[ 39.889918][ T26] audit: type=1800 audit(1556687123.297:26): pid=7753 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 39.937987][ T26] audit: type=1800 audit(1556687123.307:27): pid=7753 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 39.960618][ T26] audit: type=1800 audit(1556687123.307:28): pid=7753 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 40.809852][ T26] audit: type=1800 audit(1556687124.237:29): pid=7753 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.222' (ECDSA) to the list of known hosts. 2019/05/01 05:05:31 fuzzer started 2019/05/01 05:05:35 dialing manager at 10.128.0.26:34869 2019/05/01 05:05:35 syscalls: 2440 2019/05/01 05:05:35 code coverage: enabled 2019/05/01 05:05:35 comparison tracing: enabled 2019/05/01 05:05:35 extra coverage: extra coverage is not supported by the kernel 2019/05/01 05:05:35 setuid sandbox: enabled 2019/05/01 05:05:35 namespace sandbox: enabled 2019/05/01 05:05:35 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/01 05:05:35 fault injection: enabled 2019/05/01 05:05:35 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/01 05:05:35 net packet injection: enabled 2019/05/01 05:05:35 net device setup: enabled 05:07:07 executing program 0: pause() syz_execute_func(&(0x7f00000003c0)="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") syzkaller login: [ 144.522707][ T7918] IPVS: ftp: loaded support on port[0] = 21 05:07:08 executing program 1: pause() syz_execute_func(&(0x7f0000000500)="3666440f50f564ff0941c366440f56c9660f3a16649c6700c4617b12e5c441dfd04b00c442019dcc0f11d46f") syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f0000000dc0)="c4e3f9614832074a2be93699980f053ef3aec4a37bf0c50341e2e926b5c9f2abc421b8c25cb100008d3581810000262f6646da4e32c4c2b9a6b9f20000f82727d2dec461dc55b1e6172525000e818f470fc90080008080f03acf8fe97c810f69e08f4cbec5c4c2858c3f2d56c4613fc21d9053c7ab86c4213e5377000043d9497dbf82595943a642d17f00660f3a603d06f0ffff00c4e16d71d4d25641a0ba16f2aed9fdfeebf5f5eba2f2450f5a29c4c37d096208c2c481fa706b00f9ef0008e4a25600b150400f381da900e001c4d5c6d59134ffffff66dee4b63442f191047b8f49580197feffff7f660f38de8e85e1f32646dec43b7d0f12e400f4260ff2e9ca30cac46190546104f3450f2c6b0009912af3430fc4c17829c8c463ad0b5890ca6c0f84500000006466420f380b010090958fe978cce16a85856d6d8175ef9d8f000000c462a52b6e0bc4a17a4295f046839200000080a79cffffc1bd7c6d8300af77cb44cb44e42ec4a17c1002470fae52c30606b2aa246681380010c4026726670f010ef7a698b900008374fb0a07c40155f64e06f247acecc4c291dc6500470afc6b82e26263209797c1045c0b47cc5c389f9f140f0f2ef246e16dc481635a9c70d3813811fad7fbfbc941ec2dc29b6cc29b6cd5663ef0430fabb90800000045ee880c0000003422") [ 144.680620][ T7918] chnl_net:caif_netlink_parms(): no params data found [ 144.771109][ T7918] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.779478][ T7918] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.788138][ T7918] device bridge_slave_0 entered promiscuous mode [ 144.798684][ T7918] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.805979][ T7918] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.814196][ T7918] device bridge_slave_1 entered promiscuous mode [ 144.829590][ T7921] IPVS: ftp: loaded support on port[0] = 21 [ 144.844577][ T7918] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 144.860269][ T7918] bond0: Enslaving bond_slave_1 as an active interface with an up link 05:07:08 executing program 2: pause() syz_execute_func(&(0x7f0000000840)="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") [ 144.918654][ T7918] team0: Port device team_slave_0 added [ 144.936171][ T7918] team0: Port device team_slave_1 added [ 145.037217][ T7918] device hsr_slave_0 entered promiscuous mode 05:07:08 executing program 3: syz_execute_func(&(0x7f0000000000)="f3e100def9575c8ac2c2c9734e424a2664f0ff06c4a279184fe2f04311b5147c00002e67660e50e94d00c9c9c4625dbae5feabc4aba39ddf450732ef0c0c0fae9972b57111f6") openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="640fce71045d4a2be91cb9980f053ef3aec4a37bf0c5013474e2e9e9b7ebc4a2fdf2476d237bf0362fed66460f632a0000d2de26f2a700610080b33800000000fac4a27d59947a02000000c482213e0488c4a2559d50ae0f7f1a16380136660f382895ed9600004cbec5c54d0f2c718f56476befee8f2870b63b30f34453c44fc44f8f6cb41500100000c4817c5311662e440f18d9c4217d2b951e76ba72c422cdbcaa0d100000f2ae2e470f81f1ffffff43f7942bfd660fdfdf6bd10499e143f3f081156af77bfa092f81dbd8a1a1e18864cf36400f0d8301000000410031af0f0f6d4f0d3e0fae600beb0fd467460f33c4c1ddf973fef440e4d216413a010f0f30d8f3c4c14ac2c81d00593ef245a736470f18ab060682d1bb1e9a0fec02c4a17ae64295007b1cffd2400f0f0aa7c4e1016948a9a7a4001e6a2a366464662683b9080000000df698b9800000d4440fddaf9494b2aaf00fc04307f62f26220feba177c4e33a787804c02e666766450f13bd076e42d38374fb0a070faee8c4837d09580203570000a8f7edc4037d092101f20f1dbe00100000c56197ba1ed322c95c0b5c0b40da32c4e1717d0245d8d58f0948943d00000000009b42a7a72885250000802026446fc4414974ec603131fb26400f6b935f1f6100402a402a7b12e3") [ 145.114559][ T7918] device hsr_slave_1 entered promiscuous mode [ 145.235611][ T7921] chnl_net:caif_netlink_parms(): no params data found [ 145.265033][ T7924] IPVS: ftp: loaded support on port[0] = 21 [ 145.313081][ T7921] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.320499][ T7921] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.329085][ T7921] device bridge_slave_0 entered promiscuous mode [ 145.341686][ T7921] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.349994][ T7921] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.372286][ T7921] device bridge_slave_1 entered