fcb40c603f34c8deab3dcea55f929ea931bcd0b1261ea7e8dca5c8efc159cd143b744301ee123b95d1efdcfab1", 0x61}, {&(0x7f0000000600)="9821d0f458fec4b2b88880057c6cbf1f75883f3d67c5ca23b788c472d59e9826fcb02b3cc96e881e4bb6c2f7a64506eda4f7d440b87ba40403a85446d4e222aad74f9bfc9ee12ef570fd", 0x4a}, {&(0x7f0000000680)="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", 0xf80}], 0x3, &(0x7f00000021c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB, @ANYPTR64, @ANYRES32, @ANYRES32, @ANYBLOB="000000003400000000000000010000", @ANYRES32=r12, @ANYRES32=r13, @ANYRES32=r7, @ANYRES32=r14, @ANYRES32, @ANYRES32=r15, @ANYRES32=0x0, @ANYRES32=r16, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r21, @ANYRES32=r22, @ANYBLOB="001ef61400000000000000010000000100000000", @ANYRES32=r23, @ANYRES32, @ANYRES32=r24, @ANYRES32=r25, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c8020a03319ef798d008de7d9a051a0ac240000ffb500007122", @ANYRES32=r26, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000ae03e8760bd2ee7504d1f54ef8a2fb44017db67b2086296b731140f572d776e9ea12bcc577ac10a118c4b30b57e1aa833584ccf686461029dd33ef7f77edf5823f9778295ebfe1189e63265049b567daf18765bbb3a314c0e280d000410add515829926a2fcb687ce1ac27988b1c3f1e453238c301c5d32099736036f436de9893af12c21336bef9cc4306492958b4bc431883b57608bf32896590400d2846720567eb1fd956dff6c2efbc2c4c9b09b11fc1aa3802fb667a063910addbaa9ba3c805ee9a16490f267403c0a9ad385d5ff15f016f76ab2134fa68804558324061a6ecd59e649606451b8b5c4ba4e773f0d0f8a5f79464903232f3fc884ea0759e725892e5caa93153ebb1e2d0c934cb13f9ec0c2413952d81127e28d887493f796356564ede74cb3d5a5b92dbe80ddfeebb6900e0092cd630ea852278e8110745b44e241f0bc7cd16d2a666c0d8d98beeaa8b610c5ab1121cb2cc6572ee9eacf18666c15df766422790f9aea779209645ead7aa55204cc19adf8c5082db4e84d074e91fda10d65a4d50bdd0ad54c2203e55e003963ec62bb4646451ce58f132a1ed272d12933fc7a54b07de603019920610a8bd6e11dffc3e3affca2c2ca8d8b1c5a4579b18e0d3a7546438c717c263eb9dec969513a1b8e7c392af1c9caa90fa70474c69f9c7ec2aadd304f328bb0e5e9dfc38f508abfb61d62aab7f80c57f9b2914782c0a1630d731461fa1e223916ea79b2945ab24c9efcd61f2c9c3bbb01800000d31567341f9af41410c200"/579, @ANYRES32=r8, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xdc, 0x2008044}, {&(0x7f0000001d00)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x48012}], 0x4, 0x4c010) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000000)=0x8, 0x4) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/sequencer2\x00', 0x10d022, 0x8000000) r28 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r28, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) [ 336.373646][ T9566] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 13:09:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="9b", 0x1}], 0x1) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80, 0x80000) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x3230c0, 0x0) ioctl$SIOCGETNODEID(r3, 0x89e1, &(0x7f0000000380)={0x3}) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f00000003c0)={0x6, 0x100, 0x4, {0x0, 0x3, 0x1}}) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f00000000c0)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000140)=""/92, 0x5c}, 0x8}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000280)=""/147, 0x93}}], 0x2, 0x62, 0x0) 13:09:44 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000140)=""/233, &(0x7f0000000000)=0xe9) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x287}}], 0x4000000000000b2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') socket$inet6(0xa, 0x2, 0x0) dup(0xffffffffffffffff) preadv(r1, &(0x7f00000017c0), 0x333, 0x0) [ 336.747449][ T25] audit: type=1800 audit(1575378584.956:46): pid=9599 uid=255 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=29 res=0 [ 336.898216][ T25] audit: type=1804 audit(1575378585.106:47): pid=9592 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir599793732/syzkaller.m8HpIK/50/bus" dev="sda1" ino=16768 res=1 13:09:45 executing program 2: setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000080)={0x2, {{0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}}}, 0x88) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5409, 0x0) 13:09:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="9b", 0x1}], 0x1) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80, 0x80000) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x3230c0, 0x0) ioctl$SIOCGETNODEID(r3, 0x89e1, &(0x7f0000000380)={0x3}) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f00000003c0)={0x6, 0x100, 0x4, {0x0, 0x3, 0x1}}) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f00000000c0)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000140)=""/92, 0x5c}, 0x8}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000280)=""/147, 0x93}}], 0x2, 0x62, 0x0) 13:09:45 executing program 5: socket$kcm(0xa, 0x0, 0x3a) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_ACQUIRE(0xffffffffffffffff, 0x6430) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x88802, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40400212}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x34, r3, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xffffff8a}]}, @TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x802, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="00030e80493f1ec2cec97d7e88a850399fa0"], 0x12) 13:09:45 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6(0xa, 0x80003, 0x80) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:09:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x22, 0x2, 0x1, 0x0, 0x5, 0x0, 0x0, 0x9}, 0x3bbe87123f435aa9) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001ac0)=[{{&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000140)=[{&(0x7f00000002c0)=""/191, 0xbf}, {&(0x7f0000000380)=""/128, 0x80}], 0x2, &(0x7f0000000400)=""/125, 0x7d}, 0x3}, {{&(0x7f0000000480)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/9, 0x9}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/155, 0x9b}], 0x4, &(0x7f0000001640)=""/212, 0xd4}, 0xfffffffb}, {{&(0x7f0000001740)=@sco, 0x80, &(0x7f00000019c0)=[{&(0x7f00000017c0)=""/188, 0xbc}, {&(0x7f0000001880)=""/30, 0x1e}, {&(0x7f00000018c0)=""/31, 0x1f}, {&(0x7f0000001900)=""/178, 0xb2}], 0x4, &(0x7f0000001a00)=""/167, 0xa7}, 0xffffffff}], 0x3, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) r5 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r5, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) 13:09:45 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f0000000240)=0x1, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x70d, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000140)=@v1={0x2, "0eaffcbddace416bee26e8ef13f85dbc7f2c26be"}, 0x15, 0x1) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x20) ioctl$DRM_IOCTL_GET_CTX(r5, 0xc0086423, &(0x7f00000002c0)={0x0, 0xe64980211942f931}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x70d, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) [ 337.311711][ C0] protocol 88fb is buggy, dev hsr_slave_0 13:09:45 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:09:45 executing program 5: mlockall(0x6) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 337.566354][ T9649] bond3 (uninitialized): Released all slaves [ 337.607705][ T9661] bond3 (uninitialized): Released all slaves 13:09:45 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0xaa6a5431a55cb436, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405000000000000611048000000000019000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2d) 13:09:46 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0xa22fd965c0582a36, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x4, 0xd210}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={r1, 0x200}, 0x8) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) syz_open_procfs(0x0, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) setpriority(0x0, r3, 0xffffffff) 13:09:46 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:09:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz1\x00', 0x1ff) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0xc05c6104, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x10, &(0x7f0000001700)=0x3ff, 0x4) syz_open_dev$mice(0x0, 0x0, 0x432000) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000001c40)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001c00), 0x106, 0xa}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc3ffffff]}}, r4}}, 0x48) r5 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r5, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r4}}, 0x18) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000340)={0x0, 0xffffffff, 0x4000, 'queue0\x00'}) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x3, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCGIFDSTADDR(r7, 0x8917, &(0x7f0000005040)={'batadv0\x00', {0x2, 0x4e24, @multicast2}}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000001a40)=""/244, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000100)={0xf010000, 0x0, 0x0, [0x4], 0x0}) preadv(r6, &(0x7f00000018c0)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/158, 0x9e}, {&(0x7f0000000140)=""/70, 0x46}, {&(0x7f0000000400)=""/80, 0x50}, {&(0x7f00000017c0)=""/219, 0xdb}], 0x5, 0x0) 13:09:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_read_part_table(0x80, 0x1, &(0x7f00000010c0)=[{&(0x7f00000000c0)="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", 0x1000, 0x2}]) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000000)=0x10001) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001180)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000e731a069595700212f359cca2114768ae9d7670004ad774b93a384f51e63091a44cf77ea139004f11c129925da982ace115ce32b60b3ce4fcb1497236d07", @ANYRES32=0x0, @ANYBLOB="dba0d379e8e9ea44"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009b89aab49ad30a704aa4f574f493a554bd08b3abf111160c5ee6746a0e9a03b182760e556f17156f9573e220fca116b02eea61fbb4a67b003702e307c1651bbcb8c09d5de2a33ac580443bdc788b1f00f9a3155816be58d23eb1733453372067f9ab361101b5271e4c24642ba2bf25dd22514b92ed55e28140c751b8d4d2a22b00"], 0x2}}, 0x0) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000001100)={@rand_addr="7fab709865569670ee99902fb7ba66f5", @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7fffffff, 0xad0, 0x5, 0x200, 0x4, 0x800022, r6}) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000040)={'vlan0\x03\x00\x00\x00@\x00\x00\x02\x00\xda\x00', @ifru_flags=0x3002}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='wlan1eth1\x00') [ 338.123980][ T9690] device veth14 entered promiscuous mode [ 338.130141][ T9686] Dev loop1: unable to read RDB block 8 [ 338.135802][ T9686] loop1: unable to read partition table [ 338.141478][ T9686] loop1: partition table beyond EOD, truncated [ 338.149866][ T9686] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 13:09:46 executing program 4: clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:09:46 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:09:46 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 338.284863][ T9686] Dev loop1: unable to read RDB block 8 [ 338.295002][ T9686] loop1: unable to read partition table [ 338.307335][ T9686] loop1: partition table beyond EOD, truncated [ 338.320345][ T9686] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 13:09:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r3, 0x200004) get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0x4, &(0x7f0000ffd000/0x1000)=nil, 0xdd9c225d8804c414) sendfile(r0, r3, 0x0, 0x80001d00c0d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000000180)={0x80, 0x1, 0x3, 'queue0\x00', 0xffff}) ioctl$TCSETAW(r3, 0x5407, &(0x7f00000000c0)={0x81, 0xfaf0, 0x8, 0x5, 0x2, 0x5, 0x3f, 0x80, 0x4, 0x9}) 13:09:46 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_DELAY(r0, 0x80084121, &(0x7f0000000100)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000000c0)={'veth1_to_bond\x00', 0x400}) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000080)=0x1) 13:09:46 executing program 5: mlockall(0x6) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 13:09:46 executing program 4: clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:09:46 executing program 2: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="46154bd986ba57806076cae8a200002700aaaaaaaaaa00aaaaaaaaaaaaaaaaaaaaaa1b00af49000000aaaaaaaaaa"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r0, &(0x7f0000000ac0)='e', 0x1) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r2, &(0x7f0000000540)={&(0x7f0000000400), 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0x90, 0x0, 0x92ab38d011d6a7d5, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffffffffffbe}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xbbdb}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x1404c000}, 0x40) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="dba0d379e8e9ea44"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009b89aab49ad30a704aa4f574f493a554bd08b3abf111160c5ee6746a0e9a03b182760e556f17156f9573e220fca116b02eea61fbb4a67b003702e307c1651bbcb8c09d5de2a33ac580443bdc788b1f00f9a3155816be58d23eb1733453372067f9ab361101b5271e4c24642ba2bf25dd22514b92ed55e28140c751b8d4d2a22b00"], 0x2}}, 0x0) sendmsg$can_bcm(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x1d, r6}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x5, 0x440, 0xfffffffe, {}, {0x77359400}, {0x0, 0x1, 0x1, 0x1}, 0x1, @canfd={{0x4, 0x0, 0x1}, 0x36, 0x0, 0x0, 0x0, "cae3ebb2ccba27d2082218f320aff5c55c224d3fc9c00305bed2286653fc4fbd05eadb3a072c6b0306369a435eae3992b3b45c17564e253b22d06cd82536b459"}}, 0x80}, 0x1, 0x0, 0x0, 0x20004801}, 0x24008090) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000080)={0xf}, 0x20000357) listxattr(0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x80, &(0x7f0000000180)=0x6, 0x4) 13:09:47 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = dup2(r1, r0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000036c0), 0x12) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r5, &(0x7f0000008900)=[{{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000240)}, 0xff}, {{&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000300)=""/134, 0x86}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/114, 0x72}], 0x3, &(0x7f0000001500)=""/131, 0x83}}, {{&(0x7f00000015c0)=@nl, 0x80, &(0x7f0000002a40), 0xe, &(0x7f0000002ac0)=""/197, 0xc5}, 0x4f06}, {{0x0, 0x0, &(0x7f0000002ec0)=[{&(0x7f0000002bc0)=""/191, 0xbf}, {&(0x7f0000002c80)=""/38, 0x26}, {&(0x7f0000003700)=""/4096, 0x1000}, {&(0x7f0000008a80)=""/197, 0xc4}, {&(0x7f0000002dc0)=""/48, 0x30}, {&(0x7f0000002e00)=""/148, 0x94}], 0xe7}, 0x8}, {{&(0x7f0000002f40)=@nfc, 0x80, &(0x7f0000003100)=[{&(0x7f0000004700)=""/4096, 0x1000}, {&(0x7f0000002fc0)=""/21, 0x15}, {&(0x7f0000003000)=""/232, 0xe8}], 0x3, &(0x7f0000003140)=""/115, 0x73}, 0x50}, {{&(0x7f00000031c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000008780), 0x0, &(0x7f0000008840)=""/191, 0xbf}, 0x7}], 0x6, 0x10000, &(0x7f0000003680)={0x77359400}) ftruncate(r4, 0x200006) sendfile(r0, r4, 0x0, 0x8000fffffffd) 13:09:47 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:09:47 executing program 4: clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:09:47 executing program 2: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="46154bd986ba57806076cae8a200002700aaaaaaaaaa00aaaaaaaaaaaaaaaaaaaaaa1b00af49000000aaaaaaaaaa"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r0, &(0x7f0000000ac0)='e', 0x1) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r2, &(0x7f0000000540)={&(0x7f0000000400), 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0x90, 0x0, 0x92ab38d011d6a7d5, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffffffffffbe}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xbbdb}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x1404c000}, 0x40) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="dba0d379e8e9ea44"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009b89aab49ad30a704aa4f574f493a554bd08b3abf111160c5ee6746a0e9a03b182760e556f17156f9573e220fca116b02eea61fbb4a67b003702e307c1651bbcb8c09d5de2a33ac580443bdc788b1f00f9a3155816be58d23eb1733453372067f9ab361101b5271e4c24642ba2bf25dd22514b92ed55e28140c751b8d4d2a22b00"], 0x2}}, 0x0) sendmsg$can_bcm(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x1d, r6}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x5, 0x440, 0xfffffffe, {}, {0x77359400}, {0x0, 0x1, 0x1, 0x1}, 0x1, @canfd={{0x4, 0x0, 0x1}, 0x36, 0x0, 0x0, 0x0, "cae3ebb2ccba27d2082218f320aff5c55c224d3fc9c00305bed2286653fc4fbd05eadb3a072c6b0306369a435eae3992b3b45c17564e253b22d06cd82536b459"}}, 0x80}, 0x1, 0x0, 0x0, 0x20004801}, 0x24008090) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000080)={0xf}, 0x20000357) listxattr(0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x80, &(0x7f0000000180)=0x6, 0x4) 13:09:47 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:09:47 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:09:47 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:09:47 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:09:47 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:09:47 executing program 5: mlockall(0x6) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 13:09:47 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:09:47 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:09:48 executing program 2: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="46154bd986ba57806076cae8a200002700aaaaaaaaaa00aaaaaaaaaaaaaaaaaaaaaa1b00af49000000aaaaaaaaaa"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r0, &(0x7f0000000ac0)='e', 0x1) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r2, &(0x7f0000000540)={&(0x7f0000000400), 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0x90, 0x0, 0x92ab38d011d6a7d5, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffffffffffbe}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xbbdb}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x1404c000}, 0x40) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="dba0d379e8e9ea44"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009b89aab49ad30a704aa4f574f493a554bd08b3abf111160c5ee6746a0e9a03b182760e556f17156f9573e220fca116b02eea61fbb4a67b003702e307c1651bbcb8c09d5de2a33ac580443bdc788b1f00f9a3155816be58d23eb1733453372067f9ab361101b5271e4c24642ba2bf25dd22514b92ed55e28140c751b8d4d2a22b00"], 0x2}}, 0x0) sendmsg$can_bcm(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x1d, r6}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x5, 0x440, 0xfffffffe, {}, {0x77359400}, {0x0, 0x1, 0x1, 0x1}, 0x1, @canfd={{0x4, 0x0, 0x1}, 0x36, 0x0, 0x0, 0x0, "cae3ebb2ccba27d2082218f320aff5c55c224d3fc9c00305bed2286653fc4fbd05eadb3a072c6b0306369a435eae3992b3b45c17564e253b22d06cd82536b459"}}, 0x80}, 0x1, 0x0, 0x0, 0x20004801}, 0x24008090) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000080)={0xf}, 0x20000357) listxattr(0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x80, &(0x7f0000000180)=0x6, 0x4) 13:09:48 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:09:48 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:09:48 executing program 1: r0 = syz_open_dev$vcsn(0x0, 0x8, 0x10000) ioctl$CAPI_CLR_FLAGS(r0, 0x80044325, &(0x7f00000000c0)=0x1) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000280)={'IDLETIMER\x00'}, &(0x7f00000002c0)=0x1e) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc\x00', 0x0, 0x0) sendmsg$nl_route(r0, 0x0, 0x40) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1964, 0x0, 0x8, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xf17) unshare(0x40040400) pipe(0x0) write$P9_RLINK(r1, &(0x7f0000000300)={0x7, 0x47, 0x1}, 0x7) rt_sigtimedwait(&(0x7f0000000080)={0x400}, &(0x7f0000000380), &(0x7f0000000480)={0x77359400}, 0xffffffffffffff59) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000b34ff8), &(0x7f0000b34ffc)=0xc) accept$ax25(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @bcast}, [@rose, @rose, @rose, @remote, @null, @default, @netrom, @netrom]}, &(0x7f0000000180)=0x48) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000240)={0xf000000, 0x6, 0x0, [], 0x0}) bind$inet(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) renameat(r6, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_mr_vif\x00') fadvise64(r7, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') 13:09:48 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 340.246249][ T9797] IPVS: ftp: loaded support on port[0] = 21 13:09:48 executing program 0: socket$inet6(0xa, 0x80003, 0xff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000040000000005f0300000600000099010000000000000000000000000000286463d662327da35fe7467311aec0091cdb4c5024d59812fd58961ace6e330935e1cdfee74a986931f5bb80930d398d46ae7644e10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001395ba4801166888568300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022422a0e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000080da7b5d8088ed6e5b0300"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:09:48 executing program 3: prctl$PR_GET_DUMPABLE(0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000004c0)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r1) add_key(&(0x7f0000000a00)='asymmetric\x00\xcf\xad\x1e\xfc\xfe\x81\x9b*\t\xa6\x03F\x04\x1e\t\x00\x00\x00\x00\x00\x00\x00\x1d\x9d\xc6r\x88\xff\xd5-\xc0D-p\xd1\xa9\x99*YL>7\xbff\xbd\x8b\t\xa4\x94\xe0Uy`=\x1c\x06\xd3/\x1d\xbe\x13\xf2;/[ml\x0eN1\x0e\xf2P\x8e\x8aZ\x84\xf1\xff[\x8bP\xa9\xe5\x06O\xa49\x9f\x1f\xe9^\xa5`wgl\x8eU\x90\xe5`\xee\xab[\xe4\x8e\xc7Z\x81\xd5\xd9\xbf${\xdf&\x8b\xb6\xf4\xfb\x98]\v\xdd\xd27\x11\x1c\fG\b;\xb6\xe2\x02\n\xc4\x0ei\x8c\xba\xa7\xb0\xe1\xc1/\xd4}\xd0SC\xec\xc2\x80n\x01jY\x88\xda\x8bmFp\xfe\"\x9c\x13\xc8\f\xe7\x14\x93\x8c\x1c9~{\x8b\x8f\x83/s#9\x80\xa0\xdbEf;~L\xae5\x91(\xb0\xb8;\xcd\xf9?@\x00\xe7\x9a\r{\xb6\xa4}!l\xfa\x8cS \\~T\x1a\xa8\x8d\xcb\x81\xeb\x10\x14\x18,\x1eW\x17L\x83\xba\xf5W\xc6\x9d\xcf`v\xc6', 0x0, &(0x7f0000000440)="30580256f10cb8b56c9606987fe808d672bd136840d27c44d58e94ea51a7dfc59e92e80d9482ca7839173a8f1143a939b4fd2672693a46c08df6616dd21be3453ecf73039a20f43acbc5376139a9070ae27dd847474d1e59b2697863e6ebd80f75cadcb79366256287fca9", 0x313, r1) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000040)) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000004c0)={"9c63222380baedfb9ce3b20a2ae73e05653e88a1c5f19b3a6e03dc88258d7b8f0ac6662fd7cb4a4480e635df9056e509e467709057f3eb20b5c2a41c3ce94e809e82911e7af5b9ca53b05500abc777f040ff0d50f8cfc1cba78cbbae4bb97e56785cd6b44e1c5d58569b0ad5e109b3e8c8068bb5e362d0e8d677dd397d7a287fa7655a293394fcf134da88e762688ad966fc1be5fb19bd0ebd9c7b3edca8df9e8db18e24e80578c9d8b60ffcc8c005e13c090080d6532949edb3ab7698bec747d7a7b5c3109c759b15435a46f6c96d6536bc3951d8365bbc2bf55c58a43de4bc16123bfe7a2b6d2f273050688608383b7bd8a5d5ea04480942b39f4025d1e9ba629e2a3c3a3a9c6e8118492ae950d439453ac1242d4806e370a591ca69f558a4dd34d6936bca496f2000aa24d212d187cb84dc17ff49afd48eb0d172a7c3d49697ce973aeea26024d496b155f534be3adb13cf247ba225a1c52ae13611f8128dd17100132ed991608a0c0f0cc7a544711c1a145fded5bd8a28742a9d0a9b17e8f60230a3dbf7019f75f37dc383d06edb898d6fd7e9c1350fde5ae9a332d971eb5bc8a438d6b9bec5ef0f1c0953cfc3008174cf24cd2556dbe615bfb7e255850ea3165c30016b8dcb2746c548eea4208cb79d5078c5cdcb2a83ccc10e37cc5beb0670faf64c0727470faecdb94850d3ca5830b9bcae66847664918f7e7e686d79517c2ffbd774140cd7b6bf79b896976864a438fb250a6fb78ecca5fdd37b345f89987cc6cebb3eb9e6d798c564a901188ac01624d581b3f51987877b609a871eae74adb9f9f6249995634d3f97a7e6ed2a56c177f3021f19dbb126a53d85905a9efd364fdf699dc28478350c1e50fd78cc5a13c605ca1400636795359943354f38824aeb2a28193e715d54baf3efa5fc4f66928797c618b6621910b9acd1510d5d1babe9cca28c88bf345a956aaac9b1eb68189d0897846652aabe68c2d2253b5c57291d412b7dad76f0eba1c0953d4d142ecc3f92d2546342047f42c31724c8f111c6840cc2bfff050cb32377c2a5c2e82256f5100a15e4e38aeda96128ef607ce654a1c2262f5c2d738e583f844aa98352fd064e01bd02c0822c58377fde6e101a6749979ba684fbe9129bc741e06a1bc2ea55fc2a7869af432f3d034966182ac5be915043b0db266af00e8398d502f6544997bd42ff664c34a472108162498c5492fcb28f71a13224db10f611bed5945f226497e54c0d6716439f0276f5dbada2ed7e914e3934000e8b67486bca00d3149a4935dafda8ef42cffb7ec8863ccbe6a1812af7ebec4c146f06ee6b0c2c202d3f278cf14351b3a16a6c8d7d389b23ec7c467799f80f7261b6850d0743425571b707f2ffb5a521a18ef53cd87d344f45d2a7379372ca57bfc8031332f2ad5561e8af4542d19e59efafe6fce9ad01"}) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000900)={{&(0x7f0000000340)=""/16, 0x10}, &(0x7f00000008c0), 0x40}, 0x20) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000002c0)=0x2, &(0x7f0000000300)=0x2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*', 0x102}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) close(r6) io_setup(0x7, &(0x7f0000000140)=0x0) io_submit(r7, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r6, 0x0, 0x12f}]) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) io_getevents(r7, 0x1, 0x0, &(0x7f00000009c0), &(0x7f0000000400)={r8, r9+10000000}) ioctl$sock_ifreq(r4, 0x8914, &(0x7f00000000c0)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu=0x1}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) 13:09:48 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7e") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 340.467696][ T9812] PKCS8: Unsupported PKCS#8 version 13:09:48 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7e") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:09:49 executing program 5: mlockall(0x6) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:09:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000280)='/dev/bsg\x00', 0x101000, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000003400040204e8150bbf6e40007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814701f2cd519e078d4ffab418e4682b2aec5e4a35629ec37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0b0212c8d944f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6084d676d8ef8aa6ecc2d32e3f4ee367e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9eb02be70c4364333af9a9d91c3e41a8ec37a63f85ad8f32b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef1b84d33847999af613b71d323620d95269101b7af6d32d94957065ee3a356242cc5e171dc45e404921d9828c80b9f71ed0eee4dba09753fc711f7ba6451d63b576e81fd687b477f360a148b0deb0b0f486f449765b618955555f21cadfcd1614c9ef25fc0f5e879fdd6639c2bdb82f16bafddf496afe5571cb320ba1e8272e45fc5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') r2 = accept$ax25(r1, &(0x7f0000000040)={{0x3, @default}, [@null, @default, @default, @remote, @default, @rose, @default, @bcast]}, &(0x7f00000000c0)=0x48) fsetxattr$security_ima(r2, &(0x7f0000000100)='security.ima\x00', &(0x7f0000000380)=@v2={0x3, 0x3, 0x12, 0x80000000, 0xeb, "1312bacf82c4a0e9b25b8ae434b8935eba4a3703b269da2df868356346677dd87c034c4072ce6e865496dc7a5a5a67211ce392b9336c99514b9f556de1320d02fd1603d869e0fd2c0798a92a0988065a485ffa48c181ebb004b958fbf892dea55348dddf6640d688a17bb52d6f40d06e4fd93655b2208924ba66d6424aea9ad688b6174948b2b0ea40b1eeda102f1b694aefc79c7b90f60de680bf09678487eb6deabbd0d544b1637cbbbdd5c53d4be14c6cb9b9c29811924510f7a03d4d4c7b6e8bb856f8bc501e62da9f76d3fde1cdf9c596ba6866a73f849c93825ebe62f8afeafcc069d238cb9fb893"}, 0xf5, 0x5) syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x10080, 0x0) 13:09:49 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7e") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 341.424559][ T9812] PKCS8: Unsupported PKCS#8 version [ 341.493420][ T7887] device gretap0 left promiscuous mode [ 341.499024][ T7887] bridge0: port 3(gretap0) entered disabled state [ 341.751990][ T7887] IPVS: stopping backup sync thread 9478 ... [ 342.124103][ T7887] device bridge_slave_1 left promiscuous mode [ 342.130457][ T7887] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.182308][ T7887] device bridge_slave_0 left promiscuous mode [ 342.188509][ T7887] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.814432][ T7887] bond3 (unregistering): Released all slaves [ 342.823475][ T7887] bond2 (unregistering): Released all slaves [ 342.834316][ T7887] bond1 (unregistering): Released all slaves [ 342.895849][ T7887] device hsr_slave_0 left promiscuous mode [ 342.941748][ T7887] device hsr_slave_1 left promiscuous mode [ 343.038223][ T7887] team0 (unregistering): Port device team_slave_1 removed [ 343.048140][ T7887] team0 (unregistering): Port device team_slave_0 removed [ 343.058411][ T7887] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 343.095477][ T7887] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 343.175053][ T7887] bond0 (unregistering): Released all slaves [ 343.279155][ T9854] IPVS: ftp: loaded support on port[0] = 21 [ 343.329496][ T9854] chnl_net:caif_netlink_parms(): no params data found [ 343.394800][ T9854] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.401912][ T9854] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.409739][ T9854] device bridge_slave_0 entered promiscuous mode [ 343.420626][ T9854] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.427761][ T9854] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.438672][ T9854] device bridge_slave_1 entered promiscuous mode [ 343.456400][ T9854] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 343.470619][ T9854] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 343.489066][ T9854] team0: Port device team_slave_0 added [ 343.495847][ T9854] team0: Port device team_slave_1 added [ 343.553710][ T9854] device hsr_slave_0 entered promiscuous mode [ 343.642377][ T9854] device hsr_slave_1 entered promiscuous mode [ 343.701727][ T9854] debugfs: Directory 'hsr0' with parent '/' already present! [ 343.717559][ T9854] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.724628][ T9854] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.731894][ T9854] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.738911][ T9854] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.778577][ T9854] 8021q: adding VLAN 0 to HW filter on device bond0 [ 343.790822][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 343.799553][ T3018] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.808322][ T3018] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.821034][ T9854] 8021q: adding VLAN 0 to HW filter on device team0 [ 343.832567][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 343.840995][ T3018] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.848037][ T3018] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.873098][ T2873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 343.881461][ T2873] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.888520][ T2873] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.897211][ T2873] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 343.906269][ T2873] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 343.915279][ T2873] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 343.927129][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 343.939117][ T9854] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 343.950404][ T9854] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 343.962692][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 343.992973][ T9854] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 344.000729][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 344.011436][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:09:52 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:09:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000000201ffff00180000000000"], 0xfffffffffffffef9}}, 0x0) 13:09:52 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:09:52 executing program 3: prctl$PR_GET_DUMPABLE(0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000004c0)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r1) add_key(&(0x7f0000000a00)='asymmetric\x00\xcf\xad\x1e\xfc\xfe\x81\x9b*\t\xa6\x03F\x04\x1e\t\x00\x00\x00\x00\x00\x00\x00\x1d\x9d\xc6r\x88\xff\xd5-\xc0D-p\xd1\xa9\x99*YL>7\xbff\xbd\x8b\t\xa4\x94\xe0Uy`=\x1c\x06\xd3/\x1d\xbe\x13\xf2;/[ml\x0eN1\x0e\xf2P\x8e\x8aZ\x84\xf1\xff[\x8bP\xa9\xe5\x06O\xa49\x9f\x1f\xe9^\xa5`wgl\x8eU\x90\xe5`\xee\xab[\xe4\x8e\xc7Z\x81\xd5\xd9\xbf${\xdf&\x8b\xb6\xf4\xfb\x98]\v\xdd\xd27\x11\x1c\fG\b;\xb6\xe2\x02\n\xc4\x0ei\x8c\xba\xa7\xb0\xe1\xc1/\xd4}\xd0SC\xec\xc2\x80n\x01jY\x88\xda\x8bmFp\xfe\"\x9c\x13\xc8\f\xe7\x14\x93\x8c\x1c9~{\x8b\x8f\x83/s#9\x80\xa0\xdbEf;~L\xae5\x91(\xb0\xb8;\xcd\xf9?@\x00\xe7\x9a\r{\xb6\xa4}!l\xfa\x8cS \\~T\x1a\xa8\x8d\xcb\x81\xeb\x10\x14\x18,\x1eW\x17L\x83\xba\xf5W\xc6\x9d\xcf`v\xc6', 0x0, &(0x7f0000000440)="30580256f10cb8b56c9606987fe808d672bd136840d27c44d58e94ea51a7dfc59e92e80d9482ca7839173a8f1143a939b4fd2672693a46c08df6616dd21be3453ecf73039a20f43acbc5376139a9070ae27dd847474d1e59b2697863e6ebd80f75cadcb79366256287fca9", 0x313, r1) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000040)) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000004c0)={"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"}) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000900)={{&(0x7f0000000340)=""/16, 0x10}, &(0x7f00000008c0), 0x40}, 0x20) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000002c0)=0x2, &(0x7f0000000300)=0x2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*', 0x102}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) close(r6) io_setup(0x7, &(0x7f0000000140)=0x0) io_submit(r7, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r6, 0x0, 0x12f}]) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) io_getevents(r7, 0x1, 0x0, &(0x7f00000009c0), &(0x7f0000000400)={r8, r9+10000000}) ioctl$sock_ifreq(r4, 0x8914, &(0x7f00000000c0)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu=0x1}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) 13:09:52 executing program 2: mlockall(0x6) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:09:52 executing program 5: mlockall(0x6) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") [ 344.320563][ T9871] PKCS8: Unsupported PKCS#8 version 13:09:52 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:09:52 executing program 1: prctl$PR_GET_DUMPABLE(0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000004c0)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r1) add_key(&(0x7f0000000a00)='asymmetric\x00\xcf\xad\x1e\xfc\xfe\x81\x9b*\t\xa6\x03F\x04\x1e\t\x00\x00\x00\x00\x00\x00\x00\x1d\x9d\xc6r\x88\xff\xd5-\xc0D-p\xd1\xa9\x99*YL>7\xbff\xbd\x8b\t\xa4\x94\xe0Uy`=\x1c\x06\xd3/\x1d\xbe\x13\xf2;/[ml\x0eN1\x0e\xf2P\x8e\x8aZ\x84\xf1\xff[\x8bP\xa9\xe5\x06O\xa49\x9f\x1f\xe9^\xa5`wgl\x8eU\x90\xe5`\xee\xab[\xe4\x8e\xc7Z\x81\xd5\xd9\xbf${\xdf&\x8b\xb6\xf4\xfb\x98]\v\xdd\xd27\x11\x1c\fG\b;\xb6\xe2\x02\n\xc4\x0ei\x8c\xba\xa7\xb0\xe1\xc1/\xd4}\xd0SC\xec\xc2\x80n\x01jY\x88\xda\x8bmFp\xfe\"\x9c\x13\xc8\f\xe7\x14\x93\x8c\x1c9~{\x8b\x8f\x83/s#9\x80\xa0\xdbEf;~L\xae5\x91(\xb0\xb8;\xcd\xf9?@\x00\xe7\x9a\r{\xb6\xa4}!l\xfa\x8cS \\~T\x1a\xa8\x8d\xcb\x81\xeb\x10\x14\x18,\x1eW\x17L\x83\xba\xf5W\xc6\x9d\xcf`v\xc6', 0x0, &(0x7f0000000440)="30580256f10cb8b56c9606987fe808d672bd136840d27c44d58e94ea51a7dfc59e92e80d9482ca7839173a8f1143a939b4fd2672693a46c08df6616dd21be3453ecf73039a20f43acbc5376139a9070ae27dd847474d1e59b2697863e6ebd80f75cadcb79366256287fca9", 0x313, r1) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000040)) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000004c0)={"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"}) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000900)={{&(0x7f0000000340)=""/16, 0x10}, &(0x7f00000008c0), 0x40}, 0x20) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000002c0)=0x2, &(0x7f0000000300)=0x2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*', 0x102}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) close(r6) io_setup(0x7, &(0x7f0000000140)=0x0) io_submit(r7, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r6, 0x0, 0x12f}]) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) io_getevents(r7, 0x1, 0x0, &(0x7f00000009c0), &(0x7f0000000400)={r8, r9+10000000}) ioctl$sock_ifreq(r4, 0x8914, &(0x7f00000000c0)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu=0x1}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) [ 344.559562][ T9882] PKCS8: Unsupported PKCS#8 version 13:09:52 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:09:52 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:09:52 executing program 2: mlockall(0x6) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:09:53 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:09:53 executing program 2: mlockall(0x6) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:09:53 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:09:53 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:09:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x89c000, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000280)={&(0x7f0000000180)=[0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0], 0x3, 0x3, 0x4, 0x2}) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) unshare(0x40000000) r2 = accept(r0, 0x0, 0x0) syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) write$binfmt_elf64(r2, &(0x7f00000002c0)=ANY=[], 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0x80086601, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x110001) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r7 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[@ANYBLOB="01000134d7fe3d38417852854a61b02d1f9b37fb7c74d5125c4c5546d16b0dde70485f64e819641d0dadcf2acff9ede2545deaea82133cc5158a0e2447f6ea46597b50a64ceb7fe904ec6c7f13f92b0e296e7dc96b4fefdc62554a7c1451dfc1d417fd8b2e3a126ae4f9b40abed39c71e67dd1f02f9500"/130, @ANYRESDEC=r7], 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0xbb8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in, 0xa9}, 0x90) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000700)={0x0, 0x4}, &(0x7f0000000740)=0x8) r8 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$binfmt_aout(r8, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], 0x1) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110002) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r8, 0x2}) fremovexattr(0xffffffffffffffff, &(0x7f0000000640)=@known='com.apple.system.Security\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x10000, 0x0) 13:09:53 executing program 5: mlockall(0x6) 13:09:53 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:09:53 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:09:53 executing program 5: mlockall(0x0) 13:09:53 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x8943, &(0x7f0000000740)={'eth0\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\r\xbb?\x89\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xc3\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xef\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[]}, 0x1, 0xffffff7f0e000000, 0x0, 0xc091}, 0x4) r2 = socket(0x10, 0x800000000080002, 0x10) sendmmsg$alg(r2, &(0x7f0000000140), 0x492492492492805, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1a7b, 0x2) ioctl$UI_SET_LEDBIT(r5, 0x40045569, 0x7) [ 345.543250][ T9920] IPVS: ftp: loaded support on port[0] = 21 [ 345.699950][ T9932] virtio_net virtio1 eth0: refused to change device tx_queue_len 13:09:54 executing program 5: mlockall(0x0) 13:09:54 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:09:54 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 347.797363][ T9957] IPVS: ftp: loaded support on port[0] = 21 [ 347.897178][ T9957] chnl_net:caif_netlink_parms(): no params data found [ 347.922253][ T9957] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.929312][ T9957] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.937024][ T9957] device bridge_slave_0 entered promiscuous mode [ 347.944999][ T9957] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.952214][ T9957] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.959850][ T9957] device bridge_slave_1 entered promiscuous mode [ 347.998157][ T9957] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 348.009497][ T9957] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 348.027556][ T9957] team0: Port device team_slave_0 added [ 348.034158][ T9957] team0: Port device team_slave_1 added [ 348.083910][ T9957] device hsr_slave_0 entered promiscuous mode [ 348.132260][ T9957] device hsr_slave_1 entered promiscuous mode [ 348.231786][ T9957] debugfs: Directory 'hsr0' with parent '/' already present! [ 348.269562][ T9957] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.276690][ T9957] bridge0: port 2(bridge_slave_1) entered forwarding state [ 348.284015][ T9957] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.291199][ T9957] bridge0: port 1(bridge_slave_0) entered forwarding state [ 348.323593][ T9957] 8021q: adding VLAN 0 to HW filter on device bond0 [ 348.335560][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 348.343793][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.351638][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.360733][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 348.371032][ T7887] device bridge_slave_1 left promiscuous mode [ 348.377651][ T7887] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.432658][ T7887] device bridge_slave_0 left promiscuous mode [ 348.438869][ T7887] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.112122][ T7887] device hsr_slave_0 left promiscuous mode [ 349.152030][ T7887] device hsr_slave_1 left promiscuous mode [ 349.227716][ T7887] team0 (unregistering): Port device team_slave_1 removed [ 349.238518][ T7887] team0 (unregistering): Port device team_slave_0 removed [ 349.249115][ T7887] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 349.305708][ T7887] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 349.363670][ T7887] bond0 (unregistering): Released all slaves [ 349.466394][ T9957] 8021q: adding VLAN 0 to HW filter on device team0 [ 349.478459][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 349.487065][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 349.495454][ T7745] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.502495][ T7745] bridge0: port 1(bridge_slave_0) entered forwarding state [ 349.514420][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 349.523116][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 349.531485][ T8624] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.538529][ T8624] bridge0: port 2(bridge_slave_1) entered forwarding state [ 349.548052][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 349.562848][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 349.572224][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 349.580646][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 349.589375][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 349.597714][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 349.606474][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 349.666811][ T9957] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 349.677499][ T9957] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 349.731772][ T7683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 349.740310][ T7683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 349.748831][ T7683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 349.757433][ T7683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 349.765801][ T7683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 349.781762][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 349.789460][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 349.799668][ T9957] 8021q: adding VLAN 0 to HW filter on device batadv0 13:09:59 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000000)=""/250, 0x128b9372) 13:09:59 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) getpgid(r2) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x10000800}, 0x0) listxattr(0x0, 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x2000000, 0x28812, r3, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$EVIOCREVOKE(r3, 0x40044591, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r5, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r5, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r6) ioctl$EVIOCREVOKE(r5, 0x40044591, &(0x7f0000000300)) open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000200)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r8, 0x0, 0x0) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r10, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") dup2(r10, r9) ioctl$EVIOCREVOKE(r8, 0x40044591, &(0x7f0000000300)=0x6) open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, 0x0) r11 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r11, &(0x7f0000000300)=ANY=[], 0x6) r12 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r11, r12) ioctl$EVIOCREVOKE(r11, 0x40044591, &(0x7f0000000300)=0x6) r13 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r13, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r13, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x7ff, 0x7, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r13, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r13, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) 13:09:59 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:09:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x0, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:09:59 executing program 5: mlockall(0x0) 13:09:59 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x6080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x80) syz_open_procfs(0x0, &(0x7f0000272000)) 13:09:59 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:09:59 executing program 5: 13:09:59 executing program 3: 13:09:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x109, 0x0, 0x0, 0x800e00569) shutdown(r0, 0x0) 13:09:59 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000a80), 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x1) write$P9_RMKNOD(r0, &(0x7f00000000c0)={0x14}, 0x14) 13:09:59 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x52, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x400000, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000340)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') preadv(r3, &(0x7f0000001380)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1, 0x3fa) ioctl$KVM_ASSIGN_DEV_IRQ(r3, 0x4040ae70, &(0x7f0000000300)={0x4, 0x1, 0x7fffffff, 0x702}) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/132, 0x397) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r2, r2, 0x0, 0x24000000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/132, 0x397) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001740)) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$LOOP_CLR_FD(r2, 0x4c01) accept4$inet6(r0, 0x0, &(0x7f0000000040), 0x100000) ioctl$LOOP_SET_FD(r2, 0x4c00, r4) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0), 0x1, 0x7d4e1696091c44cc) 13:10:00 executing program 2: [ 351.837971][ T25] audit: type=1804 audit(1575378600.046:48): pid=9973 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir599793732/syzkaller.m8HpIK/60/bus" dev="sda1" ino=16785 res=1 [ 352.192259][T10034] blk_update_request: I/O error, dev loop0, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 352.203491][T10034] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 352.211934][T10034] blk_update_request: I/O error, dev loop0, sector 4 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 352.223070][T10034] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 352.231489][T10034] blk_update_request: I/O error, dev loop0, sector 8 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 352.242773][T10034] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 352.251178][T10034] blk_update_request: I/O error, dev loop0, sector 12 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 352.262445][T10034] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 352.270814][T10034] blk_update_request: I/O error, dev loop0, sector 16 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 352.282023][T10034] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 352.290382][T10034] blk_update_request: I/O error, dev loop0, sector 20 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 352.301686][T10034] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 352.310074][T10034] blk_update_request: I/O error, dev loop0, sector 24 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 352.321373][T10034] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 352.329756][T10034] blk_update_request: I/O error, dev loop0, sector 28 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 352.341346][T10034] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 352.349792][T10034] blk_update_request: I/O error, dev loop0, sector 32 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 352.361007][T10034] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 352.369392][T10034] blk_update_request: I/O error, dev loop0, sector 36 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 352.380605][T10034] Buffer I/O error on dev loop0, logical block 9, lost async page write 13:10:00 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000000440)={0x2, 0x52, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x400000, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1, 0x3fa) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000300)={0x4, 0x1, 0x7fffffff, 0x702}) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) read(0xffffffffffffffff, 0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x24000000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/132, 0x397) shutdown(0xffffffffffffffff, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001740)) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000001280)={0x1, 0x0, [{}]}) 13:10:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x0, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:00 executing program 2: 13:10:00 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:10:00 executing program 1: 13:10:00 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x52, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x400000, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000340)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') preadv(r3, &(0x7f0000001380)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1, 0x3fa) ioctl$KVM_ASSIGN_DEV_IRQ(r3, 0x4040ae70, &(0x7f0000000300)={0x4, 0x1, 0x7fffffff, 0x702}) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/132, 0x397) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r2, r2, 0x0, 0x24000000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/132, 0x397) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001740)) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$LOOP_CLR_FD(r2, 0x4c01) accept4$inet6(r0, 0x0, &(0x7f0000000040), 0x100000) ioctl$LOOP_SET_FD(r2, 0x4c00, r4) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0), 0x1, 0x7d4e1696091c44cc) 13:10:00 executing program 2: 13:10:01 executing program 1: 13:10:01 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x52, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x400000, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000340)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') preadv(r3, &(0x7f0000001380)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1, 0x3fa) ioctl$KVM_ASSIGN_DEV_IRQ(r3, 0x4040ae70, &(0x7f0000000300)={0x4, 0x1, 0x7fffffff, 0x702}) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/132, 0x397) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r2, r2, 0x0, 0x24000000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/132, 0x397) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001740)) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$LOOP_CLR_FD(r2, 0x4c01) accept4$inet6(r0, 0x0, &(0x7f0000000040), 0x100000) ioctl$LOOP_SET_FD(r2, 0x4c00, r4) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0), 0x1, 0x7d4e1696091c44cc) 13:10:01 executing program 2: 13:10:01 executing program 1: 13:10:01 executing program 2: 13:10:01 executing program 3: 13:10:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x0, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:01 executing program 1: 13:10:01 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:10:01 executing program 3: 13:10:01 executing program 2: 13:10:01 executing program 1: 13:10:01 executing program 2: 13:10:01 executing program 5: 13:10:01 executing program 3: 13:10:01 executing program 1: 13:10:02 executing program 2: 13:10:02 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in={{0x2, 0x9, @remote}}, 0x0, 0x5, 0x0, "18ce682fbbc6ae170ea7e63094e991cd820bdf11f37386827e1f07bbbf72237e9490a3363a47ba4b521b53daa3204dbb9ee74d5e55ffa46753046f5a5167007a90c90319ce30cda84e176919f7b44cd2"}, 0xd8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x2c8a3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000840)='./file0\x00', 0xd0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) fcntl$setstatus(r4, 0x4, 0x2800) sendfile(r4, r3, 0x0, 0x7ffff000) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x401, 0x2}, {0x0, 0x46dc}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6}}, 0xe8) syz_genetlink_get_family_id$SEG6(&(0x7f0000000300)='SEG6\x00') pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./file0\x00') r5 = open(0x0, 0x701480, 0x0) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000008c0)='syz0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000800)) 13:10:02 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:02 executing program 2: pipe(&(0x7f00000013c0)) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e3e3) r0 = creat(&(0x7f0000000480)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) dup(0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400545f257fffff0000deffffff00000000aa24"], 0x14}}, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYBLOB="196fb0e5f8f2005563b198a8dd350724219f65"]) 13:10:02 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 13:10:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha3-384-generic,chacha20-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0) 13:10:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/171, 0xab}, {0x0}], 0x2) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x651b259e6d327d, 0x0, 0x0, 0x800e0051a) shutdown(r1, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x0, 0x0, 0x0) shutdown(r2, 0x0) 13:10:02 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 13:10:02 executing program 1 (fault-call:0 fault-nth:0): mlockall(0x6) 13:10:02 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) getpgid(r1) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x10000800}, 0x0) listxattr(0x0, 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) ioctl$EVIOCREVOKE(r2, 0x40044591, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r4, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r4, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r5) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000300)) r6 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) r8 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r7, r8) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000300)=0x6) r9 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xffffffffffffff08) r10 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x104) write$P9_RWALK(r10, &(0x7f0000000300)=ANY=[], 0x6) r11 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r10, r11) ioctl$EVIOCREVOKE(r10, 0x40044591, &(0x7f0000000300)) r12 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r12, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r12, 0x0) r13 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r12, r13) getsockopt$inet6_IPV6_IPSEC_POLICY(r12, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) 13:10:02 executing program 2: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x8, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x501800, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f0000000080)={0x0, 0x8293, 0x2c}) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:10:03 executing program 1: mlockall(0x6) 13:10:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/fib_trie\x00') sendfile(r1, r2, 0x0, 0x7ffff000) mknod(&(0x7f0000000040)='./file0\x00', 0x100, 0x2) 13:10:03 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in={{0x2, 0x9, @remote}}, 0x0, 0x5, 0x0, "18ce682fbbc6ae170ea7e63094e991cd820bdf11f37386827e1f07bbbf72237e9490a3363a47ba4b521b53daa3204dbb9ee74d5e55ffa46753046f5a5167007a90c90319ce30cda84e176919f7b44cd2"}, 0xd8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x2c8a3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000840)='./file0\x00', 0xd0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) fcntl$setstatus(r4, 0x4, 0x2800) sendfile(r4, r3, 0x0, 0x7ffff000) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x401, 0x2}, {0x0, 0x46dc}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6}}, 0xe8) syz_genetlink_get_family_id$SEG6(&(0x7f0000000300)='SEG6\x00') pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./file0\x00') r5 = open(0x0, 0x701480, 0x0) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000008c0)='syz0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000800)) 13:10:03 executing program 1: mlockall(0x6) r0 = syz_open_dev$tty(&(0x7f0000000000)='/dev/tty1#\x00', 0x76a9, 0x40000) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x1851) 13:10:03 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:03 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 13:10:03 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in={{0x2, 0x9, @remote}}, 0x0, 0x5, 0x0, "18ce682fbbc6ae170ea7e63094e991cd820bdf11f37386827e1f07bbbf72237e9490a3363a47ba4b521b53daa3204dbb9ee74d5e55ffa46753046f5a5167007a90c90319ce30cda84e176919f7b44cd2"}, 0xd8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x2c8a3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000840)='./file0\x00', 0xd0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) fcntl$setstatus(r4, 0x4, 0x2800) sendfile(r4, r3, 0x0, 0x7ffff000) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x401, 0x2}, {0x0, 0x46dc}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6}}, 0xe8) syz_genetlink_get_family_id$SEG6(&(0x7f0000000300)='SEG6\x00') pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./file0\x00') r5 = open(0x0, 0x701480, 0x0) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000008c0)='syz0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000800)) 13:10:03 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in={{0x2, 0x9, @remote}}, 0x0, 0x5, 0x0, "18ce682fbbc6ae170ea7e63094e991cd820bdf11f37386827e1f07bbbf72237e9490a3363a47ba4b521b53daa3204dbb9ee74d5e55ffa46753046f5a5167007a90c90319ce30cda84e176919f7b44cd2"}, 0xd8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x2c8a3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000840)='./file0\x00', 0xd0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) fcntl$setstatus(r4, 0x4, 0x2800) sendfile(r4, r3, 0x0, 0x7ffff000) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x401, 0x2}, {0x0, 0x46dc}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6}}, 0xe8) syz_genetlink_get_family_id$SEG6(&(0x7f0000000300)='SEG6\x00') pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./file0\x00') r5 = open(0x0, 0x701480, 0x0) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000008c0)='syz0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000800)) 13:10:03 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) close(r3) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200000, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r4, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x4e23, 0x1, @empty, 0x401}, {0xa, 0x4e24, 0x5, @loopback, 0xfffff9a0}, 0x5, [0x8, 0x4, 0xf24, 0x7f, 0x707, 0x0, 0x101, 0x6]}, 0x5c) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r6, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r6) socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r8 = socket$unix(0x1, 0x1, 0x0) r9 = socket$unix(0x1, 0x1, 0x0) r10 = dup2(r9, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="20000000150001001b9bacc100000000020000e7", @ANYRES32=r11, @ANYBLOB="260002"], 0x3}}, 0x0) splice(r5, 0x0, r6, 0x0, 0x100000000, 0x0) r12 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r12, 0x0, 0x0, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r12, &(0x7f00000000c0)={0x2, 0x4e22, @multicast1}, 0x10) mlockall(0x6) r13 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r13, 0x0, 0xfffffffffffffff4, 0x4, &(0x7f0000000240)={0x2, 0x4e21, @rand_addr=0x8000}, 0xfffffffffffffd80) r14 = accept4$inet(r13, &(0x7f0000000100)={0x2, 0x0, @remote}, &(0x7f00000001c0)=0x10, 0x1000) readv(r14, &(0x7f0000000200)=[{&(0x7f0000000380)=""/155, 0x9b}, {&(0x7f0000000440)=""/142, 0x8e}], 0x2) socket$inet_tcp(0x2, 0x1, 0x0) [ 355.539873][T10204] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 355.684955][T10215] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 355.724179][ T25] audit: type=1804 audit(1575378603.926:49): pid=10161 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir100743109/syzkaller.YECTHT/69/bus" dev="sda1" ino=16630 res=1 [ 355.823374][ T25] audit: type=1804 audit(1575378604.016:50): pid=10161 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir100743109/syzkaller.YECTHT/69/bus" dev="sda1" ino=16630 res=1 13:10:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 355.879063][ T25] audit: type=1804 audit(1575378604.076:51): pid=10164 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir100743109/syzkaller.YECTHT/69/bus" dev="sda1" ino=16630 res=1 [ 355.925881][ T25] audit: type=1804 audit(1575378604.126:52): pid=10164 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir100743109/syzkaller.YECTHT/69/bus" dev="sda1" ino=16630 res=1 [ 355.961309][ T25] audit: type=1804 audit(1575378604.126:53): pid=10170 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir100743109/syzkaller.YECTHT/69/bus" dev="sda1" ino=16630 res=1 [ 356.035497][ T25] audit: type=1804 audit(1575378604.136:54): pid=10220 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir100743109/syzkaller.YECTHT/69/bus" dev="sda1" ino=16630 res=1 [ 356.143569][ T25] audit: type=1804 audit(1575378604.146:55): pid=10219 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir100743109/syzkaller.YECTHT/69/bus" dev="sda1" ino=16630 res=1 13:10:04 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) getpgid(r1) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x10000800}, 0x0) listxattr(0x0, 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) ioctl$EVIOCREVOKE(r2, 0x40044591, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r4, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r4, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r5) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000300)) r6 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) r8 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r7, r8) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000300)=0x6) r9 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xffffffffffffff08) r10 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x104) write$P9_RWALK(r10, &(0x7f0000000300)=ANY=[], 0x6) r11 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r10, r11) ioctl$EVIOCREVOKE(r10, 0x40044591, &(0x7f0000000300)) r12 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r12, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r12, 0x0) r13 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r12, r13) getsockopt$inet6_IPV6_IPSEC_POLICY(r12, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) 13:10:04 executing program 1: mlockall(0x4) [ 356.172667][ T25] audit: type=1804 audit(1575378604.206:56): pid=10220 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir100743109/syzkaller.YECTHT/69/bus" dev="sda1" ino=16630 res=1 13:10:04 executing program 1: r0 = gettid() sched_getaffinity(r0, 0x8, &(0x7f0000000000)) mlockall(0x6) 13:10:04 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in={{0x2, 0x9, @remote}}, 0x0, 0x5, 0x0, "18ce682fbbc6ae170ea7e63094e991cd820bdf11f37386827e1f07bbbf72237e9490a3363a47ba4b521b53daa3204dbb9ee74d5e55ffa46753046f5a5167007a90c90319ce30cda84e176919f7b44cd2"}, 0xd8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x2c8a3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000840)='./file0\x00', 0xd0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) fcntl$setstatus(r4, 0x4, 0x2800) sendfile(r4, r3, 0x0, 0x7ffff000) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x401, 0x2}, {0x0, 0x46dc}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6}}, 0xe8) syz_genetlink_get_family_id$SEG6(&(0x7f0000000300)='SEG6\x00') pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./file0\x00') r5 = open(0x0, 0x701480, 0x0) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000008c0)='syz0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000800)) 13:10:04 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 13:10:04 executing program 1: mlockall(0x1) 13:10:04 executing program 2: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 13:10:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f00000000c0)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4000000010003b0e000296f80000000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x6, @ANYBLOB="1800120008000100767469000c00020008000400e0000002ddbb8b67453d1c7c0f8b40294ee2fc0df0801d225c187119ead0bba4238afa99804d638b07292adae38e42063e81737df78194b6304d0de47c67c045b38bf2496c9e8ec2559d09ef3dd36baa54354c537193b6df248b4ff1f3e7f46466471170a1a8a6de3ba5f24de1"], 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 13:10:05 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 13:10:05 executing program 1: mlockall(0x6) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x1000, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r0, 0xc0044d15, &(0x7f0000000040)=0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$NBD_SET_FLAGS(r3, 0xab0a, 0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$NBD_DO_IT(r6, 0xab03) 13:10:06 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(0x0, 0x2, 0x0) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000200)=0x5191, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x11, &(0x7f0000000040), 0x4) getpid() r1 = getpid() sched_setscheduler(r1, 0x6, &(0x7f0000000380)=0x1) getpgid(r1) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000500)=0xfffffffc) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r4, &(0x7f0000000780)=ANY=[@ANYBLOB="15000000b37badba4c6465ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a708145a339bd57fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b9379079d0000000000000000000000000000008ce0891802ff9726e5d3e8fe2064c00c167a7c97"], 0x15) r5 = dup(r4) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/bt)\xe2\n\xac\x9d\x87\xd7\x15r\x16\x8b\x00', 0x40000, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYRESHEX, @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB="94ebf9275e8af96ea0880103700026a8ac0648f60c97be0651a082ef2ef36590ab8372a99665d8051d342a5ef31eea521bca9fcd32587a353b9943f3e70a069fbbca3f94308321a4a8bf83a2cea83460f30c8d16b3770e50dbb80a718093827d391547607baf9ac68d7bb53a15809b8a22c23c156a6f0500b9e7055813882faeb0f735afe9fb0af7ac86c00d508ca46828d39b0bd9582b6c7acb7425b8f54d9313eb7f47227f82e0aa2e945feace7d767a234248e750dbb99bb3bcd947d9bed36420da3bad0bee9bdbf22e6252dfaf90985d4ac7329ff574a69cc2c7"]) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)='trusted.overlay.nlink\x00', &(0x7f00000003c0)={'U+', 0x7}, 0x28, 0x0) syz_open_dev$swradio(&(0x7f0000000440)='/dev/swradio#\x00', 0x1, 0x2) r6 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) fcntl$getflags(r7, 0x401) accept4$tipc(r7, 0x0, &(0x7f0000000740), 0x800) geteuid() fcntl$getownex(r6, 0x10, 0x0) getresgid(0x0, &(0x7f00000008c0), &(0x7f0000000900)) lstat(0x0, &(0x7f00000009c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getresuid(&(0x7f00000002c0), &(0x7f0000000280), &(0x7f0000001780)) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000480), &(0x7f0000001880)=0xc) getgid() bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r8, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x1000002, @mcast2, 0x2}, 0x1c) 13:10:06 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f00000002c0)) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000b80)=""/226, 0xe2}, {&(0x7f0000000c80)=""/102400, 0x19000}], 0x4, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/206, 0xce}, {&(0x7f0000000900)=""/23, 0x17}, {&(0x7f0000000940)=""/106, 0x6a}], 0x3, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000074000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(r2, 0x0, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, 0x0, 0x2, 0x0) ioctl$SG_GET_COMMAND_Q(r5, 0x2270, &(0x7f0000000440)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a40)={0xffffffffffffffff, r0, 0x0, 0xa, &(0x7f0000000a00)='/dev/cec#\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f00000002c0), 0x0, r7) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000480)="1eefb954557a77592fd0dd44eee0d31dba140f59dd6d02ff7973950e2bf51008520d1452a1ef14e79a0604423917347523131356be57ad1ea74209321f2ab5590bc7c7485e215464c14e76755e571163875c45313d8355576754bf6484c41ae4fa624e94026902f848a325664132737a801b2a56eb4f36b62f27f33549245d6eaf03774ef1fd8db5c055c3daba7f235cea2b4fa95410d6aa2ae405433b47a7e4f3b186a7a30c", 0xa6, r7) request_key(&(0x7f0000000000)='big_key\x00\rdj\x92\xa3\xc4\xc1K\xa8\x04\xf0%\xba\xc1\xd4', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000300)=']\x00', r7) accept$unix(r2, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) syz_open_procfs(r6, &(0x7f0000000140)='net/netstat\x00') ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 13:10:06 executing program 1: mlockall(0x6) r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x110401) ioctl$SNDCTL_DSP_GETBLKSIZE(r0, 0xc0045004, &(0x7f0000000040)) 13:10:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f00000000c0)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4000000010003b0e000296f80000000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x6, @ANYBLOB="1800120008000100767469000c00020008000400e0000002ddbb8b67453d1c7c0f8b40294ee2fc0df0801d225c187119ead0bba4238afa99804d638b07292adae38e42063e81737df78194b6304d0de47c67c045b38bf2496c9e8ec2559d09ef3dd36baa54354c537193b6df248b4ff1f3e7f46466471170a1a8a6de3ba5f24de1"], 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 13:10:06 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x8943, &(0x7f0000000740)={'eth0\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\r\xbb?