promiscuous mode [ 145.397711][ T7918] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.401048][ T7926] IPVS: ftp: loaded support on port[0] = 21 [ 145.405243][ T7918] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.405857][ T7918] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.425738][ T7918] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.477274][ T7921] bond0: Enslaving bond_slave_0 as an active interface with an up link 05:07:08 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") [ 145.525127][ T7921] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 145.612740][ T7921] team0: Port device team_slave_0 added [ 145.657253][ T7918] 8021q: adding VLAN 0 to HW filter on device bond0 [ 145.686847][ T7921] team0: Port device team_slave_1 added [ 145.703138][ T7929] IPVS: ftp: loaded support on port[0] = 21 [ 145.736930][ T2881] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.756745][ T2881] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.768447][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 05:07:09 executing program 5: pause() syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_execute_func(&(0x7f0000001580)="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") [ 145.897693][ T7921] device hsr_slave_0 entered promiscuous mode [ 145.964262][ T7921] device hsr_slave_1 entered promiscuous mode [ 145.991549][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 145.999848][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 146.009737][ T7924] chnl_net:caif_netlink_parms(): no params data found [ 146.078946][ T7934] IPVS: ftp: loaded support on port[0] = 21 [ 146.092822][ T7918] 8021q: adding VLAN 0 to HW filter on device team0 [ 146.110655][ T7926] chnl_net:caif_netlink_parms(): no params data found [ 146.137485][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 146.147389][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 146.156714][ T3483] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.164028][ T3483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.183986][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 146.192856][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 146.202013][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.209225][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.217067][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 146.226150][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 146.235103][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 146.244101][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 146.252741][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 146.261671][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 146.270354][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 146.279145][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 146.333630][ T7926] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.341629][ T7926] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.350227][ T7926] device bridge_slave_0 entered promiscuous mode [ 146.357947][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 146.366183][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 146.375009][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 146.385198][ T7924] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.392294][ T7924] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.400545][ T7924] device bridge_slave_0 entered promiscuous mode [ 146.412062][ T7924] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.419259][ T7924] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.427237][ T7924] device bridge_slave_1 entered promiscuous mode [ 146.438546][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 146.470378][ T7926] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.479736][ T7926] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.488832][ T7926] device bridge_slave_1 entered promiscuous mode [ 146.526994][ T7924] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 146.537572][ T7924] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 146.595141][ T7926] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 146.615963][ T7929] chnl_net:caif_netlink_parms(): no params data found [ 146.641994][ T7926] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 146.678268][ T7918] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 146.692154][ T7924] team0: Port device team_slave_0 added [ 146.703302][ T7926] team0: Port device team_slave_0 added [ 146.713233][ T7926] team0: Port device team_slave_1 added [ 146.729814][ T7924] team0: Port device team_slave_1 added [ 146.848665][ T7929] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.856272][ T7929] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.864630][ T7929] device bridge_slave_0 entered promiscuous mode [ 146.916385][ T7926] device hsr_slave_0 entered promiscuous mode [ 146.964497][ T7926] device hsr_slave_1 entered promiscuous mode [ 147.067266][ T7924] device hsr_slave_0 entered promiscuous mode [ 147.104341][ T7924] device hsr_slave_1 entered promiscuous mode [ 147.151127][ T7929] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.158516][ T7929] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.167088][ T7929] device bridge_slave_1 entered promiscuous mode [ 147.218917][ T7929] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 147.230791][ T7934] chnl_net:caif_netlink_parms(): no params data found [ 147.257817][ T7929] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 147.297674][ T7921] 8021q: adding VLAN 0 to HW filter on device bond0 [ 147.310384][ T7929] team0: Port device team_slave_0 added [ 147.337181][ T7929] team0: Port device team_slave_1 added [ 147.416056][ T7929] device hsr_slave_0 entered promiscuous mode [ 147.474160][ T7929] device hsr_slave_1 entered promiscuous mode [ 147.526356][ T7934] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.534355][ T7934] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.542173][ T7934] device bridge_slave_0 entered promiscuous mode [ 147.550386][ T7934] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.560755][ T7934] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.568747][ T7934] device bridge_slave_1 entered promiscuous mode [ 147.598679][ T7934] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 147.612072][ T7921] 8021q: adding VLAN 0 to HW filter on device team0 [ 147.625595][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 147.634734][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 147.655042][ T7934] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 147.706329][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 147.715734][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 147.724319][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.732008][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 147.739825][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 147.748697][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 147.757343][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.764659][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.772302][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 147.782087][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 147.799726][ T7924] 8021q: adding VLAN 0 to HW filter on device bond0 [ 147.831217][ T7934] team0: Port device team_slave_0 added [ 147.837185][ T7927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 147.848819][ T7927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 147.858260][ T7927] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 147.869875][ T7927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 147.879755][ T7927] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 147.889375][ T7927] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 147.913444][ T7924] 8021q: adding VLAN 0 to HW filter on device team0 [ 147.922610][ T7934] team0: Port device team_slave_1 added [ 147.930673][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 147.939028][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 147.957217][ T7926] 8021q: adding VLAN 0 to HW filter on device bond0 [ 147.979317][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 147.990237][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 147.999264][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.008633][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.017750][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.024993][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state 05:07:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x1000, 0x1, 0xd94}, 0x10) [ 148.032597][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 148.041401][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 148.050783][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 148.071843][ T7929] 8021q: adding VLAN 0 to HW filter on device bond0 05:07:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x1000, 0x1, 0xd94}, 0x10) 05:07:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x1000, 0x1, 0xd94}, 0x10) [ 148.150926][ T7934] device hsr_slave_0 entered promiscuous mode 05:07:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x1000, 0x1, 0xd94}, 0x10) [ 148.194334][ T7934] device hsr_slave_1 entered promiscuous mode 05:07:11 executing program 0: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req={0x1000, 0x1, 0xd94}, 0x10) [ 148.253462][ T7926] 8021q: adding VLAN 0 to HW filter on device team0 [ 148.267778][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 148.287085][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.295350][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 05:07:11 executing program 0: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req={0x1000, 0x1, 0xd94}, 0x10) [ 148.304770][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.313385][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.320676][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.344293][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 05:07:11 executing program 0: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req={0x1000, 0x1, 0xd94}, 0x10) [ 148.353465][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.374435][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.383171][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.390360][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.405842][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 148.454350][ T7929] 8021q: adding VLAN 0 to HW filter on device team0 [ 148.468996][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 148.478627][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 148.486886][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.495218][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 148.505777][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 148.514892][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 148.524749][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 