\x89\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xc3\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xef\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x8000) fremovexattr(0xffffffffffffffff, &(0x7f0000000040)=@random={'security.', '\\*<\x00'}) mlockall(0x6) [ 358.177777][T10300] virtio_net virtio1 eth0: refused to change device tx_queue_len [ 358.202762][T10300] virtio_net virtio1 eth0: refused to change device tx_queue_len 13:10:06 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = semget$private(0x0, 0x0, 0x0) semctl$GETNCNT(r1, 0x0, 0xe, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_dev$dri(0x0, 0x0, 0x0) request_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, 0x0, 0xfffffffffffffff8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000002cc0)='/dev/ubi_ctrl\x00', 0x81c00, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000180)={0x0, 0x3c}, &(0x7f00000001c0)=0x3a6) ioctl$SIOCX25GCALLUSERDATA(r2, 0x89e4, &(0x7f0000000300)={0x79, "39a799347b46fabf866bc346f627dc73d2088b83ba841cef500569f28dea9f990311be7cabcb30f7e3d2ebf20ee280aa40c3db53ac97982619cf22396cd58b6eef00f35367218cbb5bccd7a2c1ba981c7408fed51d3c2d2880b1d432ed6b5df7d0fe0ba2420733f445e70de9493ad86b93aa3a647e25c37a553372892f0cd7bc"}) r4 = socket(0x2, 0x3, 0x67) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendto$unix(r4, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x5dc, 0xd0000e0}, 0x6e) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r5, 0x6, 0x2, 0x0, &(0x7f00000000c0)) write$cgroup_type(r5, &(0x7f0000000100)='threaded\x00', 0xff34) fallocate(r5, 0x3, 0x0, 0x80000003) r6 = open(&(0x7f0000000080)='./file0\x00', 0x400, 0x0) r7 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) r8 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) times(&(0x7f0000000240)) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000040)={0x5a, 0x3f, 0x66, 0x0, 0xa901, 0xff, 0x2d, 0x0, 0x5, 0x8, 0x0, 0xfc, 0x0, 0x6, 0x0, 0xd9, 0x0, 0xe6, 0x81}) ioctl$VIDIOC_REQBUFS(r8, 0xc0585611, &(0x7f0000000080)={0x0, 0xb}) ioctl$DRM_IOCTL_FREE_BUFS(r8, 0x4010641a, &(0x7f0000000180)={0x9, &(0x7f0000000140)=[0x1f, 0xfffffffc, 0x0, 0x1, 0x1, 0x80, 0x5, 0x8f, 0x3ff]}) sendfile(r6, r7, 0x0, 0x0) ioctl$EVIOCSFF(r6, 0x40304580, &(0x7f0000000200)={0x55, 0x1000, 0x5, {0x3f, 0x3}, {0x94a1}, @period={0x0, 0xcdc, 0x0, 0x5, 0xc7, {0x5ad8, 0x6, 0x7, 0x280}, 0x2, &(0x7f00000001c0)=[0x1, 0x81]}}) 13:10:06 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x48600, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:initrc_var_run_t:s0\x00', 0x26, 0x7848cef0ac01f06b) mlockall(0x6) r1 = socket$inet_sctp(0x2, 0x0, 0x84) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8983, &(0x7f0000000580)={0x7, 'caif0\x00', {0x3}, 0x8}) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 13:10:06 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000000180)=0xe8) setuid(r0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="1500003030302e4cc74502f987c2cec6504df66e094ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445a9100621d6234555c08dc540473786cd89e9b08e3f5972fe9ca162b123e19268c89c9dd81c796f2784cb5f29261b585c3522dbf537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00000000000000000000004dcc254af8e9563b0816b513392af32d26cb3f2bd9366c1b40a4b6d8de83bafbbefc28eec27aea24ac7d49be3f854455c9afd1d4dc89ac4a1900"], 0x15) r3 = dup(r2) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@aname={'aname', 0x3d, '9p\x00'}}]}}) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) dup2(r1, r4) 13:10:06 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f00000002c0)) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000b80)=""/226, 0xe2}, {&(0x7f0000000c80)=""/102400, 0x19000}], 0x4, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/206, 0xce}, {&(0x7f0000000900)=""/23, 0x17}, {&(0x7f0000000940)=""/106, 0x6a}], 0x3, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000074000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(r2, 0x0, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, 0x0, 0x2, 0x0) ioctl$SG_GET_COMMAND_Q(r5, 0x2270, &(0x7f0000000440)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a40)={0xffffffffffffffff, r0, 0x0, 0xa, &(0x7f0000000a00)='/dev/cec#\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f00000002c0), 0x0, r7) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000480)="1eefb954557a77592fd0dd44eee0d31dba140f59dd6d02ff7973950e2bf51008520d1452a1ef14e79a0604423917347523131356be57ad1ea74209321f2ab5590bc7c7485e215464c14e76755e571163875c45313d8355576754bf6484c41ae4fa624e94026902f848a325664132737a801b2a56eb4f36b62f27f33549245d6eaf03774ef1fd8db5c055c3daba7f235cea2b4fa95410d6aa2ae405433b47a7e4f3b186a7a30c", 0xa6, r7) request_key(&(0x7f0000000000)='big_key\x00\rdj\x92\xa3\xc4\xc1K\xa8\x04\xf0%\xba\xc1\xd4', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000300)=']\x00', r7) accept$unix(r2, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) syz_open_procfs(r6, &(0x7f0000000140)='net/netstat\x00') ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 13:10:06 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 13:10:06 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 358.549294][T10314] raw_sendmsg: syz-executor.5 forgot to set AF_INET. Fix it! 13:10:06 executing program 2: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 358.645644][ T25] audit: type=1804 audit(1575378606.856:57): pid=10330 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir100743109/syzkaller.YECTHT/72/file0" dev="sda1" ino=16547 res=1 [ 358.719322][ T25] audit: type=1804 audit(1575378606.856:58): pid=10330 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir100743109/syzkaller.YECTHT/72/file0" dev="sda1" ino=16547 res=1 13:10:06 executing program 1: mlockall(0x2) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r0 = syz_open_dev$tty(&(0x7f0000000080)='/dev/tty1#\x00', 0x3, 0x10040) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = dup(r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e21, 0x9, @remote, 0x8}, 0x1c) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f00000000c0)={0x8, 0x5, 0x5, 0x8, 0xad}) socket$bt_rfcomm(0x1f, 0xa0f43d1cd8dbaaa1, 0x3) [ 358.850140][ T25] audit: type=1804 audit(1575378606.926:59): pid=10334 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir100743109/syzkaller.YECTHT/72/file0" dev="sda1" ino=16547 res=1 13:10:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) socket(0xa, 0x1, 0x0) socket(0xa, 0x4000000001, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, 0x0, 0x4000) getrandom(&(0x7f0000000400)=""/187, 0xbb, 0x3) socket$nl_route(0x10, 0x3, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000258f88)) msgsnd(r2, &(0x7f0000000340)={0x3}, 0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) msgctl$IPC_RMID(r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket(0x10, 0x2, 0x0) sendto(r3, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) 13:10:07 executing program 1: mlockall(0x6) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000000)={0x0, 0x8, 0x101f}) [ 358.921606][ T25] audit: type=1804 audit(1575378606.966:60): pid=10335 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir100743109/syzkaller.YECTHT/72/file0" dev="sda1" ino=16547 res=1 13:10:07 executing program 1: mlockall(0x6) r0 = syz_open_dev$vcsu(&(0x7f0000000000)='\x00\x00\x10\x00', 0x73e, 0xee9c3) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000040)=0x3, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x678, 0x3a0, 0x490, 0x268, 0x160, 0x160, 0x5a8, 0x5a8, 0x5a8, 0x5a8, 0x5a8, 0x6, &(0x7f0000000080), {[{{@ipv6={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1e}}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, [0xff, 0x0, 0xffffffff, 0xff], [0x100fffe00, 0x0, 0xffffff00, 0xff], 'ipddp0\x00', 'lo\x00', {}, {}, 0x6, 0x0, 0x3, 0x10}, 0x0, 0x118, 0x160, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x9}}, @common=@mh={0x28, 'mh\x00', 0x0, {0x62, 0x3, 0x9}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@loopback, @ipv4, 0xc, 0x0, 0x9e}}}, {{@uncond, 0x0, 0xc8, 0x108}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x6, 0x3ff, @ipv4=@rand_addr=0x9, 0x4e23}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@inet=@set2={0x28, 'set\x00', 0x2, {{0xda, 0x6, 0x1}}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@loopback, @ipv6=@mcast2, 0xc, 0x3a, 0x8}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @inet=@TOS={0x28, 'TOS\x00', 0x0, {0x81, 0x69}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6d8) r2 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f00000008c0)={0x2e, 0x4, 0x14, 0x5, 0x6, 0x80000001, 0x5, 0x21, 0x2}) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000800)={0x3, 0x0, [{0x1, 0x3, 0x0, 0x0, @sint={0xfff, 0x8}}, {0x8001, 0x0, 0x0, 0x0, @adapter={0x1, 0x80, 0xec, 0x0, 0x80000001}}, {0x7, 0x3, 0x0, 0x0, @adapter={0x9, 0x7, 0x9, 0x9}}]}) 13:10:07 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x74, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="dba0d379e8e9ea44"], 0x48}}, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000bc0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000000)={0x0, 0x2, &(0x7f0000000080)={&(0x7f00000001c0)={0x5c, r6, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r7}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}, {0x8, 0x3, 0x7}, {0x4}}, {0x8}}}]}}]}, 0x5c}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="dba0d379e8e9ea44"], 0x48}}, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRES32=r11, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009b89aab49ad30a704aa4f574f493a554bd08b3abf111160c5ee6746a0e9a03b182760e556f17156f9573e220fca116b02eea61fbb4a67b003702e307c1651bbcb8c09d5de2a33ac580443bdc788b1f00f9a3155816be58d23eb1733453372067f9ab361101b5271e4c24642ba2bf25dd22514b92ed55e28140c751b8d4d2a22b00"], 0x2}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r16, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="dba0d379e8e9ea44"], 0x48}}, 0x0) sendmsg$nl_route_sched(r13, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRES32=r16, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009b89aab49ad30a704aa4f574f493a554bd08b3abf111160c5ee6746a0e9a03b182760e556f17156f9573e220fca116b02eea61fbb4a67b003702e307c1651bbcb8c09d5de2a33ac580443bdc788b1f00f9a3155816be58d23eb1733453372067f9ab361101b5271e4c24642ba2bf25dd22514b92ed55e28140c751b8d4d2a22b00"], 0x2}}, 0x0) r17 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r17, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r17, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) accept$packet(r17, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_IP_XFRM_POLICY(r19, 0x0, 0x11, &(0x7f0000000240)={{{@in6, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in=@local, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000000840)=0xe8) r22 = socket$nl_route(0x10, 0x3, 0x0) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r25, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="dba0d379e8e9ea44"], 0x48}}, 0x0) sendmsg$nl_route_sched(r22, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRES32=r25, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009b89aab49ad30a704aa4f574f493a554bd08b3abf111160c5ee6746a0e9a03b182760e556f17156f9573e220fca116b02eea61fbb4a67b003702e307c1651bbcb8c09d5de2a33ac580443bdc788b1f00f9a3155816be58d23eb1733453372067f9ab361101b5271e4c24642ba2bf25dd22514b92ed55e28140c751b8d4d2a22b00"], 0x2}}, 0x0) r26 = socket$nl_route(0x10, 0x3, 0x0) r27 = socket$netlink(0x10, 0x3, 0x0) r28 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r28, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r28, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r27, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r29, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="dba0d379e8e9ea44"], 0x48}}, 0x0) sendmsg$nl_route_sched(r26, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRES32=r29, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009b89aab49ad30a704aa4f574f493a554bd08b3abf111160c5ee6746a0e9a03b182760e556f17156f9573e220fca116b02eea61fbb4a67b003702e307c1651bbcb8c09d5de2a33ac580443bdc788b1f00f9a3155816be58d23eb1733453372067f9ab361101b5271e4c24642ba2bf25dd22514b92ed55e28140c751b8d4d2a22b00"], 0x2}}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000b40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000bc0)=0x80) r31 = socket$nl_route(0x10, 0x3, 0x0) r32 = socket$netlink(0x10, 0x3, 0x0) r33 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r33, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r33, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r32, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r34, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="dba0d379e8e9ea44"], 0x48}}, 0x0) sendmsg$nl_route_sched(r31, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRES32=r34, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009b89aab49ad30a704aa4f574f493a554bd08b3abf111160c5ee6746a0e9a03b182760e556f17156f9573e220fca116b02eea61fbb4a67b003702e307c1651bbcb8c09d5de2a33ac580443bdc788b1f00f9a3155816be58d23eb1733453372067f9ab361101b5271e4c24642ba2bf25dd22514b92ed55e28140c751b8d4d2a22b00"], 0x2}}, 0x0) r35 = socket$nl_route(0x10, 0x3, 0x0) r36 = socket$netlink(0x10, 0x3, 0x0) r37 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r37, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r37, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r36, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r38, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="dba0d379e8e9ea44"], 0x48}}, 0x0) sendmsg$nl_route_sched(r35, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRES32=r38, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009b89aab49ad30a704aa4f574f493a554bd08b3abf111160c5ee6746a0e9a03b182760e556f17156f9573e220fca116b02eea61fbb4a67b003702e307c1651bbcb8c09d5de2a33ac580443bdc788b1f00f9a3155816be58d23eb1733453372067f9ab361101b5271e4c24642ba2bf25dd22514b92ed55e28140c751b8d4d2a22b00"], 0x2}}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000c40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c80)={{{@in=@loopback, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000d80)=0xe8) r41 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r41, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r41, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getpeername$packet(r41, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001100)=0x14) r43 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r43, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r43, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_IP_XFRM_POLICY(r43, 0x0, 0x11, &(0x7f0000001140)={{{@in=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000001240)=0xe8) r45 = socket$nl_route(0x10, 0x3, 0x0) r46 = socket$netlink(0x10, 0x3, 0x0) r47 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r47, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r47, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r46, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r48, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="dba0d379e8e9ea44"], 0x48}}, 0x0) sendmsg$nl_route_sched(r45, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRES32=r48, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009b89aab49ad30a704aa4f574f493a554bd08b3abf111160c5ee6746a0e9a03b182760e556f17156f9573e220fca116b02eea61fbb4a67b003702e307c1651bbcb8c09d5de2a33ac580443bdc788b1f00f9a3155816be58d23eb1733453372067f9ab361101b5271e4c24642ba2bf25dd22514b92ed55e28140c751b8d4d2a22b00"], 0x2}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001280)={{{@in6=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000001380)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000001bc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001b80)={&(0x7f00000013c0)={0x78c, r6, 0x800, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8, 0x1, r11}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}]}}, {{0x8, 0x1, r16}, {0x190, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r18}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x0, 0xdd, 0x1, 0x4}, {0x0, 0x3, 0x4, 0x81}, {0xb1, 0x9, 0x22, 0x9}]}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x20, 0x8, 0x81, 0x5}, {0x0, 0x2, 0x1, 0x3}, {0x0, 0x68, 0x2, 0x1}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x817}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r20}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r21}}}]}}, {{0x8, 0x1, r25}, {0x254, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r29}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3118}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7ff}}, {0x8, 0x6, r30}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x55}}, {0x8, 0x6, r34}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x100}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r38}, {0xfc, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r39}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r40}, {0x1f0, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r42}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xaf}}, {0x8, 0x6, r44}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r48}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x3f, 0x5, 0x20, 0xd145}, {0x0, 0x1, 0x0, 0x8001}, {0x2000, 0x7f, 0x3f, 0x6d}, {0x4, 0xc2, 0x0, 0x5}, {0x4, 0xff, 0x7f, 0x1}, {0xec44, 0x43, 0xf9}, {0x1, 0x9, 0x9, 0x1ff}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r49}}, {0x8}}}]}}]}, 0x78c}, 0x1, 0x0, 0x0, 0x20000}, 0x0) r50 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r50, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3000000010000108006c6c15a7962e0000000000", @ANYRES16, @ANYBLOB="000000000000000008001b00000000000800040000000000ab36bce7093ede91586106b0"], 0x3}}, 0x0) 13:10:07 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) socket(0xa, 0x1, 0x0) socket(0xa, 0x4000000001, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, 0x0, 0x4000) getrandom(&(0x7f0000000400)=""/187, 0xbb, 0x3) socket$nl_route(0x10, 0x3, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000258f88)) msgsnd(r2, &(0x7f0000000340)={0x3}, 0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) msgctl$IPC_RMID(r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket(0x10, 0x2, 0x0) sendto(r3, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) [ 359.228422][T10358] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 13:10:07 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 13:10:07 executing program 1: set_mempolicy(0x4001, &(0x7f0000000040)=0x6c554818, 0x5) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc3#;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9']) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") socket$inet_sctp(0x2, 0x1, 0x84) lsetxattr$security_selinux(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:bin_t:s0\x00', 0x1b, 0x1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r4 = socket$inet_sctp(0x2, 0x1, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000140)={r6}, 0xc) r7 = socket$inet(0x2, 0x0, 0x19) r8 = socket(0x10, 0x400000000080803, 0x0) write(r8, &(0x7f00000001c0)="240000001a0025f00485bc04fef7001d020b49ffed000000800328000800030001000000", 0x24) getsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@broadcast, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r9}}, {{@in6, 0x0, 0x2b}, 0x0, @in6=@loopback}}, 0xe8) r10 = syz_init_net_socket$x25(0x9, 0x5, 0x0) mknod$loop(&(0x7f0000000300)='./file0\x00', 0x4, 0x0) ioctl$SIOCX25GSUBSCRIP(r10, 0x8943, &(0x7f0000000740)={'eth0\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\r\xbb?\x89\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xc3\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xef\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0}, &(0x7f0000000580)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x5, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000300), 0x0, 0x7ff}, {&(0x7f0000000340)="6422be17943a4e37e3815703f4d2f9fdbfae70d3d7044c3e9d9eb11bdee87dc2f9ee1d3f29a061ef72f549ed777db305e4805f05ad3ffa09fc6c6d0d293dc2b637131271807d517123f7cc3ae96388aa0250ad7d6158ffe85259aed596963735b42ac03494057df8e1cc7ca694d7940defa8cf326560096f9ccd3c62172482cb6ad4e23345cbd431bf5a4773102206779094ced385eabaaa106c1a3b95f334fb3fac3cb701c9ae5cd1c59ae910924f27a302dae9b2caa7cbf9513d710e4fc118db068b9cfcace79814410332e710", 0xce, 0xffff}, {&(0x7f0000000480)="8d902f728e93aeda0177dac5e65054bf3a44d76e0a6da4630d1589c1fdaeccbdce576125ea93ff110bfa4bc9f392", 0x2e, 0x7bd4}, {&(0x7f00000008c0)="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", 0x1000, 0x3f}], 0x28400, &(0x7f00000005c0)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r9, @ANYBLOB="2c636f6465706167653d63703933362c636f6465706167653d63703934392c66696c655f756d6173de0830303030303030303030303030303030303030303030302c657569643c", @ANYRESDEC=0xee00, @ANYBLOB=',uid>', @ANYRESDEC=r11, @ANYBLOB=',\x00']) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r6, 0x0, 0x10}, 0xc) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000080)={r3, 0x81}, &(0x7f00000000c0)=0x8) mlockall(0x6) modify_ldt$write(0x1, &(0x7f0000000000)={0x2, 0x20001000, 0x400, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1}, 0x10) 13:10:07 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 359.615289][T10376] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 13:10:07 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) fstatfs(r1, &(0x7f0000000080)=""/179) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8995, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0xffffff4f) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r4 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x84003ff) accept$ax25(r4, &(0x7f00000002c0)={{0x3, @bcast}, [@rose, @default, @rose, @bcast, @default, @bcast, @default, @null]}, 0x0) ioctl$VHOST_SET_OWNER(r4, 0xaf01, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0", 0x26, 0x4000008, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f00000001c0)=0xc) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b}, 0x20084, 0x0, 0xfefffffc, 0x0, 0x0, 0x8}, r5, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x3800) r7 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r7, &(0x7f0000002780), 0x32b, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r7, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @loopback}}, 0x0, 0x4}, 0x98) 13:10:08 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x8ee4, 0x7, 0x3, "396f10511a301f8a9035089aba979ddec908f317772250acbea8f1892a16221f", 0x34324142}) mlockall(0x6) [ 359.830210][T10386] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) 13:10:08 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000040000000005f0300000600000099010000000000000000000000000000286463d662327da35fe7467311aec0091cdb4c5024d59812fd58961ace6e330935e1cdfee74a986931f5bb80930d398d46ae7644e10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001395ba4801166888568300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022422a0e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000080da7b5d8088ed6e5b0300"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:08 executing program 1: mlockall(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rt_sigpending(&(0x7f0000000040), 0x8) write$UHID_DESTROY(r2, &(0x7f0000000000), 0x4) 13:10:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x8943, &(0x7f0000000740)={'eth0\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\r\xbb?\x89\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xc3\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xef\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000280)=@ethtool_gstrings={0x1b, 0x80, 0x77, "0a50a9e5b4fee9c2d5c46aa98222bd436938b6c71de966e2ae5a1d237d8f4c0a8a8d69c45a4e42bbce0cf67859f8f358ad118ca11a6c3f7bd0de9e11ad5f1af3dfe93eb0d4a34ed538abf7eaeef62392f3bd1b8634f30ad3b38bd38f29089f9e0e85be09e2d47e91fb45d2ea1258790de550e1c2ee513c"}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x3600000000000000, 0x44, 0x261, &(0x7f0000000080)="4d50b441e692763113ef874588a8a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522", 0x0, 0x400}, 0x28) [ 359.873676][T10394] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 360.044884][T10401] virtio_net virtio1 eth0: refused to change device tx_queue_len 13:10:08 executing program 1: mlockall(0x2df0abb926ad27e3) [ 360.097625][T10406] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) [ 360.197164][T10407] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 13:10:08 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) fstatfs(r1, &(0x7f0000000080)=""/179) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8995, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0xffffff4f) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r4 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x84003ff) accept$ax25(r4, &(0x7f00000002c0)={{0x3, @bcast}, [@rose, @default, @rose, @bcast, @default, @bcast, @default, @null]}, 0x0) ioctl$VHOST_SET_OWNER(r4, 0xaf01, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0", 0x26, 0x4000008, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f00000001c0)=0xc) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b}, 0x20084, 0x0, 0xfefffffc, 0x0, 0x0, 0x8}, r5, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x3800) r7 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r7, &(0x7f0000002780), 0x32b, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r7, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @loopback}}, 0x0, 0x4}, 0x98) 13:10:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000040)) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000000)={0x1, 0x1}) mlockall(0x3288f8bccbc09de0) sync() 13:10:08 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) fstatfs(r1, &(0x7f0000000080)=""/179) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8995, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0xffffff4f) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r4 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x84003ff) accept$ax25(r4, &(0x7f00000002c0)={{0x3, @bcast}, [@rose, @default, @rose, @bcast, @default, @bcast, @default, @null]}, 0x0) ioctl$VHOST_SET_OWNER(r4, 0xaf01, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0", 0x26, 0x4000008, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f00000001c0)=0xc) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b}, 0x20084, 0x0, 0xfefffffc, 0x0, 0x0, 0x8}, r5, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x3800) r7 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r7, &(0x7f0000002780), 0x32b, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r7, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @loopback}}, 0x0, 0x4}, 0x98) [ 360.490395][T10405] virtio_net virtio1 eth0: refused to change device tx_queue_len 13:10:08 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 360.576170][T10419] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) 13:10:08 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x8943, &(0x7f0000000740)={'eth0\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\r\xbb?\x89\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xc3\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xef\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000280)=@ethtool_gstrings={0x1b, 0x80, 0x77, "0a50a9e5b4fee9c2d5c46aa98222bd436938b6c71de966e2ae5a1d237d8f4c0a8a8d69c45a4e42bbce0cf67859f8f358ad118ca11a6c3f7bd0de9e11ad5f1af3dfe93eb0d4a34ed538abf7eaeef62392f3bd1b8634f30ad3b38bd38f29089f9e0e85be09e2d47e91fb45d2ea1258790de550e1c2ee513c"}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba4a98b86dd00a86590077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf2459c7cd343b5343d8115efd90b0c48258f8dbe82e16cf8db95f5b068a9e0000000002000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e48412b580b5e5a9935ea0fc7937410724bde34fed200b9e54509a00b2a0ae57faec247d497b26f80b0685fd8"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x3600000000000000, 0x44, 0x261, &(0x7f0000000080)="4d50b441e692763113ef874588a8a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522", 0x0, 0x400}, 0x28) [ 360.696241][T10427] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) 13:10:08 executing program 1: mlockall(0x6) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x0, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000040)={0xc, 0x9, "b2f61e48e9e27ce890"}, 0xf) [ 360.762155][T10427] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 360.801049][T10423] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 360.888252][T10439] virtio_net virtio1 eth0: refused to change device tx_queue_len 13:10:09 executing program 1: 13:10:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x8943, &(0x7f0000000740)={'eth0\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\r\xbb?\x89\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xc3\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xef\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000280)=@ethtool_gstrings={0x1b, 0x80, 0x77, "0a50a9e5b4fee9c2d5c46aa98222bd436938b6c71de966e2ae5a1d237d8f4c0a8a8d69c45a4e42bbce0cf67859f8f358ad118ca11a6c3f7bd0de9e11ad5f1af3dfe93eb0d4a34ed538abf7eaeef62392f3bd1b8634f30ad3b38bd38f29089f9e0e85be09e2d47e91fb45d2ea1258790de550e1c2ee513c"}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x3600000000000000, 0x44, 0x261, &(0x7f0000000080)="4d50b441e692763113ef874588a8a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522", 0x0, 0x400}, 0x28) 13:10:09 executing program 1: gettid() mlockall(0x2) 13:10:09 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) fstatfs(r1, &(0x7f0000000080)=""/179) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8995, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0xffffff4f) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r4 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x84003ff) accept$ax25(r4, &(0x7f00000002c0)={{0x3, @bcast}, [@rose, @default, @rose, @bcast, @default, @bcast, @default, @null]}, 0x0) ioctl$VHOST_SET_OWNER(r4, 0xaf01, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0", 0x26, 0x4000008, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f00000001c0)=0xc) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b}, 0x20084, 0x0, 0xfefffffc, 0x0, 0x0, 0x8}, r5, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x3800) r7 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r7, &(0x7f0000002780), 0x32b, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r7, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @loopback}}, 0x0, 0x4}, 0x98) 13:10:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x8943, &(0x7f0000000740)={'eth0\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\r\xbb?\x89\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xc3\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xef\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000280)=@ethtool_gstrings={0x1b, 0x80, 0x77, "0a50a9e5b4fee9c2d5c46aa98222bd436938b6c71de966e2ae5a1d237d8f4c0a8a8d69c45a4e42bbce0cf67859f8f358ad118ca11a6c3f7bd0de9e11ad5f1af3dfe93eb0d4a34ed538abf7eaeef62392f3bd1b8634f30ad3b38bd38f29089f9e0e85be09e2d47e91fb45d2ea1258790de550e1c2ee513c"}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x3600000000000000, 0x44, 0x261, &(0x7f0000000080)="4d50b441e692763113ef874588a8a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522", 0x0, 0x400}, 0x28) 13:10:09 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x185101, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x80000, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000080)}, 0x10) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) mlockall(0x6) 13:10:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 361.550202][T10453] virtio_net virtio1 eth0: refused to change device tx_queue_len [ 361.577134][T10458] virtio_net virtio1 eth0: refused to change device tx_queue_len [ 361.607298][T10459] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) [ 361.674078][T10468] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 13:10:09 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 13:10:10 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) fstatfs(r1, &(0x7f0000000080)=""/179) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8995, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0xffffff4f) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r4 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x84003ff) accept$ax25(r4, &(0x7f00000002c0)={{0x3, @bcast}, [@rose, @default, @rose, @bcast, @default, @bcast, @default, @null]}, 0x0) ioctl$VHOST_SET_OWNER(r4, 0xaf01, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0", 0x26, 0x4000008, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f00000001c0)=0xc) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b}, 0x20084, 0x0, 0xfefffffc, 0x0, 0x0, 0x8}, r5, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x3800) r7 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r7, &(0x7f0000002780), 0x32b, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r7, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @loopback}}, 0x0, 0x4}, 0x98) 13:10:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x8943, &(0x7f0000000740)={'eth0\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\r\xbb?\x89\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xc3\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xef\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000280)=@ethtool_gstrings={0x1b, 0x80, 0x77, "0a50a9e5b4fee9c2d5c46aa98222bd436938b6c71de966e2ae5a1d237d8f4c0a8a8d69c45a4e42bbce0cf67859f8f358ad118ca11a6c3f7bd0de9e11ad5f1af3dfe93eb0d4a34ed538abf7eaeef62392f3bd1b8634f30ad3b38bd38f29089f9e0e85be09e2d47e91fb45d2ea1258790de550e1c2ee513c"}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x3600000000000000, 0x44, 0x261, &(0x7f0000000080)="4d50b441e692763113ef874588a8a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522", 0x0, 0x400}, 0x28) 13:10:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0x13, &(0x7f0000001f40)=ANY=[@ANYBLOB="1e00ed6c5ec5c37901243c9a9fd10969673f79c5087a59a31251a1d3dd251b90b5d2ba502bc1565200d9f97390663301d4d663e4221cab091aa7a7382862a4fba28a7180a662f0b349177987c90320159865cbeffb325aaeb94d359518fd79e95fb4a72424d2d5776c2e639fc616cdd079933c237ede2cd6e5eb0bfad1ccb2f4c7e5484d1a0e60f499d2fe0dcf16c5f6f51082aedf3dc13e86bacd"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1}, 0x800) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[], &(0x7f0000000200)=""/138, 0x0, 0x8a}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000bc0)={0x0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000008c0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000600)=[{0x0}, {&(0x7f0000000940)=""/178, 0xb2}], 0x2, &(0x7f0000000a00)=""/70, 0x46}, 0x40000000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) socketpair(0x14, 0x0, 0x7f, &(0x7f00000025c0)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002640)={&(0x7f0000002600)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x21, 0x8, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8001}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x501}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x77c}]}, 0x0, 0x9, 0x1000, &(0x7f0000000c00)=""/4096, 0x0, 0x3, [], 0x0, 0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0x0, 0xfffffffe}, 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='///0\xff', 0x1c0) 13:10:10 executing program 1: mlockall(0x6) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r3}, 0xc) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000000)={r3, 0x1000, "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"}, &(0x7f0000001040)=0x1008) 13:10:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 362.228849][T10478] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) [ 362.292239][T10480] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 13:10:10 executing program 1: socket$rxrpc(0x21, 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080), &(0x7f0000000100)=0x8) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000040)={0x4497, 0x9}) mlockall(0x6) [ 362.428359][T10495] virtio_net virtio1 eth0: refused to change device tx_queue_len 13:10:10 executing program 2: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000100)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x4) ftruncate(r1, 0x1000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200)={0x7}, &(0x7f0000000140)=0xfffffd14) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000000)={0x0, {0x1, 0x0, 0x8, 0xfffffff9}}) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 13:10:10 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 13:10:10 executing program 1: mlockall(0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x2d, 'cpu'}, {0x17cc355f17636dcf, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'memory'}, {0x2b, 'pids'}, {0x2d, 'rdma'}, {0x2b, 'rdma'}, {0x2b, 'memory'}]}, 0x35) 13:10:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f0000000500)={0x39, 0x7, 0x5, "128bfef3eac6795da9329947d2a130a77983c8356ec9702d6f3cfa1ab18cee87aa6918deda43eef895f805b98de5f90a96ab680c312a441e0e"}) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x1b1, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x18}}, 0x0) r4 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r4, 0x8943, &(0x7f0000000740)={'eth0\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\r\xbb?\x89\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xc3\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xef\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) ioctl$FS_IOC_MEASURE_VERITY(r4, 0xc0046686, &(0x7f0000000400)={0x7, 0xe4, "4322ddb61251bc2f375a711bc882990e6078e8b5d5a14eb2d46597a15a2b45e7c2f65da41f500a4efd5dac56c39e99afd25ca29a4809c7637411ad334682cfbd89553a795bb6aab960a2c503acbf3af38f72ea3d661b78edd0b5cf4b1a206da88d7fde72a6a5981b175b8c756da5152d04c9c2e8419045d0fdac1a7626b9c16b220089a151e6a5df1dbced4452fa7eb2268b8eb6d601274081583694d8d852264299cd66222b8f1d219b9dad357a6b6e6d0937fa0176584cb717c31c5b23b6ab9f6d7a3af97deab62c41947ed1db44c2fd3eec3bf1478b98404e2a2d5878e45da6330776"}) syz_genetlink_get_family_id$tipc(0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000b80)=ANY=[@ANYBLOB="fcff008000"], 0x7) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000240)="7f282b629e3a5e44467775cc0196f90b4831a33305a253b404e4cea04277de70689f262d9d5f7058ea9f84d0aa99d1fd2074a4f8bd378925b2ee7537e52b1482d156a2195be1a775c20eac3f59b69ca550407b3f42919f037b9f64857b2e78701e36d95cc236f5f139dc8b8dff7813295388df9988e59f2ecf8917e62b4d0e257a0dace714f073c1c71bddf7c15954dc55ccd62ee9cddee61ad1979639dd6e1dd0fcdc4ca5b617d653988c9c0b00000000000000000000000078fb3cbbbce97b39ee9740ed52b0f9dc7c2edf8201", 0xce, 0x0, &(0x7f0000000580)={0x77359400}) syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp6\x00') prctl$PR_SET_PTRACER(0x59616d61, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10020, 0x4}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0), 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000780)=ANY=[], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r6, r7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VIDIOC_ENUM_FRAMESIZES(r8, 0xc02c564a, &(0x7f0000000340)={0xffffffe0, 0x4c47504a, 0x1, @stepwise={0x400, 0x73ddf55, 0x7, 0x7fffffff, 0x80, 0x7}}) execve(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video1\x00', 0x2, 0x0) close(r0) 13:10:11 executing program 1: mlockall(0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000002080), 0x0) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000000000)={0x0, 0x0, 0x2080}) [ 362.904544][T10517] virtio_net virtio1 eth0: refused to change device tx_queue_len 13:10:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = add_key$keyring(0x0, &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000280)={0x0, 0x1, 0x86}, &(0x7f0000000000)=ANY=[@ANYBLOB="656e633d706b63733120686173683d7368613531322d617678000000000000000000000000000b00000000000000330c000000000000000067d400000000000000cb4e94e752a4b4c8b9550000000000005cf972dc258aac8b6b0b5a80bbdc2506f54ddab6688e097ce258f5c8f1561970dbc63208434a4d924ab1dd9e81"], &(0x7f00000003c0)="0e", &(0x7f0000000400)=""/134) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_SET_SREGS(r6, 0x4138ae84, &(0x7f0000000540)={{0xf000, 0x2, 0xf, 0x76, 0x6a, 0x9b, 0xfd, 0x8, 0x3, 0x81, 0x8, 0x1f}, {0x3000, 0x50fc1c3f55e9431, 0x9, 0x7, 0x20, 0x1, 0xff, 0x4, 0x9, 0xc1, 0x80, 0xb7}, {0x0, 0x1000, 0x10, 0x2, 0x1, 0x6, 0x9, 0x1f, 0x8, 0x40, 0xfa, 0x9}, {0x0, 0x0, 0x9, 0x1, 0x8, 0x1f, 0x3f, 0x3f, 0x0, 0xfd, 0x8, 0x38}, {0x10000, 0x3002, 0xf, 0x1, 0x40, 0x7f, 0x2, 0x5, 0x1, 0x3, 0x39, 0x20}, {0x6000, 0x1000, 0x0, 0xa4, 0x2, 0x9, 0x5, 0x6, 0x8, 0x80, 0xfd, 0x1}, {0x15000, 0xf000, 0xe, 0x3, 0x24, 0xff, 0x92, 0x1, 0xf8, 0x5, 0x6d, 0x20}, {0x10000, 0x3000, 0x21, 0x1, 0x0, 0x8, 0x1, 0x80, 0x8, 0x7, 0x3, 0x1}, {0x6000, 0x6000}, {0x2000, 0x2}, 0x40000014, 0x0, 0xf000, 0x20018, 0x1, 0x1, 0x0, [0x4, 0x8000, 0x7, 0x7]}) memfd_create(0x0, 0x0) r7 = getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) ptrace(0x4200, r7) ptrace$pokeuser(0x6, 0x0, 0x388, 0x0) lstat(0x0, &(0x7f00000004c0)) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, 0x0, {0x9}}, 0x18) open(&(0x7f0000000440)='./bus\x00', 0x141046, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x1) open(&(0x7f0000000440)='./bus\x00', 0x141046, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) ioctl$KVM_NMI(r3, 0xae9a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x22000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 13:10:11 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:11 executing program 1: mlockall(0x2) 13:10:11 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x5) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") open_by_handle_at(r1, &(0x7f0000000140)={0x673, 0x9, "0ab0f4fda4c67fae01003042aef2e0097850beae12ff92923074fb909bdb9d391d8762b6cb91030c1a695641d092033affcdaa85079f55d47b744e9194c623"}, 0x795000) ioctl$RTC_UIE_OFF(r0, 0x7004) mlockall(0x6) [ 363.216752][T10517] virtio_net virtio1 eth0: refused to change device tx_queue_len 13:10:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffff73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) r2 = socket(0x10, 0x802, 0x0) write(r2, &(0x7f0000000000)="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", 0xfc) setsockopt$inet_mreq(r2, 0x0, 0x527a9f31005bc384, 0x0, 0x35a) lsetxattr$trusted_overlay_upper(0x0, &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(r1, 0x0, 0x102af785ef8793bb) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0xffffffffffffffbd) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r4 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_S_CTRL(r4, 0xc008561c, &(0x7f0000000140)={0x4000000000980912, 0x8}) vmsplice(r4, &(0x7f0000000080)=[{&(0x7f0000000240)='\n', 0x1}], 0x1, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000180)=0x0) perf_event_open(0x0, r5, 0xe, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x1, 0x0) r6 = socket(0x10, 0x802, 0x0) write(r6, &(0x7f0000000000)="fc0000001c000705ab092506090007000aab08000400000002002593210001c000000000000000000000070000039815fa2c1ec28656aaa79bb9d95662070000bc000c00f0036c6c256f1a272fdf0d11512fd633d640007a01007a8934d07302ade01720d3d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70cec18444eb29d3ef3d92c83170e5bba4a46143ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dffff10ded6dfd19cd27b45304dc30083df150c3b880f7f0046a60467b4d57155870258a10000c880ac80", 0xdd) sendto$packet(r6, &(0x7f0000000340), 0xfffffffffffffe06, 0x57, 0x0, 0x340) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) 13:10:11 executing program 1: mlockall(0x2) r0 = semget(0x1, 0x1, 0xc8b792a456bf739d) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)=[0xc000, 0xdce, 0x1, 0x6, 0x7fff, 0x7]) [ 363.387470][T10545] netlink: 'syz-executor.3': attribute type 12 has an invalid length. 13:10:11 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f00000001c0)={'veth0_to_team\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1a}}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) mmap(&(0x7f00003ed000/0x4000)=nil, 0x4000, 0x2000006, 0x1010, r3, 0x33a8c000) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) pipe2$9p(&(0x7f0000000140), 0x4000) listen(r4, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) pause() setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 13:10:11 executing program 5: ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000040)) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) syz_open_dev$radio(0x0, 0x3, 0x2) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480), 0xc) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x100, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000580), &(0x7f0000000840)=""/243, 0xf3, &(0x7f0000000300)={&(0x7f0000000700)={'crc32c-generic\x00\x000\x16\xc7\xec\x91\x05\x0e\xbb\x7f\x11\x97\xa9\x1a\xb4\x00'}}) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) 13:10:11 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 13:10:11 executing program 1: mlockall(0x6) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0xcb) accept$ax25(r0, 0x0, &(0x7f0000000000)) 13:10:11 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000040000000005f0300000600000099010000000000000000000000000000286463d662327da35fe7467311aec0091cdb4c5024d59812fd58961ace6e330935e1cdfee74a986931f5bb80930d398d46ae7644e10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001395ba4801166888568300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022422a0e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000080da7b5d8088ed6e5b0300"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 363.616825][ C0] net_ratelimit: 3 callbacks suppressed [ 363.616846][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 363.769543][T10551] netlink: 'syz-executor.3': attribute type 12 has an invalid length. 13:10:12 executing program 1: mlockall(0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000000)=0x0) prlimit64(r3, 0x2, &(0x7f0000000040)={0x9, 0x20a}, &(0x7f0000000080)) [ 363.995240][T10581] mmap: syz-executor.1 (10581): VmData 18649088 exceed data ulimit 9. Update limits or use boot option ignore_rlimit_data. 13:10:12 executing program 5: gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCFLSH(r2, 0x540b, 0x1) sigaltstack(&(0x7f0000338000/0x3000)=nil, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xf) r3 = socket$unix(0x1, 0x5, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000100)={0x0, 0x0}) process_vm_writev(r6, &(0x7f0000000800), 0x0, &(0x7f00000000c0), 0x0, 0x0) 13:10:12 executing program 1: mlockall(0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f0000000040)={0x1}) r3 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_QUERYSTD(r3, 0x8008563f, &(0x7f0000000000)) 13:10:12 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xffff00000}, {0x80000006}]}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv \x00') 13:10:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:12 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="dba0d379e8e9ea44"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009b89aab49ad30a704aa4f574f493a554bd08b3abf111160c5ee6746a0e9a03b182760e556f17156f9573e220fca116b02eea61fbb4a67b003702e307c1651bbcb8c09d5de2a33ac580443bdc788b1f00f9a3155816be58d23eb1733453372067f9ab361101b5271e4c24642ba2bf25dd22514b92ed55e28140c751b8d4d2a22b00"], 0x2}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r5, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x5, &(0x7f0000001200)=ANY=[@ANYBLOB="18000000000000740000000000000000182900006cf3d96f3fe05d4467cc3d2f0431f551ff756e75f5c5b15c8e785e680e9e8ba99bde321ab79b704967ef9a83a65c3fd0934b6915d7bafd155a37b2bd292a7ece9807ba94bd83fa28f3a3cc24bf2b87799dede15bfd375ef9b24126", @ANYRES32=r7, @ANYBLOB="00000000000001009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], r4, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:10:12 executing program 1: mlockall(0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6(0xa, 0x80003, 0x80) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r1, 0x8943, &(0x7f0000000740)={'eth0\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\r\xbb?\x89\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xc3\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xef\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) ioctl(r1, 0x3, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = dup3(0xffffffffffffffff, r0, 0x40000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$USERIO_CMD_REGISTER(r2, &(0x7f0000000000)={0x0, 0x5}, 0x2) [ 364.351732][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 364.357525][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 364.396762][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 364.466332][T10608] virtio_net virtio1 eth0: refused to change device tx_queue_len 13:10:12 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f00000001c0)={'veth0_to_team\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1a}}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) mmap(&(0x7f00003ed000/0x4000)=nil, 0x4000, 0x2000006, 0x1010, r3, 0x33a8c000) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) pipe2$9p(&(0x7f0000000140), 0x4000) listen(r4, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) pause() setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 13:10:12 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x1000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0xd243efb8c77aaebf, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) 13:10:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TCSETXW(r6, 0x5435, &(0x7f0000000080)={0x3, 0x8, [0x7, 0x3ff, 0x40, 0x205, 0x401], 0xfffd}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:12 executing program 1: mlockall(0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f0000000000)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}) 13:10:12 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 13:10:12 executing program 3: lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)}, 0x8080) r2 = dup(0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='timers\x00') ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000100)={0x9e2e, 0x1ff, 0xfff}) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000140)={0xfffc, 0x1, 0x8, 0x5}, 0x8) socket$kcm(0x29, 0x1, 0x0) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1f, &(0x7f0000000400)="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", 0x1000) [ 364.741195][T10621] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 13:10:13 executing program 1: mlockall(0x0) [ 364.793707][T10621] BTRFS error (device loop5): superblock checksum mismatch [ 364.817546][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 364.891784][T10621] BTRFS error (device loop5): open_ctree failed 13:10:13 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000000100)='/dev/vcsu#\x00', 0x81, 0x60800) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0000, 0xfffd}, 0x0, 0xffffffffffffffff, r0, 0x0) fcntl$setstatus(r1, 0x4, 0x42400) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r4 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r7 = socket$inet_sctp(0x2, 0x1, 0x84) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f0000000140)={r9}, 0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000140)={r9, 0x7}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x19, &(0x7f0000000240)={r10, 0x4}, 0x8) ioctl$SIOCX25GSUBSCRIP(r4, 0x8943, &(0x7f0000000740)={'eth0\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\r\xbb?\x89\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xc3\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xef\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) fcntl$setpipe(r4, 0x407, 0x688) r11 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000180)="d1", 0x1, r3) keyctl$dh_compute(0x17, &(0x7f0000000040)={r11, r2, r2}, &(0x7f0000000280)=""/243, 0xf3, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) preadv(r5, &(0x7f0000000a00)=[{&(0x7f0000000440)=""/167, 0xa7}, {&(0x7f0000000600)=""/234, 0xea}, {&(0x7f0000000500)=""/155, 0x9b}, {&(0x7f0000000840)=""/211, 0xd3}, {&(0x7f0000000940)=""/188, 0xbc}], 0x5, 0x100) 13:10:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TCSETXW(r6, 0x5435, &(0x7f0000000080)={0x3, 0x8, [0x7, 0x3ff, 0x40, 0x205, 0x401], 0xfffd}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 365.019395][T10642] virtio_net virtio1 eth0: refused to change device tx_queue_len 13:10:13 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000040)=0xb1, 0x4) socket$kcm(0x29, 0x4, 0x0) mlockall(0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x40000, 0x0) 13:10:13 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:13 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x1000, 0x32) connect$bt_sco(r1, &(0x7f00000001c0)={0x1f, {0x2, 0xa5, 0x7, 0x6, 0x40, 0x5}}, 0x8) r2 = socket$inet6(0xa, 0x401000000001, 0x0) close(r2) ioctl$CAPI_INSTALLED(r1, 0x80024322) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(0xffffffffffffffff, r3) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r3, &(0x7f0000000700)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000540)={0x154, r4, 0x10, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x84, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x9, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x54f7724}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0xbc, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa1}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xcb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xdd}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xcb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}]}, 0x154}, 0x1, 0x0, 0x0, 0x1}, 0x2000c040) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/null\x00', 0x2f6043, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r5, 0x6, 0x2, &(0x7f0000000a00)={0x40, 0x6, 0x3, 0x3}, 0x6) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r6 = socket(0x0, 0x0, 0x0) r7 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) r8 = syz_open_dev$sndpcmp(&(0x7f0000000740)='/dev/snd/pcmC#D#p\x00', 0x1000, 0x40000) fspick(r8, &(0x7f0000000780)='./bus\x00', 0x0) r9 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r9, r7) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r7, 0xc01064b5, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0, 0x0], 0x2}) readv(r6, &(0x7f0000000000)=[{&(0x7f0000000300)=""/204, 0xcc}, {&(0x7f0000000440)=""/155, 0x9b}], 0x2) r10 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r10, 0x2007fff) lsetxattr$smack_xattr_label(&(0x7f0000000180)='./bus\x00', &(0x7f00000007c0)='security.SMACK64\x00', &(0x7f0000000800)={'ib\x00'}, 0x4, 0x1) r11 = syz_open_dev$mouse(&(0x7f0000000840)='/dev/input/mouse#\x00', 0x9, 0x10000) ioctl$VIDIOC_DV_TIMINGS_CAP(r11, 0xc0905664, &(0x7f0000000880)={0x0, 0x0, [], @bt={0x3, 0x50, 0x6, 0x1, 0x1e5f205d, 0xd68, 0x1}}) sendfile(r2, r10, 0x0, 0x8000fffffffe) creat(&(0x7f0000000140)='./bus\x00', 0x0) [ 365.138347][T10646] BTRFS error (device loop5): superblock checksum mismatch [ 365.181779][T10646] BTRFS error (device loop5): open_ctree failed 13:10:13 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f00000001c0)={'veth0_to_team\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1a}}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) mmap(&(0x7f00003ed000/0x4000)=nil, 0x4000, 0x2000006, 0x1010, r3, 0x33a8c000) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) pipe2$9p(&(0x7f0000000140), 0x4000) listen(r4, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) pause() setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 13:10:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TCSETXW(r6, 0x5435, &(0x7f0000000080)={0x3, 0x8, [0x7, 0x3ff, 0x40, 0x205, 0x401], 0xfffd}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 365.568296][T10665] BTRFS error (device loop5): superblock checksum mismatch [ 365.637113][T10665] BTRFS error (device loop5): open_ctree failed 13:10:13 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 13:10:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TCSETXW(r6, 0x5435, &(0x7f0000000080)={0x3, 0x8, [0x7, 0x3ff, 0x40, 0x205, 0x401], 0xfffd}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 365.727050][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 365.916782][T10678] BTRFS error (device loop5): superblock checksum mismatch [ 365.975438][T10678] BTRFS error (device loop5): open_ctree failed 13:10:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:14 executing program 1: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000000)={0x80000001, 0x200, 0x3, 0x37, 0x10000, 0xd4b}) mlockall(0x6) 13:10:14 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:14 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 366.308536][T10691] BTRFS error (device loop5): superblock checksum mismatch 13:10:14 executing program 1: mlockall(0xb) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setpriority(0x3, r0, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) accept$alg(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = accept4$netrom(r3, &(0x7f0000000040)={{}, [@bcast, @null, @null, @rose, @bcast, @null, @netrom]}, &(0x7f00000000c0)=0x48, 0x800) r5 = socket$tipc(0x1e, 0x8, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCSSOFTCAR(r6, 0x541a, &(0x7f0000000000)=0x3ff) [ 366.381793][T10691] BTRFS error (device loop5): open_ctree failed 13:10:14 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r4, r5, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKPG(r4, 0x1269, &(0x7f0000000100)={0x5, 0xd03, 0x95, &(0x7f0000000040)="538abc4847d36ac79fde668ce08aec9e3cff341cf5bbdd6d905e6b9cf79ec47c6fcbe644d2fea2090f4c72167af6cac1bcd016e6b0300e726be4b9084aae89a8ef78bb45eee976aafbc2f2961297c525b7493c928f4ab99b357c6020260afb558a6624d695be5ca12aefde545bdfc2a94a46d10e210b4ba73bf5bf34ca60c5c440cee7a4da3dea6a2394071271e46e16d035cea378"}) r5 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r5, 0x40405514, &(0x7f0000000000)={0xa, 0x0, 0x9, 0x1, 'syz0\x00', 0x80000001}) mlockall(0x4) [ 366.723084][T10710] BTRFS error (device loop5): superblock checksum mismatch 13:10:15 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) [ 366.821736][T10710] BTRFS error (device loop5): open_ctree failed 13:10:15 executing program 1: mlockall(0x1) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)) r0 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x8000) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f00000001c0)={0x0, &(0x7f0000000440)=""/228}) 13:10:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 367.214471][T10732] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop3 [ 367.259201][T10731] BTRFS error (device loop5): superblock checksum mismatch 13:10:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 367.374670][T10731] BTRFS error (device loop5): open_ctree failed 13:10:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 367.668997][T10747] BTRFS error (device loop3): superblock checksum mismatch 13:10:16 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 367.751765][T10747] BTRFS error (device loop3): open_ctree failed [ 367.771589][T10752] BTRFS error (device loop5): superblock checksum mismatch 13:10:16 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) [ 367.916741][T10752] BTRFS error (device loop5): open_ctree failed 13:10:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 368.125092][T10769] BTRFS error (device loop3): superblock checksum mismatch [ 368.191732][T10769] BTRFS error (device loop3): open_ctree failed 13:10:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 368.296054][T10775] BTRFS error (device loop5): superblock checksum mismatch [ 368.361822][T10775] BTRFS error (device loop5): open_ctree failed 13:10:16 executing program 1: ioctl$IMGETDEVINFO(0xffffffffffffffff, 0x80044944, &(0x7f0000000000)={0x100}) mlockall(0x6) 13:10:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r4, r5, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 368.512242][T10782] BTRFS error (device loop2): superblock checksum mismatch [ 368.532799][T10786] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop3 13:10:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:16 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$eventfd(r2, &(0x7f0000000000), 0x8) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000040)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000380)) mlockall(0x6) [ 368.676092][T10782] BTRFS error (device loop2): open_ctree failed 13:10:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 368.769657][T10795] BTRFS error (device loop5): superblock checksum mismatch 13:10:17 executing program 4: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d3c62422ea019a4b7eef7808f4c1e4ca85") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 13:10:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 368.876736][T10802] IPVS: ftp: loaded support on port[0] = 21 [ 368.883042][T10795] BTRFS error (device loop5): open_ctree failed [ 368.892212][T10805] BTRFS error (device loop3): superblock checksum mismatch [ 368.991771][T10805] BTRFS error (device loop3): open_ctree failed 13:10:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") fcntl$dupfd(r1, 0x0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 369.141335][T10814] BTRFS error (device loop2): superblock checksum mismatch 13:10:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 369.241732][T10814] BTRFS error (device loop2): open_ctree failed [ 369.333639][T10825] BTRFS error (device loop5): superblock checksum mismatch 13:10:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 369.398943][T10831] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop3 13:10:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 369.521833][T10825] BTRFS error (device loop5): open_ctree failed 13:10:17 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 369.605681][T10836] BTRFS error (device loop2): superblock checksum mismatch [ 369.656937][T10836] BTRFS error (device loop2): open_ctree failed 13:10:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 369.773216][T10845] BTRFS error (device loop3): superblock checksum mismatch 13:10:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 369.822841][T10845] BTRFS error (device loop3): open_ctree failed [ 369.878452][T10809] IPVS: ftp: loaded support on port[0] = 21 [ 369.941067][T10850] BTRFS error (device loop5): superblock checksum mismatch [ 370.031772][T10850] BTRFS error (device loop5): open_ctree failed 13:10:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 370.075063][T10857] BTRFS error (device loop2): superblock checksum mismatch [ 370.151933][T10857] BTRFS error (device loop2): open_ctree failed [ 370.245484][T10864] BTRFS error (device loop3): superblock checksum mismatch [ 370.325682][T10864] BTRFS error (device loop3): open_ctree failed 13:10:18 executing program 1: 13:10:18 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 370.607549][T10882] BTRFS error (device loop3): superblock checksum mismatch [ 370.632284][T10883] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop5 13:10:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 370.732164][T10882] BTRFS error (device loop3): open_ctree failed 13:10:19 executing program 1: ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, &(0x7f0000000000)={0x0, 0x0, 0x101, 0x4, {0xff, 0x7, 0x1, 0x1}}) mlockall(0x6) [ 370.809921][T10881] BTRFS error (device loop2): superblock checksum mismatch 13:10:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") fcntl$dupfd(r1, 0x0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 370.901816][T10881] BTRFS error (device loop2): open_ctree failed 13:10:19 executing program 1: mlockall(0x4) [ 371.036691][T10900] BTRFS error (device loop5): superblock checksum mismatch 13:10:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 371.152168][T10900] BTRFS error (device loop5): open_ctree failed [ 371.182888][T10904] BTRFS error (device loop3): superblock checksum mismatch 13:10:19 executing program 1: mlockall(0x6) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") fstatfs(r3, &(0x7f0000000140)=""/105) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000100)={0x60, 0x10, 0x485, 0xb43, 0xf7, 0x54, &(0x7f0000000000)="a8b3155432b48c70ea9d50c4dad93c082ba61b7ddc8a1b48b9976d13d59877e04d4ad85b0837c57da7b5b1cfe8b8e063afb2736879a5f21319b8bd4fdb50e3cd1e72aa0b13afd7f53aa62c8d599a33dba29e027a8699be9133fb414d901183e490f52a4fd04d89566692c41a67e7343306bea89b5e42b0e0d1ba631700ba92fe27a8eddce18bea3f3570bf3e2f3f3f15d2a4e7c60ea4db288cc233ef3ed39fce44f7e4c9f220b323b4d9082999d651cefac6cdc9a074452895dc6a0398a0596aed5ae0eb47c837b01e037434f77bb53ad26dc9f8b9204a8b8f7b9a12e16f5ac2a00327b00b29edc278920e71f182d0ebc5f5160cd531f7"}) [ 371.266244][T10904] BTRFS error (device loop3): open_ctree failed 13:10:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 371.473590][T10919] BTRFS error (device loop2): superblock checksum mismatch 13:10:19 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:19 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 371.611731][T10919] BTRFS error (device loop2): open_ctree failed 13:10:19 executing program 1: mlockall(0x6) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0xa9, "abfba7c59eda3be25a02df9969caafad4ee692e031b2c248430d56a3b8e075689ad8b03fc159422422bd96df6d3646e4d8a9b9a5c2998907a40efc6800e5fca16160f6382034b90f3aed82b962b66152da0df9f5b0bf7fd4b8a84cc94e8d1536385b1f9b6bfdde0837de9e3c44055c67b376c84e43187c39d974dcd78bf6d767e48ef68ec32e6c8e356a538c07ae1fec6ad923546f77e1d645162f64248c3a84d5138f3c4d1903c370"}, &(0x7f00000002c0)=0xb1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000340)={r1, 0x15, 0x2, [0xf4, 0x57]}, &(0x7f0000000380)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$cgroup_ro(r4, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) r6 = socket$inet(0x2, 0x0, 0x19) r7 = socket(0x10, 0x400000000080803, 0x0) write(r7, &(0x7f00000001c0)="240000001a0025f00485bc04fef7001d020b49ffed000000800328000800030001000000", 0x24) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@broadcast, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8}}, {{@in6, 0x0, 0x2b}, 0x0, @in6=@loopback}}, 0xe8) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r5, &(0x7f0000000100)={0xa0, 0x19, 0x2, {0x300, {0x33, 0x2, 0x1}, 0x7da5b5fa0f7f0779, r8, r9, 0x80, 0x3d49, 0x0, 0x7, 0x2, 0x6, 0x40, 0x4, 0x80000000, 0x100000001, 0x10001, 0x6, 0x1, 0x400}}, 0xa0) [ 371.672548][T10927] BTRFS error (device loop3): superblock checksum mismatch [ 371.771762][T10927] BTRFS error (device loop3): open_ctree failed [ 371.788222][T10932] BTRFS error (device loop5): superblock checksum mismatch 13:10:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") fcntl$dupfd(r1, 0x0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 371.891796][T10932] BTRFS error (device loop5): open_ctree failed 13:10:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:20 executing program 1: mlockall(0x6) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x68000, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000040)={'vxcan1\x00', 0xb4a3868, 0xa025}) 13:10:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 372.093128][T10953] BTRFS error (device loop3): superblock checksum mismatch [ 372.175015][T10958] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop2 13:10:20 executing program 1: mlockall(0x6) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x408000, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xaeb2) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r4, 0x3) 13:10:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") fcntl$dupfd(r1, 0x0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 372.361760][T10953] BTRFS error (device loop3): open_ctree failed 13:10:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 372.491815][T10968] BTRFS error (device loop5): superblock checksum mismatch 13:10:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:20 executing program 1: mlockall(0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r2, 0x5380) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$tun(r3, &(0x7f0000000040)={@val={0x0, 0x200}, @void, @eth={@remote, @local, [], {@canfd={0xd, {{0x2}, 0x13, 0x1, 0x0, 0x0, "41ba1665f43a69cb22776eb5697a3e357533392c4161c2537f254909cf7ae4a91f1de5be187272674e93ce728e4d46763aa3ae3fb1d220842987b799f2042147"}}}}}, 0x5a) [ 372.631776][T10968] BTRFS error (device loop5): open_ctree failed [ 372.638587][T10979] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop4 13:10:20 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 372.671955][T10980] BTRFS error (device loop2): superblock checksum mismatch 13:10:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 372.781771][T10980] BTRFS error (device loop2): open_ctree failed 13:10:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000000)={0x793, 0x9, 0xf82, 0x0, 0x0, [], [], [], 0x101, 0xa9}) mlockall(0x6) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000140)) [ 372.897326][T10994] BTRFS error (device loop3): superblock checksum mismatch [ 372.981825][T10994] BTRFS error (device loop3): open_ctree failed [ 372.998265][T10998] BTRFS error (device loop5): superblock checksum mismatch 13:10:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") fcntl$dupfd(r1, 0x0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 373.101798][T10998] BTRFS error (device loop5): open_ctree failed 13:10:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 373.178091][T11009] BTRFS error (device loop4): superblock checksum mismatch 13:10:21 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x5b) mlockall(0x6) 13:10:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 373.281749][T11009] BTRFS error (device loop4): open_ctree failed [ 373.366235][T11015] BTRFS error (device loop2): superblock checksum mismatch [ 373.391194][T11020] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop3 13:10:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 373.481731][T11015] BTRFS error (device loop2): open_ctree failed 13:10:21 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x10000, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000040)={0xe, 0x800, 0x1ff}) mlockall(0x6) [ 373.661134][T11030] BTRFS error (device loop5): superblock checksum mismatch 13:10:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:22 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 373.781763][T11030] BTRFS error (device loop5): open_ctree failed [ 373.789407][T11040] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop3 [ 373.816507][T11038] BTRFS error (device loop4): superblock checksum mismatch 13:10:22 executing program 1: r0 = socket(0x8, 0x5, 0x20) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000000)={0x0, 0x6, 0x7}, 0x8) mlockall(0x6) [ 373.996853][T11038] BTRFS error (device loop4): open_ctree failed 13:10:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 374.110214][T11054] BTRFS error (device loop2): superblock checksum mismatch 13:10:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x280, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_GET_LOW_DMA(r2, 0x227a, &(0x7f0000000000)) 13:10:22 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000040000000005f0300000600000099010000000000000000000000000000286463d662327da35fe7467311aec0091cdb4c5024d59812fd58961ace6e330935e1cdfee74a986931f5bb80930d398d46ae7644e10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001395ba4801166888568300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022422a0e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000080da7b5d8088ed6e5b0300"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 374.243702][T11054] BTRFS error (device loop2): open_ctree failed 13:10:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:22 executing program 1: mlockall(0x6) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r1 = getegid() r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r2, 0x8943, &(0x7f0000000740)={'eth0\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\r\xbb?