148.533757][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 148.543182][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 148.573792][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 148.582985][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.592082][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.599292][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.606995][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 148.619660][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 148.628959][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 148.638412][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 148.652860][ T7924] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 148.665001][ T7924] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 148.696548][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 148.705530][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 148.714257][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.723077][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.732084][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.739254][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.747328][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 148.756437][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.765167][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.773269][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.781163][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 148.790326][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 148.836775][ T7921] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 148.851720][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 148.862630][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 148.874045][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 148.882878][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 148.892343][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 148.901222][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 148.912380][ T7934] 8021q: adding VLAN 0 to HW filter on device bond0 [ 148.925596][ T7924] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 148.932862][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 148.942288][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 148.955386][ T7927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 148.975392][ T7927] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 148.987404][ T7926] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 148.999889][ T7926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 149.021703][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 149.033705][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 149.042802][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.068741][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 149.080097][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 149.089851][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 149.109693][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 149.127378][ T7934] 8021q: adding VLAN 0 to HW filter on device team0 [ 149.151574][ T7929] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 149.163260][ T7929] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 149.182332][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 149.191137][ T7978] deprecated_sysctl_warning: 1 callbacks suppressed [ 149.191148][ T7978] warning: process `syz-executor.1' used the deprecated sysctl system call with [ 149.194015][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 149.220089][ T2881] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.227307][ T2881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.245209][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 149.254040][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 149.262662][ T2881] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.270040][ T2881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.279094][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 149.292362][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 149.301162][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.309857][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 149.318856][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.331074][ T7926] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 149.350473][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 149.359713][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 149.375664][ T7929] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 149.401041][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 149.411677][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 149.421314][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 149.430463][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 149.439864][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 149.466395][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 149.475915][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 149.488618][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.498057][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 149.507320][ T2881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.519086][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 149.562382][ T7934] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 149.832377][ T8006] syz-executor.5 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 