\x89\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xc3\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xef\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) r3 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r4 = io_uring_setup(0x84e, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3, 0x63}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2, r2, r3, r4, r2, r5, r2]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x78}, {&(0x7f0000000ec0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001080)=[{&(0x7f0000000f40)="62d9b9d62ee09936fce881b2550fdc2981e99c581a741e243d7b763d190c717200238d3de1a1ed4149f4604efd5c917eb4f32db14eb5cfdd73c37282c004d5b3ed9942ee14657bdf6224d8eb6b9958612d3cf0a4c4e3f10922e8c6de354421403c2d01b2b7e6fa53ffa7210c8d0b5bcaa7f376d26f49fcef2357b4d7be156eafb98ffd", 0x83}, {0x0}], 0x2, &(0x7f0000000180)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18, 0x40044}, {0x0, 0x0, 0x0}], 0x3, 0x20000000) chown(&(0x7f0000000000)='./file0\x00', r0, r1) r6 = dup(0xffffffffffffffff) getsockopt$sock_timeval(r6, 0x1, 0x42, &(0x7f0000000100), &(0x7f0000000140)=0x10) 13:10:22 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 374.441250][T11074] BTRFS error (device loop3): superblock checksum mismatch [ 374.455828][T11071] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop5 13:10:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 374.561968][T11074] BTRFS error (device loop3): open_ctree failed [ 374.583306][T11088] virtio_net virtio1 eth0: refused to change device tx_queue_len [ 374.644356][T11083] BTRFS error (device loop4): superblock checksum mismatch 13:10:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 374.735320][T11083] BTRFS error (device loop4): open_ctree failed [ 374.756530][T11092] BTRFS error (device loop2): superblock checksum mismatch 13:10:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffdfe, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) r5 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r5, 0x8943, &(0x7f0000000740)={'eth0\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\r\xbb?\x89\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xc3\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xef\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000100)=0x0) ptrace$setregs(0xf, r6, 0x6, &(0x7f0000000280)="45c24af4a4ce5bc280c01cda3c737588b57aefedaa3d93e2b55064be5f2434ed9aa764ba81c05e8e1e2c94c6bb861a9006938ad6a11a9bdc6b1cd8dd46abf6262c267a717f09606737608de5dcdb9535e1beb0632ac80ffa820171f32eb477de77b59ab6d3b310f8a1cad8fdbc36ca670cba0ef0617ce7d3ea9511a1bd2f143a646fbba26afe010a304ab647d958610ce7ce00726a9b24c35834effeb53b285496bbc80f3160e63449d83b7eb2aafff990b967c76e95fa6af3403e5c2d851a2d8edbb667e08ec4feb21d40639830a6d308177fceba07d269802ac2c0d0") ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$evdev(0xffffffffffffffff, &(0x7f0000000080)=[{}, {{0x0, 0x2710}}, {{0x0, 0x2710}}, {{0x0, 0x7530}, 0x5}], 0x60) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000000)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f0000000040)="0f01c92e0f00106626dd7e0066b88c000f00d0c4c301688079670000bdb97b080000b8b1bae9baba000000000f304366b881008ed00f01c966b807018ec0", 0x3e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) mlockall(0x6) 13:10:23 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 374.851793][T11092] BTRFS error (device loop2): open_ctree failed 13:10:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 374.978787][T11104] BTRFS error (device loop5): superblock checksum mismatch [ 375.020757][T11108] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop3 13:10:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 375.124655][T11115] virtio_net virtio1 eth0: refused to change device tx_queue_len [ 375.191866][T11104] BTRFS error (device loop5): open_ctree failed 13:10:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 375.272523][T11124] BTRFS error (device loop4): superblock checksum mismatch [ 375.297906][T11128] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop2 13:10:23 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 375.411783][T11124] BTRFS error (device loop4): open_ctree failed 13:10:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:23 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 375.588717][T11143] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop5 [ 375.607638][T11137] BTRFS error (device loop3): superblock checksum mismatch 13:10:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 375.781765][T11137] BTRFS error (device loop3): open_ctree failed 13:10:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 375.935171][T11156] BTRFS error (device loop2): superblock checksum mismatch 13:10:24 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 375.985359][T11164] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop4 13:10:24 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$alg(r0, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e21, @multicast2}, {0x60c, @local}, 0x50, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'veth1_to_bridge\x00'}) ioctl$SIOCX25GSUBSCRIP(r1, 0x8943, &(0x7f0000000740)={'eth0\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\r\xbb?\x89\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xc3\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xef\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000000)) 13:10:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 376.181817][T11156] BTRFS error (device loop2): open_ctree failed [ 376.231728][T11177] virtio_net virtio1 eth0: refused to change device tx_queue_len 13:10:24 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 376.321791][T11177] virtio_net virtio1 eth0: refused to change device tx_queue_len [ 376.330066][T11180] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop5 [ 376.346542][T11179] BTRFS error (device loop3): superblock checksum mismatch 13:10:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:24 executing program 1: mlockall(0x2) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x6433e498cff385fc, 0x0) fremovexattr(r0, &(0x7f0000000080)=@random={'osx.', '/dev/uhid\x00'}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bic\x00', 0x4) [ 376.552011][T11179] BTRFS error (device loop3): open_ctree failed 13:10:24 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 376.615204][T11192] BTRFS error (device loop4): superblock checksum mismatch [ 376.622626][T11200] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop2 13:10:24 executing program 1: mlockall(0x3) r0 = shmget(0x1, 0x1000, 0x2, &(0x7f0000fff000/0x1000)=nil) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x10) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0xb) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/238) [ 376.781825][T11192] BTRFS error (device loop4): open_ctree failed 13:10:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:25 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 376.902856][T11208] BTRFS error (device loop5): superblock checksum mismatch [ 376.944732][T11208] BTRFS error (device loop5): open_ctree failed 13:10:25 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040), 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 377.083395][T11221] BTRFS error (device loop2): superblock checksum mismatch [ 377.131906][T11223] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop3 13:10:25 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 377.291736][T11221] BTRFS error (device loop2): open_ctree failed [ 377.373419][T11233] BTRFS error (device loop4): superblock checksum mismatch 13:10:25 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040), 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:25 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 377.511738][T11233] BTRFS error (device loop4): open_ctree failed [ 377.539746][T11239] BTRFS error (device loop5): superblock checksum mismatch [ 377.621839][T11239] BTRFS error (device loop5): open_ctree failed 13:10:25 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040), 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 377.714119][T11251] BTRFS error (device loop3): superblock checksum mismatch [ 377.748772][T11255] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop2 13:10:26 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 377.891812][T11251] BTRFS error (device loop3): open_ctree failed [ 377.969704][T11263] BTRFS error (device loop4): superblock checksum mismatch [ 378.041864][T11263] BTRFS error (device loop4): open_ctree failed [ 378.164118][T11278] BTRFS error (device loop5): superblock checksum mismatch 13:10:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) mlockall(0x0) r3 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'U-', 0x6305}, 0x28, 0x2) 13:10:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:26 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000040000000005f0300000600000099010000000000000000000000000000286463d662327da35fe7467311aec0091cdb4c5024d59812fd58961ace6e330935e1cdfee74a986931f5bb80930d398d46ae7644e10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001395ba4801166888568300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022422a0e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000080da7b5d8088ed6e5b0300"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:26 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:26 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 378.268777][T11278] BTRFS error (device loop5): open_ctree failed 13:10:26 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 378.473791][T11301] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop4 [ 378.487933][T11300] BTRFS error (device loop3): superblock checksum mismatch 13:10:26 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 378.542634][T11299] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop2 [ 378.681996][T11300] BTRFS error (device loop3): open_ctree failed 13:10:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") fcntl$dupfd(r1, 0x0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 378.749111][T11313] BTRFS error (device loop5): superblock checksum mismatch 13:10:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000000)=0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x200000, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf160000f0ff0000b7070000010000004870000000000000bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000340)=[@mss={0x2, 0x29ba}, @window={0x3, 0x5, 0xffff}, @sack_perm, @timestamp, @timestamp, @window={0x3, 0xfe01, 0x2}, @sack_perm, @window={0x3, 0x3f80, 0x5}], 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r5, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r6}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r3, r4, 0x0, 0x11, &(0x7f0000000080)='posix_acl_access\x00', r6}, 0x30) mlockall(0x6) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, &(0x7f0000000100), &(0x7f00000002c0)=0xc) [ 378.847678][T11313] BTRFS error (device loop5): open_ctree failed 13:10:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000040000000005f0300000600000099010000000000000000000000000000286463d662327da35fe7467311aec0091cdb4c5024d59812fd58961ace6e330935e1cdfee74a986931f5bb80930d398d46ae7644e10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001395ba4801166888568300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022422a0e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000080da7b5d8088ed6e5b0300"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:27 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 379.002571][T11332] BTRFS error (device loop4): superblock checksum mismatch 13:10:27 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 379.085495][T11332] BTRFS error (device loop4): open_ctree failed 13:10:27 executing program 1: mlockall(0xcc23d5edcb50cfee) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0xef4040203d378f01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r3, 0x40045542, &(0x7f0000000080)=0x7) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@empty, @in=@multicast2}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000040)=0xe8) [ 379.140882][T11337] BTRFS error (device loop2): superblock checksum mismatch 13:10:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 379.211743][T11337] BTRFS error (device loop2): open_ctree failed 13:10:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 379.345413][T11353] BTRFS error (device loop3): superblock checksum mismatch 13:10:27 executing program 1: mlockall(0xfe17ce617bfb0ff6) 13:10:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 379.433662][T11353] BTRFS error (device loop3): open_ctree failed [ 379.453501][T11364] BTRFS error (device loop5): superblock checksum mismatch 13:10:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 379.571788][T11364] BTRFS error (device loop5): open_ctree failed [ 379.586016][T11371] BTRFS error (device loop4): superblock checksum mismatch 13:10:27 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:27 executing program 1: clock_gettime(0x2, &(0x7f0000000000)) 13:10:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 379.741743][T11371] BTRFS error (device loop4): open_ctree failed [ 379.772355][T11383] BTRFS error (device loop2): superblock checksum mismatch 13:10:28 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 379.871768][T11383] BTRFS error (device loop2): open_ctree failed [ 379.885321][T11391] BTRFS error (device loop3): superblock checksum mismatch 13:10:28 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000040000000005f0300000600000099010000000000000000000000000000286463d662327da35fe7467311aec0091cdb4c5024d59812fd58961ace6e330935e1cdfee74a986931f5bb80930d398d46ae7644e10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001395ba4801166888568300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022422a0e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000080da7b5d8088ed6e5b0300"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 380.011810][T11391] BTRFS error (device loop3): open_ctree failed [ 380.044299][T11406] BTRFS error (device loop5): superblock checksum mismatch 13:10:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:28 executing program 1: mlockall(0x6) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x800000008001, &(0x7f00000001c0)="0805b5055e0bcfe8474071") socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000080)=0x1, &(0x7f00000000c0)=0x4) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000140)={r2, 0x0, 0x588960ca42faa9b4}, 0xc) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)={r2, 0x2}, &(0x7f0000000040)=0x8) 13:10:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 380.162174][T11406] BTRFS error (device loop5): open_ctree failed 13:10:28 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 380.310966][T11421] BTRFS error (device loop2): superblock checksum mismatch 13:10:28 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:28 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0xffffffffffffd0bb, 0x40) r1 = open(&(0x7f0000000100)='./file0\x00', 0x4000, 0x157) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000280)={0x1, 0x2, 0x1000, 0x2a, &(0x7f0000000140)="126572946a5b2172d78d5c1869633d380f86d880194a78685816b6b0a7419fdf9f155dd9ac0d7ec0a461", 0x4c, 0x0, &(0x7f0000000200)="32bd0a2c21c4f6bdd99c8d29472a923c24eeb534331b26c61e2d8908ab6f19d644d92ba08ac043c95e377271c17648982259a9df337934a4d147989ed5e7199445b19ec9833cc511b09c8108"}) accept$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x9, 0xe0, 0x3f, 0xde, 0x7f, 0x6, 0x81, 0x6, 0x1, 0x5, 0x2}, 0xb) mlockall(0x6) r3 = socket$inet(0x2, 0x0, 0x19) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f00000001c0)="240000001a0025f00485bc04fef7001d020b49ffed000000800328000800030001000000", 0x24) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@broadcast, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5}}, {{@in6, 0x0, 0x2b}, 0x0, @in6=@loopback}}, 0xe8) mount$9p_unix(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x40000, &(0x7f0000000380)={'trans=unix,', {[{@aname={'aname'}}, {@cache_loose='cache=loose'}, {@aname={'aname', 0x3d, '/dev/vcsa#\x00'}}], [{@permit_directio='permit_directio'}, {@appraise_type='appraise_type=imasig'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '(,+mime_typemime_type\x11-ppp0^vmnet1'}}, {@uid_gt={'uid>', r5}}]}}) 13:10:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 380.445409][T11421] BTRFS error (device loop2): open_ctree failed 13:10:28 executing program 1: mlockall(0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000180)={0xa30000, 0xf9a, 0x6, [], &(0x7f0000000140)={0x9c090c, 0x68, [], @string=&(0x7f00000000c0)=0x3f}}) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x400, 0x0) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f00000002c0)) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000001}, @in6={0xa, 0x4e21, 0x3, @mcast1, 0x7}], 0x38) socket$inet6(0xa, 0x0, 0x5) [ 380.616457][T11432] BTRFS error (device loop3): superblock checksum mismatch 13:10:28 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 380.721785][T11432] BTRFS error (device loop3): open_ctree failed [ 380.749663][T11448] BTRFS error (device loop5): superblock checksum mismatch 13:10:29 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1400, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@initdev, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80a4800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="300000002e00080027bd7025000000ea00000000", @ANYRES32=r2, @ANYBLOB="0e000a000a007f1a0008000f0084000000000000"], 0x30}, 0x1, 0x0, 0x0, 0x4008004}, 0x1000) [ 380.822234][T11448] BTRFS error (device loop5): open_ctree failed [ 380.973206][T11463] BTRFS error (device loop2): superblock checksum mismatch 13:10:29 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:29 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:29 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 381.131807][T11463] BTRFS error (device loop2): open_ctree failed 13:10:29 executing program 1: mlockall(0x6) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'\ayz', 0x2}, &(0x7f0000000080)="4d874ef37eefd51e86fa387e8380d3c50715cc0308982d0667bc26072511481420c4362c2b9fb3406d1edb71af5bde9c18b33c3409fa06e58c4c38f58802b5d6514d", 0x42, r0) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_keyring_id(0x0, r2, 0x0) keyctl$link(0x8, r1, r2) [ 381.253553][T11482] BTRFS error (device loop3): superblock checksum mismatch [ 381.320143][T11482] BTRFS error (device loop3): open_ctree failed 13:10:29 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 381.375614][T11493] BTRFS error (device loop5): superblock checksum mismatch 13:10:29 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x31e) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x3d, "9eb32d5dd3e6e688f95b38f8b852a0bbf46e097b33e4c544207e3afcc0497049e07c7dacba6acd0761ee0cc710a1ea1137bdf01934eae6546d1a99b4e3"}, &(0x7f0000000080)=0x45) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000000c0)={r2, 0x8d, "8bcdd954f66f1be77b391d358773f8abd5012b5a3c259e3551ba4aa760d328893b42376b7f4ad69bfe954a9328308c92acaa80a1bdf38103429e412af3c50229abb21834060c5b7b7dd1c8b6f0be184a4409192bdf99e4f27b1d67b1e3d6f4da1a4e9ce48e12c9d3e1bc920dbc6c5c007b8d9dd2ad5fb5f37412f48cb9dff2d94b73b019728de2b5860f414abb"}, &(0x7f0000000180)=0x95) mlockall(0x6) [ 381.441883][T11493] BTRFS error (device loop5): open_ctree failed 13:10:29 executing program 3: socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 381.574611][T11506] BTRFS error (device loop2): superblock checksum mismatch 13:10:29 executing program 5: socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 381.647510][T11512] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop3 13:10:29 executing program 1: mlockall(0x1) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2101, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/133) 13:10:30 executing program 3: socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 381.761488][T11506] BTRFS error (device loop2): open_ctree failed [ 381.871796][T11517] BTRFS error (device loop5): superblock checksum mismatch 13:10:30 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 381.932209][T11517] BTRFS error (device loop5): open_ctree failed [ 381.966884][T11526] BTRFS error (device loop3): superblock checksum mismatch [ 382.052682][T11526] BTRFS error (device loop3): open_ctree failed [ 382.201218][T11536] BTRFS error (device loop2): superblock checksum mismatch 13:10:30 executing program 5: socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:30 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:30 executing program 4: socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:30 executing program 3: socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 382.351790][T11536] BTRFS error (device loop2): open_ctree failed [ 382.427331][T11547] BTRFS error (device loop5): superblock checksum mismatch 13:10:30 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 382.491769][T11547] BTRFS error (device loop5): open_ctree failed [ 382.519086][T11553] BTRFS error (device loop3): superblock checksum mismatch [ 382.519208][T11522] QAT: Invalid ioctl 13:10:30 executing program 5: socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 382.571853][T11554] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop4 [ 382.631995][T11553] BTRFS error (device loop3): open_ctree failed [ 382.667269][T11563] QAT: Invalid ioctl 13:10:31 executing program 4: socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 382.823863][T11572] BTRFS error (device loop2): superblock checksum mismatch [ 382.831360][T11574] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop5 13:10:31 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 382.941795][T11572] BTRFS error (device loop2): open_ctree failed 13:10:31 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 383.023768][T11581] BTRFS error (device loop4): superblock checksum mismatch 13:10:31 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:31 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="dba0d379e8e9ea44"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009b89aab49ad30a704aa4f574f493a554bd08b3abf111160c5ee6746a0e9a03b182760e556f17156f9573e220fca116b02eea61fbb4a67b003702e307c1651bbcb8c09d5de2a33ac580443bdc788b1f00f9a3155816be58d23eb1733453372067f9ab361101b5271e4c24642ba2bf25dd22514b92ed55e28140c751b8d4d2a22b00"], 0x2}}, 0x0) bind$bt_hci(r1, &(0x7f0000000100)={0x1f, r5, 0x3}, 0xc) mlockall(0x6) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xdb56c4f971bf5436, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r6, 0xc0104320, &(0x7f0000000080)={0x5, &(0x7f0000000040)="cf83ba767beb69ba9455c049d97cbc1b04128be4b0f71904ce750b1fd95955520f9c47c1fddf3280"}) 13:10:31 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 383.131770][T11581] BTRFS error (device loop4): open_ctree failed [ 383.168248][T11588] BTRFS error (device loop3): superblock checksum mismatch [ 383.261765][T11588] BTRFS error (device loop3): open_ctree failed [ 383.282163][T11590] BTRFS error (device loop5): superblock checksum mismatch [ 383.352259][T11590] BTRFS error (device loop5): open_ctree failed 13:10:31 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:31 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 383.458989][T11608] BTRFS error (device loop2): superblock checksum mismatch 13:10:31 executing program 1: mlockall(0xc) 13:10:31 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 383.571879][T11608] BTRFS error (device loop2): open_ctree failed 13:10:31 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 383.703567][T11618] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop3 [ 383.722381][T11622] BTRFS error (device loop4): superblock checksum mismatch 13:10:32 executing program 1: mlockall(0x3) socket$pptp(0x18, 0x1, 0x2) [ 383.832638][T11624] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop5 13:10:32 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 383.941791][T11622] BTRFS error (device loop4): open_ctree failed [ 383.973995][T11643] BTRFS error (device loop2): superblock checksum mismatch 13:10:32 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 384.071855][T11643] BTRFS error (device loop2): open_ctree failed 13:10:32 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 384.147846][T11650] BTRFS error (device loop3): superblock checksum mismatch 13:10:32 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 384.235135][T11656] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop5 13:10:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 384.361757][T11650] BTRFS error (device loop3): open_ctree failed [ 384.373776][T11661] BTRFS error (device loop4): superblock checksum mismatch 13:10:32 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:32 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 384.523952][T11661] BTRFS error (device loop4): open_ctree failed [ 384.533008][T11676] BTRFS error (device loop2): superblock checksum mismatch 13:10:32 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 384.641771][T11676] BTRFS error (device loop2): open_ctree failed [ 384.664822][T11681] BTRFS error (device loop5): superblock checksum mismatch [ 384.751815][T11681] BTRFS error (device loop5): open_ctree failed [ 384.768134][T11689] BTRFS error (device loop4): superblock checksum mismatch [ 384.769670][T11687] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop3 13:10:33 executing program 2: socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:33 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000002040)='/dev/dlm-monitor\x00', 0x8000, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xb832, 0x0, 0x4, 0xc, 0xecc6}, 0xc) mlockall(0xc) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x19c26) [ 384.941758][T11689] BTRFS error (device loop4): open_ctree failed 13:10:33 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:33 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 385.085687][T11699] BTRFS error (device loop2): superblock checksum mismatch 13:10:33 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 385.181822][T11699] BTRFS error (device loop2): open_ctree failed 13:10:33 executing program 1: mlockall(0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000080)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200000, 0x0) ioctl$SNDCTL_DSP_GETCAPS(r3, 0x8004500f, &(0x7f0000000040)) 13:10:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000040000000005f0300000600000099010000000000000000000000000000286463d662327da35fe7467311aec0091cdb4c5024d59812fd58961ace6e330935e1cdfee74a986931f5bb80930d398d46ae7644e10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001395ba4801166888568300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022422a0e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000080da7b5d8088ed6e5b0300"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 385.287616][T11711] BTRFS error (device loop3): superblock checksum mismatch [ 385.351767][T11711] BTRFS error (device loop3): open_ctree failed [ 385.361567][T11715] BTRFS error (device loop5): superblock checksum mismatch 13:10:33 executing program 2: socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:33 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:33 executing program 1: mlockall(0x2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) rt_sigqueueinfo(r1, 0x33, &(0x7f00000001c0)={0x8, 0x1, 0x3}) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000003c0)={{{@in6, @in6}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_G_FBUF(r5, 0x8030560a, &(0x7f0000000180)={0x20, 0x20, &(0x7f0000000080)="105cd3b54424ae06aeb4a045f7c1177bd975d426dfa4d489137e088c6e40210d1d93b16f99d8b0ad28f6b8e59f6dae8bd54dda9798e0bbcaa3a8b83f9a12e3a1e14174ebb752c7ef996dd789e151a681bd351fc89c12ded8c75a5d3ccf8c33392e29d3ea478b80de8acd12a41546530a518844ca9f633e9ef3f6d023ac99ac2fe1f3706b9752b40d1be98a1e3962743b29cb5c934972343f007ab29b992a59fd83000c385c60404b28b75b461b7334cecf79eb086c190373cab11c793743a01e9672a9714c015c79cb2fddfa68806c336b532064dca49593eec36be5422414caa12485920b940fc3196599f99c9d", {0x5, 0x9, 0x30383653, 0x730743848b184e68, 0x8, 0x4, 0x6, 0x800}}) setsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8100}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)={0xcc, 0x0, 0x420, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xfffff547}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfff}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x29}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vxcan1\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xfffffffe}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffffff5c}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x16060a034b4b8ffa}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x44001}, 0x4000) [ 385.463711][T11715] BTRFS error (device loop5): open_ctree failed [ 385.491079][T11720] BTRFS error (device loop4): superblock checksum mismatch [ 385.601808][T11720] BTRFS error (device loop4): open_ctree failed 13:10:33 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 385.710869][T11736] BTRFS error (device loop2): superblock checksum mismatch 13:10:34 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 385.751740][T11736] BTRFS error (device loop2): open_ctree failed 13:10:34 executing program 1: mlockall(0x4) [ 385.827156][T11744] BTRFS error (device loop3): superblock checksum mismatch [ 385.864192][T11749] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop5 13:10:34 executing program 2: socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 385.926247][T11744] BTRFS error (device loop3): open_ctree failed 13:10:34 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 386.043120][T11755] BTRFS error (device loop4): superblock checksum mismatch [ 386.080829][T11764] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop2 13:10:34 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:34 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x6) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xb) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="dba0d379e8e9ea44"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009b89aab49ad30a704aa4f574f493a554bd08b3abf111160c5ee6746a0e9a03b182760e556f17156f9573e220fca116b02eea61fbb4a67b003702e307c1651bbcb8c09d5de2a33ac580443bdc788b1f00f9a3155816be58d23eb1733453372067f9ab361101b5271e4c24642ba2bf25dd22514b92ed55e28140c751b8d4d2a22b00"], 0x2}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r4, 0x1, 0x6, @random="e2fce9490fe2"}, 0x10) mlockall(0x6) [ 386.221901][T11755] BTRFS error (device loop4): open_ctree failed [ 386.249821][T11768] BTRFS error (device loop5): superblock checksum mismatch 13:10:34 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 386.345199][T11768] BTRFS error (device loop5): open_ctree failed 13:10:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:34 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:34 executing program 1: mlockall(0xe) [ 386.401423][T11777] BTRFS error (device loop3): superblock checksum mismatch [ 386.471840][T11777] BTRFS error (device loop3): open_ctree failed 13:10:34 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:34 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x402c0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fanotify_mark(r0, 0x0, 0x0, r3, &(0x7f0000000040)='./file0\x00') mlockall(0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r6, 0x40505330, &(0x7f0000000080)={{0x7f, 0x7f}, {0x0, 0x1f}, 0x1, 0xe, 0x9}) [ 386.655754][T11792] BTRFS error (device loop2): superblock checksum mismatch [ 386.667549][T11793] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop4 13:10:34 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:35 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x40240, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000040)={0x0, @reserved}) mlockall(0x6) 13:10:35 executing program 4: socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 386.794131][T11792] BTRFS error (device loop2): open_ctree failed [ 386.817379][T11800] BTRFS error (device loop5): superblock checksum mismatch [ 386.925022][T11800] BTRFS error (device loop5): open_ctree failed [ 386.940481][T11811] BTRFS error (device loop3): superblock checksum mismatch 13:10:35 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 387.011880][T11811] BTRFS error (device loop3): open_ctree failed [ 387.084191][T11822] BTRFS error (device loop4): superblock checksum mismatch 13:10:35 executing program 1: r0 = socket$inet(0x2, 0x0, 0x19) r1 = socket(0x10, 0x400000000080803, 0x0) write(r1, &(0x7f00000001c0)="240000001a0025f00485bc04fef7001d020b49ffed000000800328000800030001000000", 0x24) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}, {{@in6, 0x0, 0x2b}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000080)) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000000c0)={0xa0, 0x0, 0x5, {{0x4, 0x3, 0x6, 0x80000001, 0x20, 0x9, {0x5, 0x4, 0xf8, 0x9, 0x6, 0xfff, 0x3, 0x4bf0, 0x9, 0x3eb, 0x6, r2, r3, 0xf8, 0x7}}, {0x0, 0x11}}}, 0xfffffffffffffff4) mlockall(0x6) 13:10:35 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:35 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 387.158839][T11822] BTRFS error (device loop4): open_ctree failed [ 387.195381][T11828] BTRFS error (device loop2): superblock checksum mismatch [ 387.271948][T11828] BTRFS error (device loop2): open_ctree failed [ 387.397074][T11840] BTRFS error (device loop5): superblock checksum mismatch 13:10:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:35 executing program 4: socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:35 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 387.502388][T11840] BTRFS error (device loop5): open_ctree failed [ 387.545307][T11850] BTRFS error (device loop3): superblock checksum mismatch 13:10:35 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 387.681883][T11850] BTRFS error (device loop3): open_ctree failed [ 387.708421][T11857] BTRFS error (device loop4): superblock checksum mismatch [ 387.729946][T11863] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop2 [ 387.831818][T11857] BTRFS error (device loop4): open_ctree failed 13:10:36 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:36 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:36 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x100, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000080)={0x60000000, 0x7, 0x41}) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000)=0x3f, 0x4) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e21, @remote}}}, &(0x7f00000003c0)=0x84) r3 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r4 = socket$inet_sctp(0x2, 0x1, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000001100)={0x0, 0x1}) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000140)={r6}, 0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000400)={r6, 0x0, 0x3, [0x40, 0x20, 0x1]}, &(0x7f0000000440)=0xe) r8 = socket$inet_sctp(0x2, 0x1, 0x84) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r8, 0x84, 0x72, &(0x7f0000000140)={r10}, 0xc) r11 = socket$inet_sctp(0x2, 0x1, 0x84) r12 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r11, 0x84, 0x72, &(0x7f0000000140)={r13}, 0xc) r14 = socket$inet_sctp(0x2, 0x1, 0x84) r15 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r15, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r14, 0x84, 0x72, &(0x7f0000000140)={r16}, 0xc) sendmmsg$inet_sctp(r1, &(0x7f0000005bc0)=[{&(0x7f0000000140)=@in={0x2, 0x4e21, @multicast1}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000240)="c4dfcfa232c9a011daae8aa186760c956293acaecc87fdada992bd16451341354ed9e9b97a9a44139c531a5ecfb76f02671f81441d4a58c9ff4f24ebec28141336f6dd73eb7ecc9ed988aca4166d6d26a3367ed06dafcf7192e420262b5bc5dc618e08c1892e7755bb82589c617af7c470347734cf378536b520ae37fdb64829a4dd307e3285324969f050af48307af03fd22de1d4f51e68c78bcc08ba2fb5ad7cec939e56286a4b6ee0c886c6bc0027da4e869d066ff74b3a2311", 0xbb}], 0x1, &(0x7f0000000480)=[@sndrcv={0x30, 0x84, 0x1, {0xf6f1, 0x400, 0x301, 0x80000000, 0x400, 0x100, 0x2, 0x4, r2}}, @sndrcv={0x30, 0x84, 0x1, {0x1, 0x6, 0x5, 0x2, 0x100, 0x6, 0x3, 0xff, r7}}], 0x60, 0x8000}, {&(0x7f0000000500)=@in={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f00000008c0)=[{&(0x7f0000000540)="0a1f7ffd784dfc1a1ae242438db4804a841658057cb2ed51dad5a1e9a46c7d6b9475acb3ea2d359a63071281e2dafed2bf25e5f2c244e047b1828d54cb4d0d9e1b61d9379099dead367b5ba0a41205cd56598663f67a77d3669cd48a1cca56c9518c17b173f08ad400232777f6ad8ec9d8bc3faaf4e03587abb6525858df78618519ff63d7ebff9467b962ab0c21fc7ce06364da9ee952e59fdaf3df8eded1493cd43be984a0a70d5a370aa8cf10779d39c7865e7fb996cbb6831919ad41140baba4befb80dcb10436f83ef63b9250b3f725a512f8daede0cb7f5aa9defb7b1a3b6dd34581ea79b9cc6e217deb3855db06", 0xf1}, {&(0x7f0000000640)="eb78ee5372a16e4c5e2d2910eee7178808c0235ccf506a8305a416316e9c7a7364242bffc062e16de2fd16a19912bfca303d559b202a73aaa779e9450252d1bd5e10d187c9ee5c14825c7df6c7470cb649f56f8506a80c7b57628482ea45304afd0d254ae6d7074b3a7bfcaa66d0c2ee118dcdee865cd229526b265a2c27ab1fdece639a79a88ddcb00005d8b9ffa93855d16083a98e", 0x96}, {&(0x7f0000000700)="a2d157f86ad9ca861dc7e336e50c4b575ac4f352d4dedff41abfd14f3124d67c4f387a409ab50f61f1798bc512c3b02ce79ad6785584742500760acb4643812907618b3cadf5ce721d37d95dada295aad8ba42e5c4d3617da50ae3f59f869a3e2bd8d0b739fe7a0e13250147df18fa144c198d8422284d97a686d4580aef3c981c15e0c6dc57fb9034c141e5bd9f5a685fae4e77b64575e07fe22441f91bcf49e9e671", 0xa3}, {&(0x7f00000007c0)="fa5986954268d1fb12743b1052dcbdceb760923477b94542ed89c1aa3295ece6a381c75f9b691fdedd987c548fa26a43a897fa28402d281a95ffbbc580c1bed53ea0ffdea8c328457796cfd7bbcfd8db954d1369c7a28c296fb6aed2c4fd9ef26c7c3519110636e274adb041edb9d1a1696365cbfd5f9286b15d5d281b4dd838d4596ced266e24bc41a1d2188a06574b29ffecc57aaeed8ab95dbbb17393b8ff79545a8822c01d9e9c60a168e7a43c10cdb972b19f92c059afb7a6559ba6499e724bd08baabee97e1478107414a5f323831ab6217f395187e80b8cea52550b81a8062e723d5771239d7dac28c08584d7d8d8", 0xf2}], 0x4, &(0x7f0000000900)=[@dstaddrv6={0x20, 0x84, 0x8, @rand_addr="b812a5731dc93e50ce60aea49ba2faca"}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0xc}}, @dstaddrv6={0x20, 0x84, 0x8, @empty}], 0x60}, {&(0x7f0000000980)=@in6={0xa, 0x4e22, 0x7fffffff, @remote, 0x9}, 0x1c, &(0x7f0000001040)=[{&(0x7f00000009c0)="a3e381afadc22b1ddda7ccc2f9e8a30f95fd92165c5e938088067cf69affd337d2ecf17f15d90da09639a61e9b32b5ffa1abcc34a59a0b09553b62ecba1fb912b23ad732332b32ea1b9f7689b0b1d467ddc02c59088eec0fc74a62275a7482414d0fadc72d45b2b27729f762873e223bc93aba62936a733df0544bb4de31b1697e423e32f961517e0797eb8055e8849e0bb1097c9aa76f8428938c0aa1dadbe2bffb63b18bb5ae5a0284749441e691fd02b4d0a56362a8d97fa7a87d383d839bf24ca4df37656e7b534af50f1b96a5ddb95eb3a7", 0xd4}, {&(0x7f0000000ac0)="467e46e35ab2554d2b36e125a396bb5bdd9058870ad48641ca83643363579b3aaac6ec60b6233eb108642abe3093987571a9042426e709ec8b2e0b4330fd24797192be27afe73ae2bedfdfe679879e63867be28d123802d1cf49462802d1f197dc58f7ccdb965478f8", 0x69}, {&(0x7f0000000b40)="77663b86f2add703c187243f97f04ab62bc1d6957692b39a9fc9ded9effcdd7bf2dac94cc24e684941d01e9cc7b8e3df8482fd1d8d48c43d612929cb4cab80e98d27910965a96d8a64c6e46893de2bf37f20b332f3e76afdb77eb47a0a50690e3198e780a85982ff793110ff98", 0x6d}, {&(0x7f0000000bc0)="7c3c920df9840271390eefd31cb65f6f8118f61aa852d401319ff95b213753ee0dc6dca17e490dbca7aeae57ff8c70050842a14107b8ca176e04703ecb3faff29ab73baf7e61aa0ea9890dd8c9b28ff01db6aca7bc53cd1ad2f47bb0d4a5e2d6e7f1191d4c4981465d1e222ea1651ac455d5704142afe28c875d8cd685b8aaa4ea9b67b5adfa60b5cd74ea8c20b594103e19526aeb968946b382af7c0a9907dd3f1080e8fbe2127d27f073f8e27b72f964eeedf3731d5f7693886cee6fec8ff3d8516e49d5c9ca5ee440a3556e", 0xcd}, {&(0x7f0000000cc0)="f45e909eb4c7efe3d893df286cf777b58f28339b5ea00c5a45847ff71acdb55e26ab529d4e935ef4ad68531b57cb7cc317bf84f747f2bbaa5aedb3514ca8d127fbc1ee4484237b64f878312b9d5771c203ec8c330afd9d89df625063d9637686e76e", 0x62}, {&(0x7f0000000d40)="15348e1190334d62b095ed9fafb2256a9a44d4b949e053fec7a3617d4f6696b203d53f508f1b0adb7d833453805e862763fc4a53107716a32149c20e4c5f9470973f9162f4c4ffe70018c2bf4e3eb7c089933d3fddaab70d67de4d3ba6f7454506826a8a53b5b41085e9f867da53fd31d8f64069f234b8e134583771d885f1920006386530ddfe26eebea2f689675e8631440e5dce6a2acd4ed3087b76b4f4c5b856dc97e612739f", 0xa8}, {&(0x7f0000000e00)="34e6f56cf6ab93ca7a2d0bd7159665ee1ccaaf264935a4cde169c317e76584e11ffd41c82f022dfdbd8c42421835476e9de00c4746af3cfd7a78897b0a308756aaf8df7c8d4961dc8e22437ed71e41ffea95f5f1dd7887024fc4cbe4410556f6a69ba10c411313ec0cc60a3d9dcbbfc78586305b7fec9abe05c94879775e94209d0f5c601ab4750e4e406337c13aed044d4a9a06d9fb642dea4d6b994ef70f5789eaeedede7d53e640104bc4", 0xac}, {&(0x7f0000000ec0)="2105618f46", 0x5}, {&(0x7f0000000f00)="0142af1c76f7bc597804765676a6f0152bf3972c7e679f7507ae14810f50fef3c934e4a2095dc40b3f298af5d23b13476457875f7e6441b3147767cbaa0d69becc6beaa5f0e377f3bea3e22c62ef256d23508173332934c51bc58751e10280f1474d29aa15701c73a4ff9cb3aa085bb2cbbd5561a692595fe9cf0cf1b5e68f78c1852a7bb12fa7281fbf0c2ae210100e203e1ecef82fb4937cb43b9694437c2d3a", 0xa1}, {&(0x7f0000000fc0)="af764fd3d0271d315392ead2cc86cfbbe6b2f6637da2f938f0a0a007c15460e26208198ed687097e784e3b96f4acb91a9521498690e18c54e18396186d877f6c008f33fdf1f0d97ea503", 0x4a}], 0xa, &(0x7f0000001100), 0x0, 0x20040001}, {&(0x7f0000001140)=@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000001180)="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", 0x1000}, {&(0x7f0000002180)="0f7a3b43fbe8d22caede08d379fdf1b1549cdaf912facffc0c", 0x19}], 0x2, 0x0, 0x0, 0x40}, {&(0x7f0000002200)=@in6={0xa, 0x4e21, 0x8, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x2}, 0x1c, &(0x7f0000003400)=[{&(0x7f0000002240)="49eb72d3f024bc509d34188a28fcd22c64c15665ca8fae06d8877a67e597d4fa2581d47cc2d5a7dad690e2962dbb3c53b422a7cb1159871b70aae39c478a75e74de8b653f3b86a5814c4ffbf1b68fc9a67d80dcd12fe005bd599d8be0a74a2fa6c328d19f597d8de291f7b93e3e9a01ab41ca526756fe195f991bda65fbbafed4b15f6c43160ea03f6547753699fc07c9facc3599a81cc63acc2c0d34e924b6907ab2a5a2cd8c0afa771a83108e3792bd79351a14f0c5e0872c2f8f3d50179", 0xbf}, {&(0x7f0000002300)="e2524e6f5e05fae70e85853c579853fb473779fbce39842d3592a8e3386a91289cd382f5032ada0d7319bf14e366e8b45ab6b03a883534e5f2f13e32077bb1c94fb5026bcc1343aa9f890e03a93dc9b4c6ed6f25e5c8fd3243fa3aa53ce097149aedf73c44a57d28fbddc48450c77aef92d31feef91d32752aa3d8966b932ad72490a7c60623f052136ce7139e4d6d44885daf8e7196c5024593dd01e14ec3886a50fb47e98fc56e538875c75ea5724ec223541e6581cd66b5cafbdda2cd04a5c2430a6081daf19b20f92804a3394827426848a5b955f1e9fbda2455854088a466b1544609a945caa62ff7bd21f10a1e4a2883ce3d7930fd0dcfe2038f98a96310fdcdd426fbf7d49e491a6722907471d03d301219a08281fc25a0ce5573f490d35e1da3a101172f257cd939975cce4b5855a3938425a430419a444ea263ee40fac6645a923f72d71f3c7ed09de1935e4541efb7f629e7806b5ded271323790cafafc09bd4c3d0d1ab41ebebfad9ba912795bcf4490833aedfeccdde6a3f867a35f909f8658ba49abbb04b30981b514024e09ae2a6b7abdee6416582d2e739df1878826bde0fcade8d6e90b02d460f19ee34dfa94dc21640d5392049c1842746cb84f8fbf83b11b0fde386383156f0ab70d39c927bf285d53868849eecf022fe7a3620b2fdcd1af0a9164220f0ed19957179af54a1de421e89b0a499b78e2498383fc05cad6798ac91f0b8831e44b54e8a866cae691f8cb57afe05c9556ea56b36019e1a150ff4fad566c4614af420b8e96de0ea074dc4d702740e24a39f07f8a5852d63432c964d62497dbd797af740e249d3c36304016bcaf53df84a00df76b193b14ebcf110f605f09944bf661ec14429ab8ed559f10564542424558b015665a98ac01e2315a7c79e01b14452f4e031e533912e9971978cfae353ab49e5a1f6274c67f5ea614b67f4450ebf9c9b00cd879e6734dc410ed8c714cd90c55baa06e571244fcbea121d9abd71103c74b91aea73f2192bb13c54d67af1cb5c2e153b189aa2b56c4498411f7b22ec5935aa5c2ac49248c3d060848617246eb47583e56dc099e3674d96a7fe78033f2adde6bb8c5e26dd7bcd4e778ccd5a5122e9779194e6ed885bbaadafa302a8039d95e8d37ea7577006f9efd4f9bc4aa1d299866a3eb4e9934c186a07f9313016adbe512129546bdd7429a31c444d0d5523de073daf1ef9bf5ad89fb5e55c6088be72afb4e1a5caee3f730d1ba6beefb8b4f7f22061cd4c90ec8816823e8dbc8024d75aab083d0fe5c35457410ceda4153393eea79640c6d0a17190d30aca80343fa82ae2e5df4290dd6acda8551c593239a84bb08e23722a04aded50c4b30ea64a57823fc3d9ba2c837acafeeb7828b197b6a9b223e3d87dbec66dec9f06120d1d9c53f5d6fa405a614a2adaa7a24e0a26394e23de95a3a113a15dcf1436456a7dcd64b8c5160e5bfaa722cfc8483a876670a86bb4885762ee2bca32fdc4ffb142ce5a4a2e2761df0e31f2153341ee98259b0f1ff431a4248af7a306171aac37bb680a00199356c8d66ba21bac93e8bf3a46f691e18601d27620ba94d4c86c520b71688daa5e88184b10539ebaaeb1ce2e29a9b152fcbadae23a4874df0709e4d96de160014bd49a54c48b8b9063315c871c7ddfd96c813b7c11b6a1bfc9671e0c7375387a5aa3cad10c3c861002148114b659bd93339c34a0d370bd429adcc051fbec745b1cf8cb1b0a124175e9099aa8a1bc2bca84f8dd412a4169ff9cbd7aa577e88fe6b51272ee555267cff2b25cf2be937b423df02abcacb21f1fb562eaa52607d6c245ca7fe3217a24e3e1c70bc528d44a29e966d9450dc4bc8d3a5976fb208b93dea7a182132b7fa0adee905be0570a73e4d0dcce24a6731291552d48ced0f739e4867a68f4eb7b291e3b8860ac3f4d77c0b276bd166c13a193afd2129c210282ef07637ca0c59747612f198e3c8202fd7397e7e4d3f9bff6a162b24f6317fd2758a96cc1d4d20f42302aa9dc7d5fd71f14ebdf21b2bfcc85bcc179df1ad93ea7334549f564202dfbeecd1f8afc13b125577319fea371c121e2708bd3f4c46a3b635d22dca7aeee177c325291b7441c4d41a7ace554328c50cf31692d71024cc468da69bc32996c4d56a3b1f00d941f7ecfac86b4e47f285d315027f2041ca0785a84cdce958955073b79e89b93f1d695f9356fce2dd0723fd7f288116247679823e415e953100bb035b5ebf02da5d3af77b724604880181fa7bffbaef8344de06d252b3e184e801ab4e05f53821cf4d5cf87288d0a52ba906063a5062e11f7138ece0e7165383cdbe9cd373883458cb70a466a52a86bf8940c61e15b5d96cc3024d577f515c50ef23790fbd7ea7336f159fdcef7b977d9265cdc616444885ff1b26bb4b58c55da7818a480b425106a202d3518c0151fb402c35a1f2afb65a15b83e08b650ef7107bd0943fb9fd9d75bc371e380516f022ce1e86162bfe98a41d99164201aadfbd1db3008ef14aeee12630e915e5cde83a2c17bdc2bd6483cc99d8727757c02005385f46d23ba85eda34acf6b96ea1064798a117393a977f6531b2f2018ad93f11e729e18c30b31e73321d1cc2571495790b4cf23090681534b964892913b59be8e8125a1bee6d8baf8f1d5e50e7eacb6da0d016cb057989f2b61b99070baf85769d71286f6b2e035b21fcf5a8547e2af5ca15434433580ed86a5eacc97d7d270ca5839cbcc2b36709b10101a39c9b88d8a04864d8c9a8e2ac1b78d366c3e234a1f762e53d0ea3920020a42928ca229ff66e28eab71cd52892592890b1b885ad661631dce95bacfe6215f26ac45e5ecdedb1dd82e3a2d1fac5ce66a4df0cd7263252f8c862948bd6b8b9087937f5c0766479de2cdfa8ca8895156c7adf7a06fbe429f93648bfd115a8240cf1711bc98242e8a9eb19c7ff12993d92ced2601c901dc3caf4a8f17eb3cda7d95ed755bd658fe119920efe3200e3dc0c86d9f4f181e3cfaefde33e2587940366ea3d0d93ddf81a39394c200b0e040a14eb2de6713fd3a919b8b25ef6501feceb8a6834dc21c54e8ff93ad2b2969c7f0512dffc648ada2a7f013372d82bbd4f21830c12fe9646b3657f4bb5f6004777d62c3fbcea1ca28d80a8b85ae69cb87ca2a16170159dc4015b08ec6b1f9ba58feeb29b8d025e7be03c5f233a6161df9da092e25a237e427277133846f2792f87eb6a5fd9246dc02541d95ace1508ec1ecc349b9984b04c8f2f592da71cebc76a24bc2fc34a9aef7c1e5fe105b935a8c24a843af599bafda7841960432472702c0498577f12d9fd127de8a5166475cfd05ccad4e9503f5f3c49e01fa68922d067be1c5f82347a8343e1a78458ec142614c5226ca7dd2badfb8d71bb47c1f2216c76dd42fe2e981658600b75f57ee542b100cd59ceecb8d775c053f24add5c82d1deec154174ed09ee2f1c2aedf126c9b99bc76af392dd95261db0929c870ce522d94b96c1ade67e590e816db840a59065d627142a8858bc72a44bad32e4d852d316aaac10f68c3a362aca731a6f7abca284970619b7f728912380937c493acc3e496a0f60812f23c60f34d5ebadfc2a31898f06fb62fd0d098a1aa202b0c22364f132f87ecd25a8af756c68d1391d0b6b944c86516341081767d57bb62e4b8fd053fc3dc0a2ffd02f846d750c4287886396c8f7b54d008bdb95618b76112a4335743cd7ab0f83915805ac75ab7c42dcd8e0f51120f899f36270c1504fe18229928ea59c73a2c155a731d5308c5c6a162d5ee7f90b807080c04379d274071723d47fd32d765f0a7ca269684470fdab045c2fb641d2a704ce22813e1a5cedd402d54075bc5b7575ad432400eeb7241b104b0c1758299fa500b7925ba178c645b0a450030d866a5b01d52b57a9a48203c53e5d7fdf8832bbdaca30649c26b10bf9c2b463936aa39222a89257f26ba8078aedc1567c0ef6c8e389455ae9cbecf574015dc84cf117058b8db14275889f683fc60552a20d1c922703b761d8876cdfacfa1d2fda89afdf2144778a10dd170de930633656613ee5724742bdb46886710e73cef6a21c220e25ccb4ef2fa07efd480f6a10d55b5c5c13c1b23253919644ad00950fb85bbae81512c151c7098489457317c99a362da069d9c0921954ffcc961ac6b5670be57e83fea9e89037e9d7e77f9f53bd7eb5bf47c683890fce93ce12c2788f38764c2b47b0c90696077013e8c8f8ad1c998622713bb5df47b0a9458886294e1686c2b6fe61c307501f5e09f6b072aad2fa3e42d0c1291da1870005d4a32a73c153763baa0ae75a518e4c7bc5958a1e57254839b83f5825f37a778d29643858172af57521f10ab21329717c5b4b2972f3d449d3782fd85f745961f13b5570b263999957c851ce2a7c48012981309224499281d87145c50a065918e34c329a7297d89162ab817b17a86264b1a29702d4f105193017b0e757f2e063a1623a41628fa280050b882e1a038dafa2af414d1b611c9dc3007ce73d07f555145a987054893c36fdcfed47359e5bdc872f2de3bd6bb50b715a185f345ea1612d0c5cbb76ffcc0247174c72f8348c106fa7f3b78aaf310f408db7711a55778a9aa6776d9420be5adccaa211e56ca31abf72e76e225a96f7437641db967c583781dd76849f203204bbe4392a6d8e9f330561045a6c456957455e2b4802b63e624f50050a4679cc9bf67cdc4047dc189687d9367b9182b7d0f62cb44dab2bd96f2121ac4e36f85d2f4ba9a3878203f75d263099d54f3b95547421f8b56b512d54faeb3693258fec24a380049cb876ae61a2d10d8817818da075ebf0db64e39557d9b300604ec6090aa4bdc8f25cdf9149a268678ce46fab35a709c3e907a1706c5b9dcd7128a411fcbe087707f81b1f033e44bdcfc6b6c721a84511aafb9d25cdebfbfd2385d98ec3313e0f088fd5dc9faa3d766d91d25c291508c97fc68acbd1bd703c0370e66a1a25524f083923da01cf0ebe4007cb4d5ec3b58a342a3a6b70b1da399cd62e40157a4120296cce652f1f017dca421ed5f14c8167c23a3b226d45c8da9493e292949ef52831df0a27524b1749b326df00ef0c3232bc87f8865d1f0e03859118446dce57f0bb9dca89e365d293562130379fff0dd2c1280a04fc32ca5a0c96a3b1d1ff7e095306f99ea8198f7655ea4bd725dde3d9299033ee3c8b060a66a0427602c267f5a3ee8e5411b324dc73532310dd83d4962767b5418385f8d81af07e0802fef9d7ed654fa299ee8b2ff1baba26e96d04ce820d5233034f70de30669e472acd29c129535d02d66f82fed2158bf3bedae12566fb70387e01e47fd9fc335361349d36e38253396d80ffbd58648d832e1aa23a8c102f78ee5c687e13c944014b2eb1fcc0d38616f3a0debdf6088b3ab26f93a154880e2f933b7bbdf4c90f201c0898f45ff7c74c9214397f6444c4f2d322566742875794c2f8c384ded3e53addb9af4317282b1345d0067c26df280f88e410328637f5020bc1db5733765335f38339384050c83d0a5d3724c652fffaf72f2ac70c0a445cedf91f9abccfb6e7cea2ba232105a8c97615c1829be858126c2f76b4a0cec8fd76335f73126cb1525b86265b192b5e1367b31fcd285586d27d24f7ae433f93a39d85251e5480a7dfc96a71a086f8bcb3d6d45df9f6b1f43fbc15bd05250ce8b5dc8970e34d991f95977ca3d481468db9dae669716348a869fb6bf7873d85f2c0940a4d70e5fd7589423692a932a72f32b6331a", 0x1000}, {&(0x7f0000003300)="9166a990405cf85ef85301ee9e0243d0974e6bf07f9b312965addad0b2e94ec626383624d118bae9c2980a02513cf04aaede1725715fa165625864d0b7038ca92144fe9244e46e52939cc42009a35354203e8ac9043a9e549d25210c3ea599524c448174eafc727c733683d238cbb7a9e49399ec575ca6163297a80442d2c09cd0a5f400d476ab198b06e984184614b42dc6e1c41f32516b58ab6248c6b59443a350526859e884242f5a45310e2b63cb0757d1fb2e4ab53ddd3cbc2dfb7a09a058ccbdad439a31b9e7", 0xc9}], 0x3, 0x0, 0x0, 0x40080880}, {&(0x7f0000003440)=@in6={0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, 0x1c, &(0x7f00000045c0)=[{&(0x7f0000003480)="393f2aa0235ff7460414b685db328127114b9ee210bb33d25169af5561cfc3", 0x1f}, {&(0x7f00000034c0)="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", 0x1000}, {&(0x7f00000044c0)="7ca194c40d3abff4e2d6718d18b3ab5f78cf431a4d6344477190e70510d5ef2b90012fece881c1f3f19b6e97956d1bc5e8d2b3cb097ec1a23c3a90d5caa6d9b55e5d80cd27152747d83a0e35a6bc47ac81e97c100284864964af15ef165806c2a2599636c62abdb6183cbd735e06184868382f0e", 0x74}, {&(0x7f0000004540)="e02bbcb50e65e94fb3638803a53984a5c6706204f6a60657b9776a8836046d481f502194b5ab88031654f8133a90ec3ac0b188546798949c73656a5ddc93362cc3ea1f370b4617d68a4b4f12e79d186ba66db1dcf6371a7d5cfe46b6801f28f4c4104c5e4a31b62d9ab0e4e7b2f281056c6248585c00fb33d8280d2235", 0x7d}], 0x4, &(0x7f0000005dc0)=ANY=[@ANYBLOB="18000000000000008400000000000000000101800100000118000000000000008400000000000000000037ee04000600300000000000000084000000010000000700080004800000050000000000ffff0101000020000000e30000002d0a28222fd77b1ea1091368575c6dfa0cae77dc5aa008ac077d10a1e968535b982bf837b4f71c7e8991909915780e56d3d22d64d3809745835766917d7abd39c3c9132a2cd61b6229042e67f33bf7aaf957f08f7faec32e7bbd4c37", @ANYRES32=r10, @ANYBLOB="20000000000000008400000008000000fe88000000000000000000000000000120000000000000008400000008000000fad8b79c0037b4f3ad378cdba8ad2f94"], 0xa0, 0x4000800}, {&(0x7f00000046c0)=@in6={0xa, 0x4e22, 0x4, @mcast1, 0x4}, 0x1c, &(0x7f0000004780)=[{&(0x7f0000004700)="c1c0fdebd4f40d8bdd776b2566a49729b3b01698fdea0a599ec5a562a1eaae45dbc2c2a0ec397bfc68a409f819c8b7cdb9641ee81bf3e3f6450644018f38dd71d7e96c335dec8d33e30eb5ec41899b16c2d9531ba01aa284b0dcde3780885dfa46efdb3a5a44", 0x66}], 0x1, &(0x7f00000047c0)=[@dstaddrv6={0x20, 0x84, 0x8, @rand_addr="c255d9725fe9df7ffbd0789cf349aad5"}, @init={0x18, 0x84, 0x0, {0x7f, 0x3f, 0x4, 0x6}}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}, @init={0x18, 0x84, 0x0, {0x1, 0x1, 0x2, 0x8}}, @init={0x18, 0x84, 0x0, {0x4, 0x7fff, 0x6, 0x2}}], 0x80, 0x40000}, {&(0x7f0000004840)=@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f0000005880)=[{&(0x7f0000004880)="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", 0x1000}], 0x1, &(0x7f00000058c0)=[@prinfo={0x18, 0x84, 0x5, {0x0, 0x2}}, @sndrcv={0x30, 0x84, 0x1, {0x92fb, 0x5, 0x0, 0x1ffc0, 0x3, 0x100, 0x99f, 0x81, r13}}, @sndrcv={0x30, 0x84, 0x1, {0x5, 0x7, 0x10002, 0x4, 0x8, 0xfffff800, 0x100, 0x6, r16}}], 0x78, 0x84}, {&(0x7f0000005940)=@in6={0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}, 0x1c, &(0x7f0000005b40)=[{&(0x7f0000005980)="933337eaab635045a3df0bdf2cf8fb25e2e630cbdcaad1310430d497ffbf61323b410c0722751fcea5c5b4ba7b1f55557e450862675b1d0177adebfa56c178c6afcb558924b781d11fdbfa3b196b51a73b3b11136ac8a854fdb2d3c6f984010b1ec17c3058216bc3ed54b9ba091c1c1e53e1a14a6a3a473e33d29903753e15fca5ce36e027871af8a52c5a633cb268d0df40a080c2090cf892daae54ec20d9e0f5dc368ecd4a7266a85aed6cb862eba5a4e4c8d71bfa8322b3afb10b080bfdf35fa974667eb5e4e090a8eeb30912d7fc60300057cd8b889b9127fb47502a40c130f80f3f92a9772acc2eb17478e232145a8e8fec3d", 0xf5}, {&(0x7f0000005a80)="cbb8a67a978f18fe3d6074650948f9db21e4c77cc84f5cc80a528e5efd9e264c96a195aa7c131fc8700acdb9bb231347c525fa112515ce039d75df2da997682e9c7809ff99a38eed071451b56a0e17d4b24621500a69a60574523a0d3b0c52b26152fbac7403283820a711f3a7905571e7e9494b87883e790f68f4312f3d0bab87b05d1e43d6539c844c01c40c", 0x8d}], 0x2, &(0x7f0000005b80)=[@prinfo={0x18, 0x84, 0x5, {0x30, 0x1}}], 0x18, 0x4000000}], 0x9, 0x1) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f00000000c0)) [ 387.914809][T11871] BTRFS error (device loop5): superblock checksum mismatch [ 388.015431][T11871] BTRFS error (device loop5): open_ctree failed 13:10:36 executing program 1: mlockall(0x6) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4020, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f00000000c0)) 13:10:36 executing program 4: r0 = socket$inet(0x2, 0x0, 0x19) r1 = socket(0x10, 0x400000000080803, 0x0) write(r1, &(0x7f00000001c0)="240000001a0025f00485bc04fef7001d020b49ffed000000800328000800030001000000", 0x24) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}, {{@in6, 0x0, 0x2b}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000080)) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000000c0)={0xa0, 0x0, 0x5, {{0x4, 0x3, 0x6, 0x80000001, 0x20, 0x9, {0x5, 0x4, 0xf8, 0x9, 0x6, 0xfff, 0x3, 0x4bf0, 0x9, 0x3eb, 0x6, r2, r3, 0xf8, 0x7}}, {0x0, 0x11}}}, 0xfffffffffffffff4) mlockall(0x6) [ 388.144134][T11882] BTRFS error (device loop2): superblock checksum mismatch [ 388.151625][T11883] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop3 13:10:36 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 388.221788][T11882] BTRFS error (device loop2): open_ctree failed 13:10:36 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:36 executing program 1: 13:10:36 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:36 executing program 4: socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:36 executing program 1: mlockall(0x6) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) [ 388.516024][T11903] BTRFS error (device loop5): superblock checksum mismatch [ 388.534386][T11911] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop2 13:10:36 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 388.582527][T11906] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop3 13:10:36 executing program 1: mlockall(0x6) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xb04, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) io_uring_register$IORING_REGISTER_EVENTFD(r3, 0x4, &(0x7f0000000140)=r6, 0x1) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x1be3, 0x7f, 0xfa, 0x1}, {0x1, 0x9, 0xc4, 0xf41}]}) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 13:10:37 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 388.785890][T11903] BTRFS error (device loop5): open_ctree failed [ 388.807553][T11914] BTRFS error (device loop4): superblock checksum mismatch 13:10:37 executing program 1: mlockall(0x6) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) 13:10:37 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 388.935229][T11914] BTRFS error (device loop4): open_ctree failed [ 388.943800][T11936] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop3 [ 388.965561][T11929] BTRFS error (device loop2): superblock checksum mismatch [ 389.141783][T11929] BTRFS error (device loop2): open_ctree failed [ 389.152661][T11944] BTRFS error (device loop5): superblock checksum mismatch 13:10:37 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:37 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 389.261922][T11944] BTRFS error (device loop5): open_ctree failed 13:10:37 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 389.320274][T11955] BTRFS error (device loop3): superblock checksum mismatch 13:10:37 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 389.441727][T11955] BTRFS error (device loop3): open_ctree failed [ 389.477738][T11960] BTRFS error (device loop4): superblock checksum mismatch [ 389.571782][T11960] BTRFS error (device loop4): open_ctree failed [ 389.603702][T11969] BTRFS error (device loop5): superblock checksum mismatch 13:10:37 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 389.618443][T11971] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop2 13:10:37 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 389.771749][T11969] BTRFS error (device loop5): open_ctree failed 13:10:38 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:38 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 389.910814][T11984] BTRFS error (device loop3): superblock checksum mismatch 13:10:38 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 390.021859][T11984] BTRFS error (device loop3): open_ctree failed [ 390.032744][T11990] BTRFS error (device loop2): superblock checksum mismatch [ 390.141786][T11990] BTRFS error (device loop2): open_ctree failed [ 390.179785][T11988] BTRFS error (device loop4): superblock checksum mismatch 13:10:38 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 390.196554][T11996] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop5 13:10:38 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:38 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 390.371871][T11988] BTRFS error (device loop4): open_ctree failed [ 390.395777][T12004] BTRFS error (device loop3): superblock checksum mismatch [ 390.481842][T12004] BTRFS error (device loop3): open_ctree failed [ 390.508865][T12009] BTRFS error (device loop2): superblock checksum mismatch 13:10:38 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:38 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 390.601838][T12009] BTRFS error (device loop2): open_ctree failed [ 390.624440][T12017] BTRFS error (device loop5): superblock checksum mismatch 13:10:38 executing program 1: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100)=0x61, 0x4) mlockall(0x6) r0 = socket(0x5, 0x5, 0x40) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000380)={@local, 0x0}, &(0x7f0000000180)=0x14) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x400000, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x65400) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0xaa850ab34c804c98) io_setup(0x8, &(0x7f00000004c0)=0x0) io_submit(r4, 0xc2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x65400) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000000)=0xaa850ab34c804c98) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f00000006c0)}]) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r5, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0xeecb, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x3}, 0x0, 0x0, &(0x7f0000000200)={0x0, 0x1, 0x8, 0x10001}, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x2f}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={r3, 0x10, &(0x7f0000000640)={&(0x7f0000000440)=""/203, 0xcb, r6}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x3c2, 0x1f, &(0x7f0000000080)=""/31, 0x41000, 0xf, [], r1, 0x6, r2, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0x8, 0x20, 0x7}, 0x10, r6}, 0x78) sendmmsg$unix(r0, &(0x7f0000000000), 0x0, 0x40) open(&(0x7f0000000300)='./bus/file0\x00', 0x102001, 0x1a3) 13:10:38 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000400)}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 390.741780][T12017] BTRFS error (device loop5): open_ctree failed 13:10:39 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 390.817944][T12025] BTRFS error (device loop4): superblock checksum mismatch [ 390.837344][T12030] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop3 13:10:39 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 390.967379][T12025] BTRFS error (device loop4): open_ctree failed 13:10:39 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 391.028188][T12045] BTRFS error (device loop2): superblock checksum mismatch 13:10:39 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 391.111801][T12045] BTRFS error (device loop2): open_ctree failed [ 391.142069][T12052] BTRFS error (device loop5): superblock checksum mismatch 13:10:39 executing program 1: mlockall(0x6) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r1 = socket$inet(0x2, 0x0, 0x19) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f00000001c0)="240000001a0025f00485bc04fef7001d020b49ffed000000800328000800030001000000", 0x24) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@broadcast, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}}, {{@in6, 0x0, 0x2b}, 0x0, @in6=@loopback}}, 0xe8) [ 391.231753][T12052] BTRFS error (device loop5): open_ctree failed [ 391.247080][T12056] BTRFS error (device loop3): superblock checksum mismatch 13:10:39 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 391.305506][T12056] BTRFS error (device loop3): open_ctree failed 13:10:39 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 391.412953][T12067] BTRFS error (device loop4): superblock checksum mismatch 13:10:39 executing program 1: mlockall(0x6) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000100)=ANY=[@ANYBLOB='l'], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000180)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='bond0\x00', 0x10) 13:10:39 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 391.481833][T12067] BTRFS error (device loop4): open_ctree failed [ 391.557686][T12078] BTRFS error (device loop2): superblock checksum mismatch 13:10:39 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 391.621855][T12078] BTRFS error (device loop2): open_ctree failed 13:10:39 executing program 1: mlockall(0x6) setrlimit(0x2, &(0x7f0000000000)={0x4, 0x20}) [ 391.728939][T12084] BTRFS error (device loop5): superblock checksum mismatch [ 391.730793][T12091] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop3 13:10:40 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000400)}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:40 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:40 executing program 1: mlockall(0x5) [ 391.881818][T12084] BTRFS error (device loop5): open_ctree failed 13:10:40 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 391.951900][T12101] BTRFS error (device loop4): superblock checksum mismatch [ 392.031855][T12101] BTRFS error (device loop4): open_ctree failed 13:10:40 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:40 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 392.176505][T12114] BTRFS error (device loop2): superblock checksum mismatch [ 392.251950][T12114] BTRFS error (device loop2): open_ctree failed [ 392.359116][T12124] BTRFS error (device loop4): superblock checksum mismatch 13:10:40 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:40 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 392.421858][T12124] BTRFS error (device loop4): open_ctree failed [ 392.442160][T12131] BTRFS error (device loop5): superblock checksum mismatch 13:10:40 executing program 1: mlockall(0x6) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x800, 0x0) 13:10:40 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 392.561793][T12131] BTRFS error (device loop5): open_ctree failed 13:10:40 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:40 executing program 1: mlockall(0x6) clone(0xd8b3252499180bbb, &(0x7f0000000000)="c03569e0ce345b428b15878e54576a595c8242ed72da0e15fe4786a0ec752cba5f1924d4d822b3e2b4025c841cbc4257d935d0110c0a89c4a728ec084384d3107e6754a15ee01bf4012d41e16d8d0ce553b990f3e6dac1eb5910eb3061ae6b2ccdb78a16568193a5254c856e2bb902803c1dd92e5a401fb3ad7296e1f1d3bc919ed1712a890971afd1190e88aa938407e229f9ac975c066ca6ce59d3ac27642aa2fde61f6bebdfb2cadbd1771a8eeb206a2c3b37cde1eb8a61c01f918e5e1ace09f130b6", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="2a2089fb7c06d8d40e68e20b0adcae1ced5035f74a177c664c19a3ef26e2eb900dbb58a6ce4641750eb5e52430ec14a9cc0e8af3b2edd28830350e22ef3781044198b257157dd1b5c92a0d331a33af8478b489b55b7e049b295994f3fad12ba900400e1f54a7ac465f13127e04c90cffff5681d6ea") [ 392.727913][T12143] BTRFS error (device loop2): superblock checksum mismatch [ 392.811763][T12143] BTRFS error (device loop2): open_ctree failed 13:10:41 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:41 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000400)}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:41 executing program 1: mlockall(0x6) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r1 = socket$inet_sctp(0x2, 0x5e6be165558d7763, 0x84) connect$l2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x3, 0x0, 0x3, 0x2, {0xa, 0x4e20, 0x4, @rand_addr="5b70f46027dddf972c44adb3d912d287", 0x9}}}, 0x3a) [ 392.945059][T12159] BTRFS error (device loop4): superblock checksum mismatch [ 392.981812][T12159] BTRFS error (device loop4): open_ctree failed 13:10:41 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:41 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:41 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:41 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:41 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xfffffffffffff800, 0x40000) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, &(0x7f0000000040)) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f00000000c0)) [ 393.321674][T12189] BTRFS error (device loop2): superblock checksum mismatch 13:10:41 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 393.451909][T12189] BTRFS error (device loop2): open_ctree failed [ 393.476868][T12192] BTRFS error (device loop4): superblock checksum mismatch 13:10:41 executing program 1: mlockall(0x2) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x44200, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000040)=0x4) [ 393.572002][T12192] BTRFS error (device loop4): open_ctree failed 13:10:41 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:41 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:41 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 393.824682][T12220] BTRFS error (device loop2): superblock checksum mismatch 13:10:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0xd) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getdents64(r5, &(0x7f0000000040)=""/28, 0x1c) mlockall(0x6) 13:10:42 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 393.935089][T12220] BTRFS error (device loop2): open_ctree failed 13:10:42 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:42 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 394.095838][T12239] BTRFS error (device loop4): superblock checksum mismatch 13:10:42 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:42 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 394.201881][T12239] BTRFS error (device loop4): open_ctree failed 13:10:42 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x9, 0x0) 13:10:42 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 394.337816][T12253] BTRFS error (device loop1): superblock checksum mismatch [ 394.434555][T12253] BTRFS error (device loop1): open_ctree failed 13:10:42 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 394.475438][T12259] BTRFS error (device loop2): superblock checksum mismatch 13:10:42 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x9, 0x0) 13:10:42 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 394.621798][T12259] BTRFS error (device loop2): open_ctree failed [ 394.631817][T12271] BTRFS error (device loop4): superblock checksum mismatch [ 394.801811][T12271] BTRFS error (device loop4): open_ctree failed 13:10:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:43 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x9, 0x0) 13:10:43 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 394.981890][T12287] BTRFS error (device loop1): superblock checksum mismatch 13:10:43 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x9, 0x0) 13:10:43 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 395.081795][T12287] BTRFS error (device loop1): open_ctree failed 13:10:43 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x9, 0x0) [ 395.205778][T12301] BTRFS error (device loop2): superblock checksum mismatch 13:10:43 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 395.311760][T12301] BTRFS error (device loop2): open_ctree failed [ 395.329362][T12311] BTRFS error (device loop4): superblock checksum mismatch 13:10:43 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x9, 0x0) [ 395.461823][T12311] BTRFS error (device loop4): open_ctree failed [ 395.500004][T12323] BTRFS error (device loop1): superblock checksum mismatch 13:10:43 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:43 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x9, 0x0) [ 395.632429][T12323] BTRFS error (device loop1): open_ctree failed 13:10:43 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x9, 0x0) 13:10:43 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000040000000005f0300000600000099010000000000000000000000000000286463d662327da35fe7467311aec0091cdb4c5024d59812fd58961ace6e330935e1cdfee74a986931f5bb80930d398d46ae7644e10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001395ba4801166888568300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022422a0e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000080da7b5d8088ed6e5b0300"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 