05:07:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000140)={0x81, "f5ebf671698850de5b1bbc0339b56c3e28f4c272a39afe5b6b525e5d5169585e", 0x1, 0x0, 0x899f, 0x1700, 0x2}) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="004568963e094b9bf04dab827d472f0500000000000000830c90f6603be2eb1d069f4645e1e1c8461640a35b646e12ad0200000046c36737dbd86118c9064b158cf2567e5acd29b5d8e249828b3c55be6c7c53e83d0cca72ec5dea621d0c84ec0846abae8d38c5503eec93ca3bfa710400000000000000fee2f7fff022b3156407b701ad58084a087c40bf9267ef66c3c5574d8374ea542550f2b63f7b221953594a16659b3175bd75"], 0xa9) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f00000000c0), 0x808100000000) 05:07:13 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7, 0x10000}], 0x0, 0x0) [ 150.170127][ C1] hrtimer: interrupt took 35920 ns [ 150.214680][ T8018] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 16708671943451224836 /dev/loop2 [ 150.229465][ T8016] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 150.264378][ T8016] FAT-fs (loop1): Filesystem has been set read-only [ 150.285126][ T8016] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17) 05:07:13 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa, 0x0, 0x8, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x4, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0xc6}, 0x0, 0xa, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0, 0x10000}], 0x0, 0x0) [ 150.538659][ T8031] IPVS: ftp: loaded support on port[0] = 21 [ 150.539613][ T8028] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 49697675524249041 transid 16708671943451224836 /dev/loop3 [ 150.638812][ T8028] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 150.659438][ T8028] BTRFS error (device loop3): superblock checksum mismatch [ 150.744576][ T8028] BTRFS error (device loop3): open_ctree failed 05:07:15 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="baf64a2be91c39980f05f7a6aae28920aec4a37bf0c52141e2e951eb9163a2a2a11975ed1cebc46112a10020e34df2466fc449d169c44e60fac4c27913b6b7b60da7c4a179e7a305d2dec461dc57b1e67d0b25c4837916d2becff346e1c44279346cee00491e2fe61ec443c55fc50084960300100002022870b63b3040c1d8ededa984844095b9b90f9bc4a1b1de7c3e003e53c4a155fc94e71900000055fa0f2cfa1fc4c13df37f14310f0d7a5c5ca866430fde992100f16fc4c19dfb96f8b68e0000343a16288836f72f8b2af27f0000536bd10499660f383ca3300a0000f3470e1854ef764179f4a7a7278ad9420f38ca920e00000042b5af6122507cc4a17e7fd1fe383b8932d4f3ac8f6a78106f6503000000404c74b1c461d1d4bd26000001a80f30cabfd448cfcd3333c4c4c481d37d97bd97bde559e2011145718585f28484c10c09d20ec463f5e91461c442a98c9a00000000c9f3f04e0fc78a00088041e9e1f19a26f2c3002ddd8f0b00d6df51f38fc9184c01be07000000004105d207f04711010bc41b644626ccc462fd4181070000000dc4e227046c3c0e0e800036b2aa59c765d9be99899999c401fdd7f34c59f30f0f63000cf5f5a85847ca0d000f75ff3cb00000f20fa0f343ab47ccf2a40f118b7b0000008888216f5a0cda21fd460f0fbdf18c0000907a7a2d080000007cb69b5d64650f1b36880036f042109ff265f4978eb19b0f5923fe89740000001d1d000000c4c36d4b7b0e32c082ad8f31c441c4a1f911656b97c4030968792ab48020c42248f396cd00003330") 05:07:15 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x1000, 0x1, 0xd94}, 0x10) 05:07:15 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) 05:07:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed070") r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000400)={0x1, 0x0, {0x0, 0x0, 0x0, 0x12, 0x0, 0xff}}) 05:07:15 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1, 0x9010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sched_setattr(0x0, &(0x7f00000003c0)={0x0, 0x2, 0x0, 0x0, 0x2}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x54}, 0x98) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 05:07:15 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa, 0x0, 0x8, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x4, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0xc6}, 0x0, 0xa, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0, 0x10000}], 0x0, 0x0) 05:07:15 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x1000, 0x1, 0xd94}, 0x10) [ 151.970553][ T8045] rtc_cmos 00:00: Alarms can be up to one day in the future 05:07:15 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) 05:07:15 executing program 2: 05:07:15 executing program 2: 05:07:15 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x1000, 0x1, 0xd94}, 0x10) 05:07:15 executing program 2: [ 152.276274][ T8044] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 152.307415][ T8044] BTRFS error (device loop3): superblock checksum mismatch [ 152.414917][ T8044] BTRFS error (device loop3): open_ctree failed 05:07:16 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 05:07:16 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) 05:07:16 executing program 0: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req={0x1000, 0x1, 0xd94}, 0x10) 05:07:16 executing program 2: [ 152.964195][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 152.970167][ C1] protocol 88fb is buggy, dev hsr_slave_1 05:07:16 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x9, 0x7, 0x400000004, 0x20}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000100)={r0, &(0x7f0000000040), 0x0}, 0x18) 05:07:16 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa, 0x0, 0x8, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x4, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0xc6}, 0x0, 0xa, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0, 0x10000}], 0x0, 0x0) 05:07:16 executing program 2: 05:07:16 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) 05:07:16 executing