395.830192][T12339] BTRFS error (device loop2): superblock checksum mismatch 13:10:44 executing program 1: socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:44 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x9, 0x0) [ 395.931761][T12339] BTRFS error (device loop2): open_ctree failed 13:10:44 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x9, 0x0) [ 396.095161][T12351] BTRFS error (device loop4): superblock checksum mismatch 13:10:44 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 396.206637][T12364] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 13:10:44 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x9, 0x0) 13:10:44 executing program 1: socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 396.361797][T12351] BTRFS error (device loop4): open_ctree failed 13:10:44 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:44 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x10000}], 0x9, 0x0) [ 396.599705][T12388] BTRFS error (device loop1): superblock checksum mismatch 13:10:44 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x9, 0x0) 13:10:44 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 396.685276][T12388] BTRFS error (device loop1): open_ctree failed 13:10:44 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000040000000005f0300000600000099010000000000000000000000000000286463d662327da35fe7467311aec0091cdb4c5024d59812fd58961ace6e330935e1cdfee74a986931f5bb80930d398d46ae7644e10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001395ba4801166888568300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022422a0e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000080da7b5d8088ed6e5b0300"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:45 executing program 1: socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 396.939699][T12409] BTRFS error (device loop4): superblock checksum mismatch 13:10:45 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x10000}], 0x9, 0x0) [ 397.045261][T12409] BTRFS error (device loop4): open_ctree failed 13:10:45 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x10000}], 0x9, 0x0) 13:10:45 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 397.089730][T12417] BTRFS error (device loop1): superblock checksum mismatch 13:10:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 397.211832][T12417] BTRFS error (device loop1): open_ctree failed 13:10:45 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x10000}], 0x9, 0x0) 13:10:45 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000040000000005f0300000600000099010000000000000000000000000000286463d662327da35fe7467311aec0091cdb4c5024d59812fd58961ace6e330935e1cdfee74a986931f5bb80930d398d46ae7644e10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001395ba4801166888568300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022422a0e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000080da7b5d8088ed6e5b0300"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:45 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x10000}], 0x9, 0x0) 13:10:45 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 397.586531][T12451] BTRFS error (device loop4): superblock checksum mismatch [ 397.691812][T12451] BTRFS error (device loop4): open_ctree failed 13:10:45 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x10000}], 0x9, 0x0) 13:10:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000040000000005f0300000600000099010000000000000000000000000000286463d662327da35fe7467311aec0091cdb4c5024d59812fd58961ace6e330935e1cdfee74a986931f5bb80930d398d46ae7644e10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001395ba4801166888568300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022422a0e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000080da7b5d8088ed6e5b0300"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 397.792779][T12464] BTRFS error (device loop1): superblock checksum mismatch 13:10:46 executing program 4: socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 397.951960][T12464] BTRFS error (device loop1): open_ctree failed 13:10:46 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x9, 0x0) 13:10:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 398.093329][T12486] BTRFS error (device loop4): superblock checksum mismatch 13:10:46 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:46 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x9, 0x0) [ 398.182642][T12486] BTRFS error (device loop4): open_ctree failed 13:10:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:46 executing program 4: socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:46 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x9, 0x0) 13:10:46 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x9, 0x0) [ 398.559019][T12508] BTRFS error (device loop1): superblock checksum mismatch [ 398.566677][T12515] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop1 new:/dev/loop4 13:10:46 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x9, 0x0) 13:10:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 398.731748][T12508] BTRFS error (device loop1): open_ctree failed 13:10:47 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:47 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x9, 0x0) 13:10:47 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x9, 0x0) [ 398.983365][T12542] BTRFS error (device loop4): superblock checksum mismatch 13:10:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000040000000005f0300000600000099010000000000000000000000000000286463d662327da35fe7467311aec0091cdb4c5024d59812fd58961ace6e330935e1cdfee74a986931f5bb80930d398d46ae7644e10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001395ba4801166888568300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022422a0e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000080da7b5d8088ed6e5b0300"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 399.062390][T12548] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 13:10:47 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x9, 0x0) 13:10:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000040000000005f0300000600000099010000000000000000000000000000286463d662327da35fe7467311aec0091cdb4c5024d59812fd58961ace6e330935e1cdfee74a986931f5bb80930d398d46ae7644e10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001395ba4801166888568300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022422a0e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000080da7b5d8088ed6e5b0300"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 399.342305][T12542] BTRFS error (device loop4): open_ctree failed 13:10:47 executing program 1: socket$inet6(0xa, 0x0, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:47 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x9, 0x0) 13:10:47 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x9, 0x0) [ 399.602892][T12583] BTRFS error (device loop1): superblock checksum mismatch 13:10:47 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x9, 0x0) 13:10:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 399.691764][T12583] BTRFS error (device loop1): open_ctree failed 13:10:47 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x9, 0x0) 13:10:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:48 executing program 1: socket$inet6(0xa, 0x0, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:48 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x9, 0x0) [ 399.931851][T12601] BTRFS error (device loop4): superblock checksum mismatch 13:10:48 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000040000000005f0300000600000099010000000000000000000000000000286463d662327da35fe7467311aec0091cdb4c5024d59812fd58961ace6e330935e1cdfee74a986931f5bb80930d398d46ae7644e10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001395ba4801166888568300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022422a0e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000080da7b5d8088ed6e5b0300"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 400.064192][T12601] BTRFS error (device loop4): open_ctree failed 13:10:48 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x9, 0x0) 13:10:48 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x9, 0x0) [ 400.152821][T12618] BTRFS error (device loop1): superblock checksum mismatch 13:10:48 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 400.311843][T12618] BTRFS error (device loop1): open_ctree failed 13:10:48 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x9, 0x0) 13:10:48 executing program 4: socket$inet6(0xa, 0x0, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:48 executing program 1: socket$inet6(0xa, 0x0, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:48 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:48 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x9, 0x0) 13:10:48 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x9, 0x0) 13:10:49 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x9, 0x0) [ 400.750487][T12663] BTRFS error (device loop4): superblock checksum mismatch [ 400.764847][T12666] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 13:10:49 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:49 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 400.892698][T12663] BTRFS error (device loop4): open_ctree failed 13:10:49 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x9, 0x0) 13:10:49 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:49 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x9, 0x0) 13:10:49 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000040000000005f0300000600000099010000000000000000000000000000286463d662327da35fe7467311aec0091cdb4c5024d59812fd58961ace6e330935e1cdfee74a986931f5bb80930d398d46ae7644e10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001395ba4801166888568300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022422a0e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000080da7b5d8088ed6e5b0300"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 401.228609][T12698] BTRFS error (device loop1): superblock checksum mismatch 13:10:49 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:49 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x9, 0x0) [ 401.331787][T12698] BTRFS error (device loop1): open_ctree failed 13:10:49 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x9, 0x0) 13:10:49 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:49 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x9, 0x0) 13:10:49 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x10000}], 0x9, 0x0) [ 401.606897][T12723] BTRFS error (device loop4): superblock checksum mismatch [ 401.721777][T12723] BTRFS error (device loop4): open_ctree failed 13:10:50 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x9, 0x0) 13:10:50 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 401.911928][T12743] BTRFS error (device loop1): superblock checksum mismatch 13:10:50 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x10000}], 0x9, 0x0) [ 402.001776][T12743] BTRFS error (device loop1): open_ctree failed 13:10:50 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x9, 0x0) 13:10:50 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x9, 0x0) [ 402.154137][T12758] BTRFS error (device loop4): superblock checksum mismatch [ 402.211761][T12758] BTRFS error (device loop4): open_ctree failed 13:10:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:50 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:50 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:50 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x9, 0x0) 13:10:50 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x9, 0x0) 13:10:50 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x10000}], 0x9, 0x0) 13:10:50 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 402.786926][T12805] BTRFS error (device loop4): superblock checksum mismatch [ 402.903933][T12805] BTRFS error (device loop4): open_ctree failed 13:10:51 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x9, 0x0) 13:10:51 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x9, 0x0) 13:10:51 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x9, 0x0) 13:10:51 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:51 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x9, 0x0) 13:10:51 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000040000000005f0300000600000099010000000000000000000000000000286463d662327da35fe7467311aec0091cdb4c5024d59812fd58961ace6e330935e1cdfee74a986931f5bb80930d398d46ae7644e10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001395ba4801166888568300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022422a0e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000080da7b5d8088ed6e5b0300"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:51 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x9, 0x0) 13:10:51 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x9, 0x0) [ 403.576673][T12859] BTRFS error (device loop4): superblock checksum mismatch [ 403.661734][T12859] BTRFS error (device loop4): open_ctree failed 13:10:51 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x9, 0x0) 13:10:51 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:52 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x9, 0x0) 13:10:52 executing program 4: socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:52 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x9, 0x0) 13:10:52 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:52 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x9, 0x0) 13:10:52 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x9, 0x0) [ 404.186247][T12896] BTRFS error (device loop4): superblock checksum mismatch [ 404.269811][T12896] BTRFS error (device loop4): open_ctree failed 13:10:52 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x9, 0x0) 13:10:52 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:52 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:52 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x9, 0x0) 13:10:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r4, r5, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:52 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x9, 0x0) 13:10:53 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x9, 0x0) [ 404.882796][T12947] BTRFS error (device loop4): superblock checksum mismatch 13:10:53 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x9, 0x0) 13:10:53 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x9, 0x0) 13:10:53 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x9, 0x0) [ 405.081743][T12947] BTRFS error (device loop4): open_ctree failed 13:10:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r4, r5, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:53 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x9, 0x0) 13:10:53 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x9, 0x0) 13:10:53 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x9, 0x0) [ 405.580141][T12991] BTRFS error (device loop4): superblock checksum mismatch 13:10:53 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x9, 0x0) 13:10:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:53 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x9, 0x0) [ 405.671784][T12991] BTRFS error (device loop4): open_ctree failed 13:10:54 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x9, 0x0) 13:10:54 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x9, 0x0) 13:10:54 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x9, 0x0) 13:10:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r4, r5, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:54 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x9, 0x0) 13:10:54 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x9, 0x0) [ 406.265016][T13035] BTRFS error (device loop4): superblock checksum mismatch 13:10:54 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x9, 0x0) 13:10:54 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x9, 0x0) [ 406.351762][T13035] BTRFS error (device loop4): open_ctree failed 13:10:54 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x9, 0x0) 13:10:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:54 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x9, 0x0) 13:10:54 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x9, 0x0) [ 406.821400][T13080] BTRFS error (device loop4): superblock checksum mismatch 13:10:55 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x9, 0x0) 13:10:55 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x9, 0x0) [ 406.931785][T13080] BTRFS error (device loop4): open_ctree failed 13:10:55 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:55 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x9, 0x0) 13:10:55 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x9, 0x0) 13:10:55 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x9, 0x0) 13:10:55 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x9, 0x0) [ 407.374345][T13116] BTRFS error (device loop4): superblock checksum mismatch 13:10:55 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x9, 0x0) [ 407.481788][T13116] BTRFS error (device loop4): open_ctree failed 13:10:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:56 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x9, 0x0) 13:10:56 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x9, 0x0) 13:10:56 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:56 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x10000}], 0x9, 0x0) 13:10:56 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:10:56 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x9, 0x0) [ 408.097544][T13160] BTRFS error (device loop4): superblock checksum mismatch 13:10:56 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x10000}], 0x9, 0x0) 13:10:56 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x9, 0x0) [ 408.201767][T13160] BTRFS error (device loop4): open_ctree failed 13:10:56 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:56 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:10:56 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 408.728110][T13203] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop5 [ 408.745536][T13205] BTRFS error (device loop4): superblock checksum mismatch 13:10:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:57 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x9, 0x0) [ 408.841715][T13205] BTRFS error (device loop4): open_ctree failed 13:10:57 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:10:57 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x10000}], 0x9, 0x0) 13:10:57 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:10:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:57 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x9, 0x0) 13:10:57 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:10:57 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x9, 0x0) 13:10:57 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x9, 0x0) 13:10:57 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000000440)={0x2, 0x52, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000340)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f0000000680)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast2}}}, 0x108) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1, 0x3fa) ioctl$KVM_ASSIGN_DEV_IRQ(r2, 0x4040ae70, &(0x7f0000000300)={0x4, 0x1, 0x7fffffff}) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) read(0xffffffffffffffff, 0x0, 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(r1, r1, 0x0, 0x24000000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/132, 0x397) shutdown(0xffffffffffffffff, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000180)) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001740)) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000040)=0x1c, 0x100000) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000500)={"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"}) ioctl$KVM_GET_MSRS(r4, 0xc008ae88, &(0x7f0000001280)={0x1, 0x0, [{}]}) [ 409.523654][T13250] BTRFS error (device loop4): superblock checksum mismatch [ 409.581798][T13250] BTRFS error (device loop4): open_ctree failed 13:10:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") fcntl$dupfd(r1, 0x0, r0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:58 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:58 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000004c0)=@ipv6_delrule={0x48, 0x21, 0x11, 0x0, 0x0, {0xa, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_SRC={0x14, 0x2, @remote}, @FRA_SRC={0x14, 0x2, @ipv4={[], [], @loopback}}]}, 0x48}}, 0x0) 13:10:58 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x9, 0x0) 13:10:58 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x9, 0x0) [ 409.942700][ T2503] print_req_error: 250 callbacks suppressed [ 409.942727][ T2503] blk_update_request: I/O error, dev loop0, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 409.960448][ T2503] buffer_io_error: 249 callbacks suppressed [ 409.960459][ T2503] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 409.975404][ T2503] blk_update_request: I/O error, dev loop0, sector 4 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 13:10:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="70010000240007050400"/20, @ANYRES32=r1, @ANYBLOB="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"], 0x170}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 409.986802][ T2503] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 409.995564][ T2503] blk_update_request: I/O error, dev loop0, sector 8 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 410.007107][ T2503] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 410.015499][ T2503] blk_update_request: I/O error, dev loop0, sector 12 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 410.027395][ T2503] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 410.035923][ T2503] blk_update_request: I/O error, dev loop0, sector 16 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 410.047146][ T2503] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 410.049468][T13277] blk_update_request: I/O error, dev loop0, sector 20 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 410.055570][ T2503] blk_update_request: I/O error, dev loop0, sector 24 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 410.055586][ T2503] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 410.055621][ T2503] blk_update_request: I/O error, dev loop0, sector 28 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 410.066851][T13277] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 410.078198][ T2503] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 410.078298][ T2503] blk_update_request: I/O error, dev loop0, sector 32 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 410.086651][T13277] blk_update_request: I/O error, dev loop0, sector 36 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 410.098041][ T2503] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 410.106187][T13277] Buffer I/O error on dev loop0, logical block 9, lost async page write [ 410.187418][T13289] BTRFS error (device loop4): superblock checksum mismatch 13:10:58 executing program 3: poll(&(0x7f0000000140)=[{}], 0x1, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xccf3, 0x0, 0x0, 0x800e00551) dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) shutdown(r0, 0x0) [ 410.301881][T13289] BTRFS error (device loop4): open_ctree failed 13:10:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/55, 0x37}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x2) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) read(r3, &(0x7f0000000080)=""/203, 0x100000070) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0x27c7, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000017c0), 0x7}, 0x0) shutdown(r2, 0x0) 13:10:58 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x9, 0x0) 13:10:58 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x9, 0x0) 13:10:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:58 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x9, 0x0) [ 410.847130][T13345] BTRFS error (device loop4): superblock checksum mismatch [ 410.881764][T13345] BTRFS error (device loop4): open_ctree failed 13:10:59 executing program 3: socket$inet6_sctp(0xa, 0x0, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(0x0, 0x400, 0x204) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 13:10:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:10:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:10:59 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x9, 0x0) 13:10:59 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x9, 0x0) [ 411.344594][T13381] BTRFS error (device loop4): superblock checksum mismatch 13:10:59 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32, @ANYBLOB="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"], 0x34}}, 0x0) [ 411.421753][T13381] BTRFS error (device loop4): open_ctree failed 13:10:59 executing program 5: pipe(0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00\xb4\xeb/\xae\xc1G\xe2\xb0\x81y\'\xadG\xd5\xcc\xb5\xef', 0x275a, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) sendmmsg(0xffffffffffffffff, &(0x7f0000000a40), 0x8000000000000b0, 0x0) write$cgroup_int(r1, 0x0, 0x0) 13:10:59 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x9, 0x0) 13:10:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 411.642411][T13404] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:10:59 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x9, 0x0) [ 411.761271][T13411] BTRFS error (device loop4): superblock checksum mismatch [ 411.769592][T13416] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 411.851824][T13411] BTRFS error (device loop4): open_ctree failed 13:11:00 executing program 3: socket$inet6(0xa, 0x3, 0x3) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast2}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x388ece9b3ecb14f0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x37) r2 = memfd_create(&(0x7f0000000180)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="66648c810038e8496352af74aa9a0da098a0109071808eea6196e801192ab2323274e6faaea21f7d2f8dbdf04d21ecca8d04cf48db56df0400000000000000709f02818b017ae793680e08043283fb2d97ca7bf287ffa2b204ac298325", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000300)) r5 = socket$inet6(0xa, 0x2, 0x0) dup3(r5, r3, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000100)=ANY=[@ANYRESDEC=r3, @ANYRES64, @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRESDEC, @ANYRESOCT=r1], @ANYRESOCT=r3, @ANYPTR], 0x43) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x44005025) ftruncate(r2, 0x9) pipe2(&(0x7f0000000180), 0x4000) 13:11:00 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x9, 0x0) 13:11:00 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x9, 0x0) 13:11:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:11:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:00 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x9, 0x0) 13:11:00 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x9, 0x0) 13:11:00 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'gre0\x00'}) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) getpgid(0x0) getuid() mount$9p_unix(0x0, 0x0, 0x0, 0x0, 0x0) [ 412.409888][T13455] BTRFS error (device loop4): superblock checksum mismatch [ 412.481881][T13455] BTRFS error (device loop4): open_ctree failed 13:11:02 executing program 5: pipe(0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00\xb4\xeb/\xae\xc1G\xe2\xb0\x81y\'\xadG\xd5\xcc\xb5\xef', 0x275a, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) sendmmsg(0xffffffffffffffff, &(0x7f0000000a40), 0x8000000000000b0, 0x0) write$cgroup_int(r1, 0x0, 0x0) 13:11:02 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x9, 0x0) 13:11:02 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x9, 0x0) 13:11:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:02 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000700)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) syz_open_dev$vcsn(0x0, 0x81, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 13:11:02 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:11:03 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x9, 0x0) [ 414.807653][T13488] BTRFS error (device loop4): superblock checksum mismatch 13:11:03 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000700)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) syz_open_dev$vcsn(0x0, 0x81, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 13:11:03 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x9, 0x0) [ 414.881796][T13488] BTRFS error (device loop4): open_ctree failed 13:11:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:03 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:11:03 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x52, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x400000, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') preadv(r2, &(0x7f0000001380)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r2, 0x4040ae70, &(0x7f0000000300)={0x0, 0x1, 0x7fffffff, 0x702}) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/132, 0x397) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(r1, r1, 0x0, 0x24000000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/132, 0x397) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001740)) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) accept4$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000040)=0x1c, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@v1={0x2, "e9ee49b68544896711"}, 0xa, 0x7d4e1696091c44cc) [ 415.201086][T13521] BTRFS error (device loop4): superblock checksum mismatch [ 415.251756][T13521] BTRFS error (device loop4): open_ctree failed [ 415.662734][T13530] print_req_error: 249 callbacks suppressed [ 415.662769][T13530] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 13:11:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) read(r3, &(0x7f0000000080)=""/203, 0x100000070) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0x27c7, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000017c0), 0x7}, 0x0) shutdown(r5, 0x0) 13:11:09 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x9, 0x0) 13:11:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:09 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:11:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[], 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:11:09 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x52, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x400000, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') preadv(r2, &(0x7f0000001380)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r2, 0x4040ae70, &(0x7f0000000300)={0x0, 0x1, 0x7fffffff, 0x702}) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/132, 0x397) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(r1, r1, 0x0, 0x24000000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/132, 0x397) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001740)) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) accept4$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000040)=0x1c, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@v1={0x2, "e9ee49b68544896711"}, 0xa, 0x7d4e1696091c44cc) 13:11:09 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x9, 0x0) [ 421.123128][T13559] BTRFS error (device loop4): superblock checksum mismatch 13:11:09 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 421.224676][T13560] blk_update_request: I/O error, dev loop0, sector 256 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 [ 421.242075][T13559] BTRFS error (device loop4): open_ctree failed [ 421.273311][ T2503] blk_update_request: I/O error, dev loop0, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 421.284580][ T2503] buffer_io_error: 249 callbacks suppressed [ 421.284591][ T2503] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 421.299276][ T2503] blk_update_request: I/O error, dev loop0, sector 4 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 421.310554][ T2503] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 421.319843][ T2503] blk_update_request: I/O error, dev loop0, sector 8 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 421.331042][ T2503] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 421.339577][ T2503] blk_update_request: I/O error, dev loop0, sector 12 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 421.350820][ T2503] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 421.359312][ T2503] blk_update_request: I/O error, dev loop0, sector 16 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 421.370582][ T2503] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 421.379085][ T2503] blk_update_request: I/O error, dev loop0, sector 20 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 421.381850][T13560] blk_update_request: I/O error, dev loop0, sector 24 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 421.390682][ T2503] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 421.401847][T13560] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 421.410100][ T2503] blk_update_request: I/O error, dev loop0, sector 28 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 421.418538][T13560] blk_update_request: I/O error, dev loop0, sector 32 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 421.429820][ T2503] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 421.441097][T13560] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 421.449466][ T2503] Buffer I/O error on dev loop0, logical block 9, lost async page write 13:11:09 executing program 3: 13:11:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:10 executing program 2: 13:11:10 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x9, 0x0) [ 421.892156][T13597] BTRFS error (device loop4): superblock checksum mismatch [ 421.961762][T13597] BTRFS error (device loop4): open_ctree failed 13:11:17 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000070e00)='./file0\x00', 0x20060, 0x16) 13:11:17 executing program 3: 13:11:17 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[], 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:11:17 executing program 2: 13:11:17 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x9, 0x0) 13:11:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:17 executing program 3: r0 = open(&(0x7f0000001480)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) openat(r0, &(0x7f00000012c0)='./file0\x00', 0x180500, 0x8) 13:11:17 executing program 2: [ 429.640115][T13628] BTRFS error (device loop4): superblock checksum mismatch 13:11:18 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x9, 0x0) 13:11:18 executing program 2: [ 429.781730][T13628] BTRFS error (device loop4): open_ctree failed 13:11:18 executing program 3: 13:11:18 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 430.118070][T13666] BTRFS error (device loop4): superblock checksum mismatch [ 430.181852][T13666] BTRFS error (device loop4): open_ctree failed 13:11:22 executing program 5: 13:11:22 executing program 2: 13:11:22 executing program 3: 13:11:22 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x9, 0x0) 13:11:22 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:22 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[], 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:11:23 executing program 3: 13:11:23 executing program 2: [ 434.943030][T13692] BTRFS error (device loop4): superblock checksum mismatch 13:11:23 executing program 3: 13:11:23 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x9, 0x0) [ 434.999407][T13692] BTRFS error (device loop4): open_ctree failed 13:11:23 executing program 2: 13:11:23 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 435.365356][T13726] BTRFS error (device loop4): superblock checksum mismatch [ 435.392247][T13726] BTRFS error (device loop4): open_ctree failed 13:11:27 executing program 5: 13:11:27 executing program 3: 13:11:27 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x9, 0x0) 13:11:27 executing program 2: 13:11:27 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB], 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:11:27 executing program 2: 13:11:27 executing program 3: 13:11:27 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x9, 0x0) [ 439.098244][T13748] BTRFS error (device loop4): superblock checksum mismatch [ 439.161750][T13748] BTRFS error (device loop4): open_ctree failed 13:11:27 executing program 3: 13:11:27 executing program 2: 13:11:27 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 439.490877][T13777] BTRFS error (device loop4): superblock checksum mismatch [ 439.551823][T13777] BTRFS error (device loop4): open_ctree failed 13:11:31 executing program 5: 13:11:31 executing program 2: 13:11:31 executing program 3: 13:11:31 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x9, 0x0) 13:11:31 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:31 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB], 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:11:31 executing program 2: 13:11:31 executing program 3: [ 443.293855][T13798] BTRFS error (device loop4): superblock checksum mismatch 13:11:31 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x9, 0x0) [ 443.401858][T13798] BTRFS error (device loop4): open_ctree failed 13:11:31 executing program 2: 13:11:31 executing program 3: 13:11:31 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 443.771588][T13830] BTRFS error (device loop4): superblock checksum mismatch [ 443.822833][T13830] BTRFS error (device loop4): open_ctree failed 13:11:35 executing program 5: 13:11:35 executing program 2: 13:11:35 executing program 3: 13:11:35 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x9, 0x0) 13:11:35 executing program 4: socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB], 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:11:35 executing program 3: 13:11:35 executing program 2: [ 447.496196][T13849] BTRFS error (device loop4): superblock checksum mismatch [ 447.551823][T13849] BTRFS error (device loop4): open_ctree failed 13:11:35 executing program 3: 13:11:35 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) mount$9p_tcp(0x0, 0x0, &(0x7f00000000c0)='9p\x00', 0x1004404, 0x0) 13:11:36 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x9, 0x0) 13:11:36 executing program 4: socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 447.949361][T13878] BTRFS error (device loop4): superblock checksum mismatch [ 448.002363][T13878] BTRFS error (device loop4): open_ctree failed 13:11:43 executing program 5: 13:11:43 executing program 3: r0 = syz_open_dev$tty(&(0x7f00000004c0)='/dev/ttyS#\x00', 0x2000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 13:11:43 executing program 2: poll(0x0, 0x0, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xccf3, 0x0, 0x0, 0x800e00551) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000840)=""/227, 0xe3}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r2, 0x0) r4 = dup(r3) r5 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) shutdown(r4, 0x0) shutdown(r0, 0x0) 13:11:43 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x9, 0x0) 13:11:43 executing program 4: socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/463], 0x1cf) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:11:44 executing program 3: r0 = syz_open_dev$tty(&(0x7f00000004c0)='/dev/ttyS#\x00', 0x2000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 13:11:44 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 455.884065][T13901] BTRFS error (device loop4): superblock checksum mismatch 13:11:44 executing program 3: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) write$cgroup_type(r3, &(0x7f00000000c0)='threaded\x00', 0xfffffe2f) clone(0x1000109, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000040)='./file0\x00') ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x29) open(&(0x7f0000000080)='./bus\x00', 0x141046, 0x0) [ 455.981758][T13901] BTRFS error (device loop4): open_ctree failed 13:11:44 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:44 executing program 3: socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 456.144540][T13931] ptrace attach of "/root/syz-executor.3"[13930] was attempted by "/root/syz-executor.3"[13931] 13:11:44 executing program 2: socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 456.301193][T13936] BTRFS error (device loop4): superblock checksum mismatch [ 456.343156][T13936] BTRFS error (device loop4): open_ctree failed [ 456.377794][T13940] BTRFS error (device loop3): superblock checksum mismatch [ 456.426529][T13944] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop2 [ 456.534150][T13940] BTRFS error (device loop3): open_ctree failed 13:11:48 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:48 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:11:48 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:48 executing program 2: socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:48 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:48 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/463], 0x1cf) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 460.067399][T13966] BTRFS error (device loop4): superblock checksum mismatch [ 460.073060][T13965] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop2 [ 460.155418][T13972] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 13:11:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:48 executing program 1: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 460.241755][T13966] BTRFS error (device loop4): open_ctree failed [ 460.302051][T13978] BTRFS error (device loop3): superblock checksum mismatch 13:11:48 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 460.371794][T13978] BTRFS error (device loop3): open_ctree failed 13:11:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 460.593026][T13996] BTRFS error (device loop2): superblock checksum mismatch [ 460.621936][T13996] BTRFS error (device loop2): open_ctree failed [ 460.631590][T14003] BTRFS error (device loop4): superblock checksum mismatch 13:11:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 460.739538][T14003] BTRFS error (device loop4): open_ctree failed [ 460.806266][T14011] BTRFS error (device loop3): superblock checksum mismatch [ 460.861773][T14011] BTRFS error (device loop3): open_ctree failed [ 460.940984][T14015] BTRFS error (device loop1): superblock checksum mismatch [ 460.969250][T14019] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop1 new:/dev/loop2 [ 461.171780][T14015] BTRFS error (device loop1): open_ctree failed [ 466.198282][T14031] BTRFS error (device loop5): superblock checksum mismatch [ 466.241744][T14031] BTRFS error (device loop5): open_ctree failed 13:11:54 executing program 5 (fault-call:1 fault-nth:0): socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:11:54 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000040000000005f0300000600000099010000000000000000000000000000286463d662327da35fe7467311aec0091cdb4c5024d59812fd58961ace6e330935e1cdfee74a986931f5bb80930d398d46ae7644e10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001395ba4801166888568300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022422a0e00"/463], 0x1cf) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:11:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) socket$inet6(0xa, 0x80003, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x30000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:54 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/925], 0x39d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) [ 466.407115][T14047] BTRFS error (device loop3): superblock checksum mismatch [ 466.418651][T14039] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop2 [ 466.561887][T14046] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop4 13:11:54 executing program 2 (fault-call:2 fault-nth:0): r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 466.611717][T14047] BTRFS error (device loop3): open_ctree failed 13:11:54 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:55 executing program 3 (fault-call:2 fault-nth:0): r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 466.784417][T14065] FAULT_INJECTION: forcing a failure. [ 466.784417][T14065] name failslab, interval 1, probability 0, space 0, times 1 [ 466.851872][T14065] CPU: 1 PID: 14065 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 466.857179][T14066] BTRFS error (device loop4): superblock checksum mismatch [ 466.860237][T14065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.860242][T14065] Call Trace: [ 466.860269][T14065] dump_stack+0x11d/0x181 [ 466.860287][T14065] should_fail.cold+0xa/0x1a [ 466.860317][T14065] __should_failslab+0xee/0x130 [ 466.882645][T14071] FAULT_INJECTION: forcing a failure. [ 466.882645][T14071] name failslab, interval 1, probability 0, space 0, times 1 [ 466.885177][T14065] should_failslab+0x9/0x14 [ 466.885201][T14065] __kmalloc+0x53/0x690 [ 466.915835][T14065] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 466.922161][T14065] ? fput_many+0xec/0x130 [ 466.926499][T14065] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 466.932743][T14065] ? strnlen_user+0x1a8/0x220 [ 466.937422][T14065] ? __x64_sys_memfd_create+0xdb/0x370 [ 466.942935][T14065] __x64_sys_memfd_create+0xdb/0x370 [ 466.948216][T14065] do_syscall_64+0xcc/0x370 [ 466.952744][T14065] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 466.958804][T14065] RIP: 0033:0x45a679 [ 466.962768][T14065] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 466.982365][T14065] RSP: 002b:00007f6fd8d5ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 466.990837][T14065] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 000000000045a679 13:11:55 executing program 1 (fault-call:2 fault-nth:0): r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 466.998846][T14065] RDX: 00000000200000e8 RSI: 0000000000000000 RDI: 00000000004bf712 [ 467.006846][T14065] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 467.014816][T14065] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6fd8d5f6d4 [ 467.022810][T14065] R13: 00000000004ca97f R14: 00000000004e3d90 R15: 0000000000000004 [ 467.030933][T14071] CPU: 0 PID: 14071 Comm: syz-executor.3 Not tainted 5.4.0-syzkaller #0 [ 467.039274][T14071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.049440][T14071] Call Trace: [ 467.052737][T14071] dump_stack+0x11d/0x181 [ 467.057071][T14071] should_fail.cold+0xa/0x1a [ 467.061727][T14071] __should_failslab+0xee/0x130 [ 467.066584][T14071] should_failslab+0x9/0x14 [ 467.071087][T14071] __kmalloc+0x53/0x690 [ 467.075291][T14071] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 467.078893][T14073] FAULT_INJECTION: forcing a failure. [ 467.078893][T14073] name failslab, interval 1, probability 0, space 0, times 0 [ 467.081531][T14071] ? fput_many+0xec/0x130 [ 467.081550][T14071] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 467.081566][T14071] ? strnlen_user+0x1a8/0x220 [ 467.081593][T14071] ? __x64_sys_memfd_create+0xdb/0x370 [ 467.114868][T14071] __x64_sys_memfd_create+0xdb/0x370 [ 467.120178][T14071] do_syscall_64+0xcc/0x370 [ 467.124680][T14071] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 467.130669][T14071] RIP: 0033:0x45a679 [ 467.134639][T14071] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 467.154231][T14071] RSP: 002b:00007f57ed126a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 467.162629][T14071] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 000000000045a679 [ 467.170646][T14071] RDX: 00000000200000e8 RSI: 0000000000000000 RDI: 00000000004bf712 [ 467.178606][T14071] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 467.186566][T14071] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f57ed1276d4 [ 467.194674][T14071] R13: 00000000004ca97f R14: 00000000004e3d90 R15: 0000000000000004 [ 467.202688][T14073] CPU: 1 PID: 14073 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 467.211064][T14073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.221113][T14073] Call Trace: [ 467.224407][T14073] dump_stack+0x11d/0x181 [ 467.228739][T14073] should_fail.cold+0xa/0x1a [ 467.233372][T14073] __should_failslab+0xee/0x130 [ 467.238226][T14073] should_failslab+0x9/0x14 [ 467.242822][T14073] __kmalloc+0x53/0x690 [ 467.247056][T14073] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 467.253316][T14073] ? fput_many+0xec/0x130 [ 467.257660][T14073] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 467.263927][T14073] ? strnlen_user+0x1a8/0x220 [ 467.268668][T14073] ? __x64_sys_memfd_create+0xdb/0x370 [ 467.274243][T14073] __x64_sys_memfd_create+0xdb/0x370 [ 467.279536][T14073] do_syscall_64+0xcc/0x370 [ 467.284176][T14073] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 467.290133][T14073] RIP: 0033:0x45a679 [ 467.294039][T14073] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 467.313646][T14073] RSP: 002b:00007ff2ff879a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 467.322177][T14073] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 000000000045a679 [ 467.330140][T14073] RDX: 00000000200000e8 RSI: 0000000000000000 RDI: 00000000004bf712 [ 467.338186][T14073] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 467.346229][T14073] R10: 0000000000010000 R11: 0000000000000246 R12: 00007ff2ff87a6d4 13:11:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x2b6) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:11:55 executing program 3 (fault-call:2 fault-nth:1): r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 467.354198][T14073] R13: 00000000004ca97f R14: 00000000004e3d90 R15: 0000000000000004 [ 467.411806][T14066] BTRFS error (device loop4): open_ctree failed [ 467.449981][T14080] FAULT_INJECTION: forcing a failure. [ 467.449981][T14080] name failslab, interval 1, probability 0, space 0, times 0 [ 467.463152][T14080] CPU: 1 PID: 14080 Comm: syz-executor.3 Not tainted 5.4.0-syzkaller #0 [ 467.471484][T14080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.481668][T14080] Call Trace: [ 467.484992][T14080] dump_stack+0x11d/0x181 [ 467.489344][T14080] should_fail.cold+0xa/0x1a [ 467.493983][T14080] __should_failslab+0xee/0x130 [ 467.498850][T14080] should_failslab+0x9/0x14 [ 467.503397][T14080] kmem_cache_alloc+0x29/0x5d0 [ 467.508210][T14080] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 467.514446][T14080] ? _kstrtoull+0xfc/0x130 [ 467.518888][T14080] ? shmem_destroy_inode+0x70/0x70 [ 467.524083][T14080] shmem_alloc_inode+0x31/0x60 [ 467.529041][T14080] alloc_inode+0x48/0x130 [ 467.533382][T14080] new_inode_pseudo+0x35/0xe0 [ 467.538083][T14080] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 467.544363][T14080] new_inode+0x28/0x50 [ 467.548465][T14080] shmem_get_inode+0x85/0x490 [ 467.553136][T14080] ? _raw_spin_unlock+0x4b/0x60 [ 467.557982][T14080] __shmem_file_setup.part.0+0x6f/0x1f0 [ 467.563514][T14080] shmem_file_setup+0x7b/0xa0 [ 467.568179][T14080] __x64_sys_memfd_create+0x20d/0x370 [ 467.573548][T14080] do_syscall_64+0xcc/0x370 [ 467.578127][T14080] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 467.584063][T14080] RIP: 0033:0x45a679 [ 467.588023][T14080] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 467.607627][T14080] RSP: 002b:00007f57ed126a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 467.616030][T14080] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 000000000045a679 [ 467.624036][T14080] RDX: 00000000200000e8 RSI: 0000000000000000 RDI: 00000000004bf712 [ 467.632018][T14080] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 467.639981][T14080] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f57ed1276d4 [ 467.648062][T14080] R13: 00000000004ca97f R14: 00000000004e3d90 R15: 0000000000000004 13:11:59 executing program 5: socket$inet6(0xa, 0x80003, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:11:59 executing program 2 (fault-call:2 fault-nth:1): r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:59 executing program 1 (fault-call:2 fault-nth:1): r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x2b6) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:11:59 executing program 3 (fault-call:2 fault-nth:2): r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:11:59 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 471.436313][T14095] FAULT_INJECTION: forcing a failure. [ 471.436313][T14095] name failslab, interval 1, probability 0, space 0, times 0 [ 471.449602][T14099] FAULT_INJECTION: forcing a failure. [ 471.449602][T14099] name failslab, interval 1, probability 0, space 0, times 0 [ 471.451441][T14095] CPU: 1 PID: 14095 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 471.470538][T14095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.480936][T14095] Call Trace: [ 471.484249][T14095] dump_stack+0x11d/0x181 [ 471.489006][T14095] should_fail.cold+0xa/0x1a [ 471.493593][T14095] __should_failslab+0xee/0x130 [ 471.498572][T14095] should_failslab+0x9/0x14 [ 471.503066][T14095] kmem_cache_alloc+0x29/0x5d0 [ 471.507903][T14095] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 471.514195][T14095] ? _kstrtoull+0xfc/0x130 [ 471.518722][T14095] ? shmem_destroy_inode+0x70/0x70 [ 471.523838][T14095] shmem_alloc_inode+0x31/0x60 [ 471.528652][T14095] alloc_inode+0x48/0x130 [ 471.532990][T14095] new_inode_pseudo+0x35/0xe0 [ 471.537656][T14095] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 471.544606][T14095] new_inode+0x28/0x50 [ 471.548684][T14095] shmem_get_inode+0x85/0x490 [ 471.553361][T14095] ? _raw_spin_unlock+0x4b/0x60 [ 471.558204][T14095] __shmem_file_setup.part.0+0x6f/0x1f0 [ 471.564728][T14095] shmem_file_setup+0x7b/0xa0 [ 471.569661][T14095] __x64_sys_memfd_create+0x20d/0x370 [ 471.575044][T14095] do_syscall_64+0xcc/0x370 [ 471.579563][T14095] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 471.585502][T14095] RIP: 0033:0x45a679 [ 471.589396][T14095] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 471.609004][T14095] RSP: 002b:00007ff2ff879a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 471.617456][T14095] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 000000000045a679 [ 471.625488][T14095] RDX: 00000000200000e8 RSI: 0000000000000000 RDI: 00000000004bf712 [ 471.633518][T14095] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 471.641505][T14095] R10: 0000000000010000 R11: 0000000000000246 R12: 00007ff2ff87a6d4 [ 471.649477][T14095] R13: 00000000004ca97f R14: 00000000004e3d90 R15: 0000000000000004 [ 471.663061][T14097] FAULT_INJECTION: forcing a failure. [ 471.663061][T14097] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 471.663420][T14099] CPU: 1 PID: 14099 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 471.684786][T14099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.694827][T14099] Call Trace: [ 471.698279][T14099] dump_stack+0x11d/0x181 [ 471.702639][T14099] should_fail.cold+0xa/0x1a [ 471.707223][T14099] __should_failslab+0xee/0x130 [ 471.712075][T14099] should_failslab+0x9/0x14 [ 471.716566][T14099] kmem_cache_alloc+0x29/0x5d0 [ 471.721346][T14099] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 471.727691][T14099] ? _kstrtoull+0xfc/0x130 [ 471.732112][T14099] ? shmem_destroy_inode+0x70/0x70 [ 471.737285][T14099] shmem_alloc_inode+0x31/0x60 [ 471.742057][T14099] alloc_inode+0x48/0x130 [ 471.746379][T14099] new_inode_pseudo+0x35/0xe0 [ 471.751046][T14099] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 471.757338][T14099] new_inode+0x28/0x50 [ 471.761462][T14099] shmem_get_inode+0x85/0x490 [ 471.766169][T14099] ? _raw_spin_unlock+0x4b/0x60 [ 471.771016][T14099] __shmem_file_setup.part.0+0x6f/0x1f0 [ 471.776574][T14099] shmem_file_setup+0x7b/0xa0 [ 471.781262][T14099] __x64_sys_memfd_create+0x20d/0x370 [ 471.786636][T14099] do_syscall_64+0xcc/0x370 [ 471.791205][T14099] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 471.797094][T14099] RIP: 0033:0x45a679 [ 471.801010][T14099] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 471.820604][T14099] RSP: 002b:00007f6fd8d5ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 471.829046][T14099] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 000000000045a679 [ 471.837005][T14099] RDX: 00000000200000e8 RSI: 0000000000000000 RDI: 00000000004bf712 [ 471.845049][T14099] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 471.853010][T14099] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6fd8d5f6d4 [ 471.861078][T14099] R13: 00000000004ca97f R14: 00000000004e3d90 R15: 0000000000000004 [ 471.869063][T14097] CPU: 0 PID: 14097 Comm: syz-executor.3 Not tainted 5.4.0-syzkaller #0 [ 471.877420][T14097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.887478][T14097] Call Trace: [ 471.890777][T14097] dump_stack+0x11d/0x181 [ 471.895120][T14097] should_fail.cold+0xa/0x1a [ 471.899897][T14097] should_fail_alloc_page+0x50/0x60 [ 471.905099][T14097] __alloc_pages_nodemask+0xd2/0x310 [ 471.910392][T14097] cache_grow_begin+0x76/0x670 [ 471.915171][T14097] kmem_cache_alloc+0x500/0x5d0 [ 471.920049][T14097] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 471.926291][T14097] ? _kstrtoull+0xfc/0x130 [ 471.930723][T14097] ? shmem_destroy_inode+0x70/0x70 [ 471.935844][T14097] shmem_alloc_inode+0x31/0x60 [ 471.940617][T14097] alloc_inode+0x48/0x130 [ 471.944955][T14097] new_inode_pseudo+0x35/0xe0 [ 471.949679][T14097] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 471.955935][T14097] new_inode+0x28/0x50 [ 471.960061][T14097] shmem_get_inode+0x85/0x490 [ 471.964747][T14097] ? _raw_spin_unlock+0x4b/0x60 [ 471.969614][T14097] __shmem_file_setup.part.0+0x6f/0x1f0 [ 471.975229][T14097] shmem_file_setup+0x7b/0xa0 [ 471.979917][T14097] __x64_sys_memfd_create+0x20d/0x370 [ 471.985361][T14097] do_syscall_64+0xcc/0x370 [ 471.989868][T14097] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 471.995898][T14097] RIP: 0033:0x45a679 [ 471.999825][T14097] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 472.019434][T14097] RSP: 002b:00007f57ed126a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 472.027904][T14097] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 000000000045a679 13:12:00 executing program 2 (fault-call:2 fault-nth:2): r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:12:00 executing program 1 (fault-call:2 fault-nth:2): r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 472.035873][T14097] RDX: 00000000200000e8 RSI: 0000000000000000 RDI: 00000000004bf712 [ 472.042064][T14106] FAULT_INJECTION: forcing a failure. [ 472.042064][T14106] name failslab, interval 1, probability 0, space 0, times 0 [ 472.043930][T14097] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 472.043949][T14097] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f57ed1276d4 [ 472.072453][T14097] R13: 00000000004ca97f R14: 00000000004e3d90 R15: 0000000000000004 [ 472.080487][T14106] CPU: 1 PID: 14106 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 472.088819][T14106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.098931][T14106] Call Trace: [ 472.102290][T14106] dump_stack+0x11d/0x181 [ 472.106633][T14106] should_fail.cold+0xa/0x1a [ 472.111291][T14106] __should_failslab+0xee/0x130 [ 472.113365][T14108] FAULT_INJECTION: forcing a failure. [ 472.113365][T14108] name failslab, interval 1, probability 0, space 0, times 0 [ 472.116149][T14106] should_failslab+0x9/0x14 [ 472.116189][T14106] kmem_cache_alloc+0x29/0x5d0 [ 472.138058][T14106] ? __write_once_size+0x5a/0xe0 [ 472.142989][T14106] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 472.148883][T14106] __d_alloc+0x52/0x4b0 [ 472.153170][T14106] ? timestamp_truncate+0x11b/0x160 [ 472.158366][T14106] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 472.164654][T14106] d_alloc_pseudo+0x27/0x70 [ 472.169181][T14106] alloc_file_pseudo+0x96/0x1b0 [ 472.174069][T14106] __shmem_file_setup.part.0+0xd4/0x1f0 [ 472.179628][T14106] shmem_file_setup+0x7b/0xa0 [ 472.184306][T14106] __x64_sys_memfd_create+0x20d/0x370 [ 472.189675][T14106] do_syscall_64+0xcc/0x370 [ 472.194193][T14106] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 472.200093][T14106] RIP: 0033:0x45a679 [ 472.204054][T14106] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 472.223648][T14106] RSP: 002b:00007f6fd8d5ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 472.232080][T14106] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 000000000045a679 [ 472.240110][T14106] RDX: 00000000200000e8 RSI: 0000000000000000 RDI: 00000000004bf712 [ 472.248068][T14106] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 472.256068][T14106] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6fd8d5f6d4 [ 472.264027][T14106] R13: 00000000004ca97f R14: 00000000004e3d90 R15: 0000000000000004 [ 472.293431][T14108] CPU: 0 PID: 14108 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 472.301787][T14108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.311838][T14108] Call Trace: [ 472.315138][T14108] dump_stack+0x11d/0x181 [ 472.319481][T14108] should_fail.cold+0xa/0x1a [ 472.324154][T14108] __should_failslab+0xee/0x130 [ 472.329015][T14108] should_failslab+0x9/0x14 [ 472.333530][T14108] kmem_cache_alloc+0x29/0x5d0 [ 472.338299][T14108] ? __write_once_size+0x5a/0xe0 [ 472.343244][T14108] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 472.349158][T14108] __d_alloc+0x52/0x4b0 [ 472.353499][T14108] ? timestamp_truncate+0x11b/0x160 [ 472.358740][T14108] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 472.365034][T14108] d_alloc_pseudo+0x27/0x70 [ 472.369586][T14108] alloc_file_pseudo+0x96/0x1b0 [ 472.374458][T14108] __shmem_file_setup.part.0+0xd4/0x1f0 [ 472.380077][T14108] shmem_file_setup+0x7b/0xa0 [ 472.384758][T14108] __x64_sys_memfd_create+0x20d/0x370 [ 472.390152][T14108] do_syscall_64+0xcc/0x370 [ 472.394730][T14108] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 472.400618][T14108] RIP: 0033:0x45a679 [ 472.404526][T14108] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 472.424128][T14108] RSP: 002b:00007ff2ff879a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 472.432600][T14108] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 000000000045a679 13:12:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000040000000005f0300000600000099010000000000000000000000000000286463d662327da35fe7467311aec0091cdb4c5024d59812fd58961ace6e330935e1cdfee74a986931f5bb80930d398d46ae7644e10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001395ba4801166888568300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022422a0e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000"], 0x2b6) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 13:12:00 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 13:12:00 executing program 2 (fault-call:2 fault-nth:3): r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 472.440572][T14108] RDX: 00000000200000e8 RSI: 0000000000000000 RDI: 00000000004bf712 [ 472.448573][T14108] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 472.456637][T14108] R10: 0000000000010000 R11: 0000000000000246 R12: 00007ff2ff87a6d4 [ 472.464606][T14108] R13: 00000000004ca97f R14: 00000000004e3d90 R15: 0000000000000004 [ 472.501811][T14114] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop3 [ 472.502425][T14098] BTRFS error (device loop4): superblock checksum mismatch [ 472.530863][T14116] FAULT_INJECTION: forcing a failure. [ 472.530863][T14116] name failslab, interval 1, probability 0, space 0, times 0 [ 472.555454][T14054] ================================================================== [ 472.563624][T14054] BUG: KCSAN: data-race in lru_add_drain_all / pagevec_lru_move_fn [ 472.565778][T14116] CPU: 0 PID: 14116 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 472.571510][T14054] [ 472.579926][T14116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.582227][T14054] read to 0xffff88812bf27620 of 1 bytes by task 14098 on cpu 0: [ 472.582258][T14054] lru_add_drain_all+0xf5/0x350 [ 472.592284][T14116] Call Trace: [ 472.599897][T14054] invalidate_bdev+0x6e/0x90 [ 472.604742][T14116] dump_stack+0x11d/0x181 [ 472.607993][T14054] btrfs_close_bdev.part.0+0xa8/0xb0 [ 472.608018][T14054] close_fs_devices.part.0+0x170/0x520 [ 472.612590][T14116] should_fail.cold+0xa/0x1a [ 472.616896][T14054] btrfs_close_devices+0x92/0x170 [ 472.622169][T14116] __should_failslab+0xee/0x130 [ 472.627603][T14054] open_ctree+0x194/0x3ce2 [ 472.632168][T14116] should_failslab+0x9/0x14 [ 472.637274][T14054] btrfs_mount_root+0x8c7/0xb00 [ 472.642118][T14116] kmem_cache_alloc+0x29/0x5d0 [ 472.646523][T14054] legacy_get_tree+0x7e/0xf0 [ 472.646537][T14054] vfs_get_tree+0x56/0x1a0 [ 472.646624][T14054] fc_mount+0x20/0x80 [ 472.651132][T14116] ? memcg_kmem_put_cache+0x91/0xe0 [ 472.655964][T14054] vfs_kern_mount.part.0+0xe6/0xf0 [ 472.660706][T14116] ? kmem_cache_alloc+0x1f3/0x5d0 [ 472.665269][T14054] vfs_kern_mount+0x49/0x70 [ 472.669684][T14116] __alloc_file+0x4d/0x210 [ 472.673617][T14054] btrfs_mount+0x250/0xf37 [ 472.673641][T14054] legacy_get_tree+0x7e/0xf0 [ 472.678816][T14116] alloc_empty_file+0x8f/0x180 [ 472.683894][T14054] vfs_get_tree+0x56/0x1a0 [ 472.683907][T14054] do_mount+0x1004/0x14f0 [ 472.683919][T14054] ksys_mount+0xe8/0x160 [ 472.683946][T14054] __x64_sys_mount+0x70/0x90 [ 472.688947][T14116] alloc_file+0x4e/0x2b0 [ 472.693421][T14054] do_syscall_64+0xcc/0x370 [ 472.693435][T14054] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 472.693439][T14054] [ 472.693451][T14054] write to 0xffff88812bf27620 of 1 bytes by task 14054 on cpu 1: [ 472.693476][T14054] pagevec_lru_move_fn+0x163/0x180 [ 472.697866][T14116] ? _raw_spin_unlock+0x4b/0x60 [ 472.697891][T14116] alloc_file_pseudo+0x11c/0x1b0 [ 472.702348][T14054] lru_add_drain_cpu+0x178/0x2e0 [ 472.706910][T14116] __shmem_file_setup.part.0+0xd4/0x1f0 [ 472.711650][T14054] lru_add_drain+0x35/0x80 [ 472.716163][T14116] shmem_file_setup+0x7b/0xa0 [ 472.720436][T14054] __pagevec_release+0x74/0x90 [ 472.724739][T14116] __x64_sys_memfd_create+0x20d/0x370 [ 472.729264][T14054] shmem_undo_range+0x7f3/0x13f0 [ 472.733487][T14116] do_syscall_64+0xcc/0x370 [ 472.737965][T14054] shmem_truncate_range+0x30/0x80 [ 472.744094][T14116] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 472.746403][T14054] shmem_evict_inode+0x1b5/0x550 [ 472.754091][T14116] RIP: 0033:0x45a679 [ 472.759222][T14054] evict+0x244/0x410 [ 472.764080][T14116] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 472.768965][T14054] iput+0x371/0x4e0 13:12:01 executing program 1 (fault-call:2 fault-nth:3): r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 472.773871][T14116] RSP: 002b:00007f6fd8d5ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 472.779397][T14054] dentry_unlink_inode+0x270/0x2e0 [ 472.783785][T14116] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 000000000045a679 [ 472.788434][T14054] __dentry_kill+0x220/0x3c0 [ 472.788445][T14054] dput+0x3b5/0x750 [ 472.788458][T14054] do_renameat2+0x9f2/0xa50 [ 472.788482][T14054] __x64_sys_rename+0x47/0x60 [ 472.793214][T14116] RDX: 00000000200000e8 RSI: 0000000000000000 RDI: 00000000004bf712 [ 472.798575][T14054] do_syscall_64+0xcc/0x370 [ 472.803484][T14116] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 472.807970][T14054] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 472.812962][T14116] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6fd8d5f6d4 [ 472.818822][T14054] [ 472.823847][T14116] R13: 00000000004ca97f R14: 00000000004e3d90 R15: 0000000000000004 [ 472.827700][T14054] Reported by Kernel Concurrency Sanitizer on: [ 472.944850][T14054] CPU: 1 PID: 14054 Comm: udevd Not tainted 5.4.0-syzkaller #0 [ 472.952384][T14054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.962452][T14054] ================================================================== [ 472.970508][T14054] Kernel panic - not syncing: panic_on_warn set ... [ 472.977136][T14054] CPU: 1 PID: 14054 Comm: udevd Not tainted 5.4.0-syzkaller #0 [ 472.984678][T14054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.994731][T14054] Call Trace: [ 472.998065][T14054] dump_stack+0x11d/0x181 [ 473.002380][T14054] panic+0x210/0x640 [ 473.006260][T14054] ? vprintk_func+0x8d/0x140 [ 473.010842][T14054] kcsan_report.cold+0xc/0xd [ 473.015426][T14054] kcsan_setup_watchpoint+0x3fe/0x460 [ 473.020803][T14054] __tsan_unaligned_write1+0xc0/0x100 [ 473.026175][T14054] pagevec_lru_move_fn+0x163/0x180 [ 473.031267][T14054] ? put_pages_list+0x1c0/0x1c0 [ 473.036104][T14054] lru_add_drain_cpu+0x178/0x2e0 [ 473.041038][T14054] lru_add_drain+0x35/0x80 [ 473.045439][T14054] __pagevec_release+0x74/0x90 [ 473.050188][T14054] shmem_undo_range+0x7f3/0x13f0 [ 473.055128][T14054] ? tomoyo_profile+0x42/0x50 [ 473.059812][T14054] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 473.066130][T14054] ? tomoyo_domain_quota_is_ok+0x1e1/0x2b0 [ 473.072024][T14054] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 473.078254][T14054] ? tomoyo_supervisor+0x170/0xd20 [ 473.083350][T14054] ? delay_tsc+0x8f/0xc0 [ 473.087612][T14054] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 473.093340][T14054] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 473.099574][T14054] ? debug_smp_processor_id+0x4c/0x172 [ 473.105716][T14054] shmem_truncate_range+0x30/0x80 [ 473.110738][T14054] shmem_evict_inode+0x1b5/0x550 [ 473.115664][T14054] ? var_wake_function+0x30/0x30 [ 473.120605][T14054] ? shmem_truncate_range+0x80/0x80 [ 473.125835][T14054] evict+0x244/0x410 [ 473.129725][T14054] iput+0x371/0x4e0 [ 473.133537][T14054] ? find_inode_nowait+0x160/0x160 [ 473.139143][T14054] dentry_unlink_inode+0x270/0x2e0 [ 473.144300][T14054] __dentry_kill+0x220/0x3c0 [ 473.148890][T14054] dput+0x3b5/0x750 [ 473.152694][T14054] ? security_path_rename+0x115/0x1e0 [ 473.158063][T14054] do_renameat2+0x9f2/0xa50 [ 473.162576][T14054] __x64_sys_rename+0x47/0x60 [ 473.167248][T14054] do_syscall_64+0xcc/0x370 [ 473.171747][T14054] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 473.177625][T14054] RIP: 0033:0x7fc7c1c37527 [ 473.182027][T14054] Code: 32 00 64 83 38 15 74 07 b8 ff ff ff ff 5b c3 48 89 df e8 1c c1 07 00 85 c0 75 ed 31 c0 eb d3 90 90 90 90 b8 52 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e1 f8 32 00 31 d2 48 29 c2 64 [ 473.201748][T14054] RSP: 002b:00007fff060aea68 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 473.210146][T14054] RAX: ffffffffffffffda RBX: 0000000001110950 RCX: 00007fc7c1c37527 [ 473.218101][T14054] RDX: 00007fc7c1f68e98 RSI: 00007fff060aeaa0 RDI: 00007fff060aeea0 [ 473.226064][T14054] RBP: 0000000001107380 R08: 00007fc7c25aa7a0 R09: 0000000000000001 [ 473.234025][T14054] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000001108e60 [ 473.241988][T14054] R13: 00000000010f7250 R14: 00007fff060aeaa0 R15: 0000000000000000 [ 473.251318][T14054] Kernel Offset: disabled [ 473.255642][T14054] Rebooting in 86400 seconds..