program 0: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req={0x1000, 0x1, 0xd94}, 0x10) 05:07:16 executing program 2: 05:07:16 executing program 5: 05:07:16 executing program 0: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req={0x1000, 0x1, 0xd94}, 0x10) [ 153.215290][ T8097] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 153.229392][ T8097] BTRFS error (device loop3): superblock checksum mismatch [ 153.398413][ T8097] BTRFS error (device loop3): open_ctree failed 05:07:17 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 05:07:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TCFLSH(r0, 0x80045440, 0x70c000) 05:07:17 executing program 2: 05:07:17 executing program 5: 05:07:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, 0x0, 0x0) 05:07:17 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa, 0x0, 0x8, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x4, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0xc6}, 0x0, 0xa, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0, 0x10000}], 0x0, 0x0) 05:07:17 executing program 5: 05:07:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TCFLSH(r0, 0x80045440, 0x70c000) 05:07:17 executing program 2: 05:07:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, 0x0, 0x0) 05:07:17 executing program 2: r0 = shmget(0x2, 0x1000, 0x2, &(0x7f0000002000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0x4) open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) setreuid(0x0, 0xee00) r1 = semget(0x1, 0x3, 0x0) semctl$IPC_RMID(r1, 0x0, 0x0) 05:07:17 executing program 5: clone(0x16020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000800)="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") r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400, 0x0) r1 = accept(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x80) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000080)="7062d496aaed6f05da9078bdd74a6cf8b006e51dda8ad9eaca62b6806de41b0bc47bf9aaf1ddc983a084f1ed1b8c2fbb4cd33146705082551cbeb43f3e014eaa6a2fac4e1689c91bea1f9051cf2a0c9dc5e66381ff6affa90535033e0437d7c500c617a8ce973474cfc3b778148b815916c07bd8fe9bfcc277f4086cb1e9927d846cc78230d71ef72aed81f08bb3dbda718b3a25a316adf467e9444f86177b01d7440ebb1f22e2ea34a11d0b3a1b82046cd0baefb775493f65c59cafb0f630d35c", 0xc1, r1}, 0x68) [ 154.060842][ T8133] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 154.081567][ T8133] BTRFS error (device loop3): superblock checksum mismatch [ 154.265691][ T8133] BTRFS error (device loop3): open_ctree failed 05:07:18 executing program 4: pause() socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000180)="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") 05:07:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TCFLSH(r0, 0x80045440, 0x70c000) 05:07:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, 0x0, 0x0) 05:07:18 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x9010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sched_setattr(0x0, &(0x7f00000003c0)={0x0, 0x2, 0x0, 0x0, 0x2}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x54}, 0x98) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, &(0x7f0000000080)) 05:07:18 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa, 0x0, 0x8, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x4, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0xc6}, 0x0, 0xa, 0xffffffffffffffff, 0x1) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0, 0x10000}], 0x0, 0x0) 05:07:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) 05:07:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x0, 0x1, 0xd94}, 0x10) [ 154.722709][ T8168] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 154.737460][ T8168] BTRFS error (device loop3): superblock checksum mismatch 05:07:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x0, 0x1, 0xd94}, 0x10) 05:07:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) [ 154.877958][ T8168] BTRFS error (device loop3): open_ctree failed 05:07:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) 05:07:18 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa, 0x0, 0x8, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x4, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0xc6}, 0x0, 0xa, 0xffffffffffffffff, 0x1) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0, 0x10000}], 0x0, 0x0) [ 154.982553][ T8158] mmap: syz-executor.5 (8158) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 05:07:18 executing program 5: [ 155.102650][ T8197] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 155.133677][ T8197] BTRFS error (device loop3): superblock checksum mismatch [ 155.214557][ T8197] BTRFS error (device loop3): open_ctree failed 05:07:18 executing program 4: pause() socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000180)="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") 05:07:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x40, 0x102) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 05:07:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x0, 0x1, 0xd94}, 0x10) 05:07:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(0xffffffffffffffff, 0x80045440, 0x70c000) 05:07:18 executing program 5: 05:07:18 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa, 0x0, 0x8, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x4, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0xc6}, 0x0, 0xa, 0xffffffffffffffff, 0x1) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0, 0x10000}], 0x0, 0x0) 05:07:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") set_mempolicy(0x0, 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) readv(r1, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1) 05:07:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(0xffffffffffffffff, 0x80045440, 0x70c000) [ 155.583714][ T8220] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 155.623473][ T8220] BTRFS error (device loop3): superblock checksum mismatch 05:07:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x1000, 0x0, 0xd94}, 0x10) 05:07:19 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6(0xa, 0x3, 0x84) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 05:07:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(0xffffffffffffffff, 0x80045440, 0x70c000) 05:07:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) [ 155.754250][ T8220] BTRFS error (device loop3): open_ctree failed [ 155.924376][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 155.931038][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 156.164040][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 156.169891][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:07:19 executing program 4: pause() socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000180)="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") 05:07:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x1000, 0x0, 0xd94}, 0x10) 05:07:19 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0, 0x10000}], 0x0, 0x0) 05:07:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) 05:07:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) 05:07:20 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x1000, 0x0, 0xd94}, 0x10) 05:07:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) 05:07:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) [ 156.631350][ T8259] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 156.639944][ T8259] BTRFS error (device loop3): superblock checksum mismatch 05:07:20 executing program 2: syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0x4000) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ppoll(&(0x7f0000000080)=[{}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f00000000c0)=0x91c) openat$random(0xffffffffffffff9c, &(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x5, 0x400) sendto(0xffffffffffffffff, 0x0, 0xa8, 0x0, 0x0, 0x863b6b7602ec05da) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) setitimer(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000004000, 0x0, 0xfffffffe, 0x1107, 0x2000000, 0x0, 0x1000000000000, 0x0, 0x6]}}) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc010643a, &(0x7f0000000700)={0x0, 0x1}) ioctl$VIDIOC_SUBDEV_G_EDID(0xffffffffffffffff, 0xc0245628, &(0x7f0000000200)={0x0, 0x0, 0x80000001, [], 0x0}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x2800]}, @empty={[0x0, 0x0, 0x0, 0x4000000000000]}, @loopback, 0x3, 0x0, 0x5, 0x0, 0xfffffffffffffffc}) syz_open_dev$vcsa(0x0, 0x5, 0x0) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) 05:07:20 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x1000, 0x1}, 0x10) 05:07:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) [ 156.744649][ T8259] BTRFS error (device loop3): open_ctree failed 05:07:20 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x1000, 0x1}, 0x10) 05:07:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) 05:07:20 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0, 0x10000}], 0x0, 0x0) 05:07:20 executing program 4: pause() ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 05:07:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000600)="dae980d0da964c0f05bf09000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db00230200f30738c5c4a13b5a97ead04d13c4a265aa104b8d26c4c24bf6b7d2bf7b5e660f615f1e642f64631bc421045f4607c442a99ade21ddb7582b9fc4149fc4c4e37d397632bd26f2f045f602b164640f6f43a0660f6e6da6a9262e2e66450f7d64c6088f292001720bad0383397fd3ff3a65f20f7cd8efa1a12ad764d38f53efafda66f2f5595926f04618acdf07000000c443a922c6fe660f79cec462b1f72ec300000000f0097005c4634148f700c4611d6a28c442cd376d000f9f3c6436b2aa66450fc4650000d9a1e8719e70ddcd36450fd15b9d660f38346800c4c1045ccc2675c442650739e5c4a1fe162bc4e155688a2f08c69200000f3e666690d25c660f41767ff30f5ea5a9a50000fff5c463fd017c63ae0fda3131b83a00a2f16541d9f0fb766208cf") 05:07:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) 05:07:20 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x1000, 0x1}, 0x10) 05:07:20 executing program 0: mknod(&(0x7f0000000100)='./file1\x00', 0x1, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) clone(0x31020017f5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 157.486123][ T8300] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 157.501077][ T8300] BTRFS error (device loop3): superblock checksum mismatch 05:07:21 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) [ 157.595472][ T8300] BTRFS error (device loop3): open_ctree failed 05:07:21 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) symlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000140)='./file1\x00') execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000280)='./file0\x00', 0x842, 0x0) clone(0x3102101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000e40)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) 05:07:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0, 0x10000}], 0x0, 0x0) 05:07:21 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) 05:07:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r2 = dup(r1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r1, 0x80000000006) r4 = dup3(r3, r1, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000000)) write$UHID_INPUT(r4, &(0x7f0000001640)={0x300, "e52aac313baccb9b551156a2d7c12b7711c32a17d3c4c9ceef08c2046fe288a70a6e513019e5e114cc4ae935d23a9990952824f5d0c1f52e2eb94e5301ba9dc9a02818038eaef46fc2c3ebbe46e4a6024c93823f66462ba3d68913fdeadd1087b06846aa3ddf6ed3dc2b61b4960f48c2edf5cdf23c7e8d3f2e6daa71e66b29bc19e377d7df4637d735194a52da503a0ac44383ba5b3da867e09ceae02a9bfc21e7f28814c2fab7da41344e207ca706dc37592abdb685e4b80eb6dc2b1dc550a1d16166d163a4a220a54d7844facbbb2648ee90aa05c3c03ee447d79e517df8ffe70c215bd0bf69e86a5f48d571b9337590d05e9947727c0d77d18a117f110252735ca6700a55fd26838935808cce7b7c222a75339e44230bdeb99bc39c0c1cc20de74fcb9744f4c4a988f3874a846d31abcf5504d78a3e14f35f6cbd123fcff22890cc17c730c3ea9f74616dfe60064552ec25568a6211bdc39483a28bed0df0afc7d7c6d13d301e080c8846ea512a8ccae7a99da8dd3009feaf204d22e32c5ecc333e616159d55328d375e59194c5c9a0b3843afb283d1d26f59e03105e91aa552386468432a09be73220e942394f34c559797b74bfe7c5c2c639a40e4d2e81e1004b127540a0bdd6be2f95698e75e4f1203a47d61f506ac9364be9d98ae46536f74afe08c450ecb902e00f188c9f32aed0677455e10bbe82c763a464f10f64c403c35376b7a675546835209f0e2809e9c2bd191f784dda4b727bfac512497a07474e6d3e13233601df81abcdb6fbfb152483ec61baaee45a5d733c62107f63c55a046401a5ddef70cef8d52cb4784e3efc34de554c8ff48f7ae3d6dc1ed4eb70fe1e610355fd66ce1af8ff63b6641fb3dadfab8a9b0b1f26ca11f7287258ad4766e08340f8f2fd53e7e5f287bb73c186f0290f225687040c762776a02e5e65f1b9b713e8ef98ffe111b3e4e7b761dd3ed763ed8dafd67625fb300ac752c0ff9c0c04b75be292c3f0247bd0b3560f1c76aff38791037fcf2b812f1601934a8fc769f7198e0df685841489263a1495a8a8bab1a63cb12b3089a3e30aab15ae872437e52a6f0dbc4df2d0e8df4c6bcd47beefc179d85b70b42b319453e6efaff96a509420bec299f227c4b676c58038916897f15430ff52087dd97dd329c6b6e207378053accaa31843a333e4f69586103424f44bd67eb355c1fbe078e62f07ebaae46c3e335372127dc5fa70a4579af715e531bda52761dc206aded4678079720603a577ef7e5fb5a81a525b7c96a4047d9d6bb80d7e0ce55cc0a4f73256ae9c515307f13fe54126786de425d7a674b05116104176faac5b9365b33fd2f5a710a5159d342abecede83ad421bbb712cd5b006671a958cec907311719eb3e0b5dc4fb51054e06656a7a2a066c0aac65ceb434ca3f242cb2b1d7a22179a85cbbeeacc2f0135d8dd4d1363a98d2543fa4973e19eb359e956d27f142c75f62c7aecaf47090236b9791847725bc6fde15cd4a119a4976a3f0f2d622973ad9000aae56f88b396fa1881ec0b0a5de9955fc8f864b36eacd635b88826e0a64897d605fa4a14f7786b037cf308bef61c7f860e38f1ae67fe8cb7802dbe85f9c0c082eed1a13e645370d0c95d63bba215ac8a637b8f968aef06329d62ba131b56b46bfcfa6a5e82016d5eeb6e7db45595d1acaaa5ec9886315d3dced9d0a15c44c043ac91e4ae7077139774607b76cbc017f636145beb84c1829a6030f4a895a56b8d141f743c9189a71387893f785804f85927a23ccd79c432ab686b621ec91706ef082b4ea4fa608ce2daca0d2e2e07ff51e6a8fdc22f1c8ee5ae53720f93b4547704fae580e5560e3c7b1ac2a38ffc294d3c96635e3b919339394843c8a171c7d12ceb9c0a11be25783694b177b399e7a495538e293a59d3ab44b176afed6894aa0e501d9b98981be3f2057bf6c9869403a34cb83ad57150c674301f39524a026f3608a3414287bc4e507355823c6f8640bb803a392fb8847023d1db3c39753e72414682c617de9bd0d5b6a55d46004d49f20d2f8f53cdd8eb11402f7895cd7c01b4964fd005c564b0b0e156969ccde818dda3a7cae02d1d3af95081e6549f28976fa81b5e90fbb0a62fea850ffaf0220132189c11a74996261f6de6001c50364f08c4f48fd46a0417ec8ee4d003efeead64b87d64b43cd6868f365e72e26dd9f5f9f74d135f64464cb38dd62051ae70c5a4daabebe700eb9b290b8ed4142db0090219e6186f8f71fa8fe1ebe42f621b8eed182ee8ad0401f0a3530fd48e4d1eb2637f1fbd2a7032b0f85715203c12ab8ff48131bc4ff28272b57119a76bc0b30fef5294c23c0b2bcadfbba37a00502b5e43d72148d9acc7cb7cb39dc830cd6f30262a09eecf29d1055c2edc3926cfd5076aa5f9f172ed145359fc974ca5ded652433d212607bed155df1aff269414548a39a644b6ce927de5de6e6750575c4fd7ea7fe10b1e51fde6975c0c23fc012a8b12fe3fa64e972e4e09eafea165ae5c1ffc9d761e1314a781959c223b96eefde0f4f45c7ac032a8d3f1bd304114c3329a3e4966eddcc8d44ae70bad2932f963100955e2d2d487347c2aa8356bc6bc3c84e418163c758f1372246884e6d80d87d7ab3fe660dda13ada65f200b4fb365223b93bbc29493ae6dbbbb1823edb8e9f045b60414edab955e1046b67a8d4908ab08ad90216125d2ffd8c7814a9a4940df0a653b1cf53cf456412228445ebc8e1584adfe13207ff24fe602e2a506218710483b5544347a3d515b7d2ddcaa1bb7ae3578841918a8ed00659d5f260d23ae17a9ffc77f79758844586fe53517097838a92dde8873e8be1cd5934f1a4bfdd9d0b5725b811c4a2c121b7729946993a736bd195c55684ea680304af4844a1b2f74e2c2b2ccaeceb00b9c2c515b70912efb27643c5624025e358b44853cc0efddc103ee514471af902cd9b68f102c95a91d2b825b473ce842e6367b0b7305ce8be6f9c812abe860bb632e00b69a0370e5c8f9ba0cebbcbe1b9276949c303a4e9e3b6db37a0716520c07512192364abb58399fca973a1b32106096eda8bb85745562e8a35c5e917fdf858091a4c29d6549e10098d6b205fc5cad546fe07b3a70756cf7079c88f3708f0c8527002b99e80cbd584a3737fb37953cd6dccf21add4d4b6e65894490840c008578737d5e208649d1cd34beb403c2226300297853a29cf6c661b426c13306575d81f6fd21712e0ec4366013883b95a71d5094acbf156e42de11cb873744983ec1ff9cfbee2278053b8b4e523388bd41dfd3c2ecaacc5d9d2958bbfa94f4bd0ac1c61c98ab295dd5c69020f1329818df9a2aa88ced03f4e6a4d1f8cb020afcd2384e65511ddeb908ba0c13a03dd32e8d4ccf0246008f35ef5184f81b8fed73b4aae4998bd8c7d784210042247d39396ba881bf43555d0ec58deede7b4729e79d31b2a346527594ca3a47a1723a792a701dc18d0124365e2c4a4fefed48c29a9f2fc747b302eaf92a100b2da211c91de4ab79d4aede483d852635c6f14d38095a5739d475c7aa67fdd54767a056eeb3098dfd8d1c21f32e76f0247f04118448273586856e641b83f540a643e72dc15804b78bac475f39e23291798aa45a2c10aa5fef2d5e4d7b8f529a66535d11c6149e9797f2fcce2804f2a5370345e98b0c02c7dd27135d414fe72f0740423920d68b64f6b8c05788c6693ee1b9abb5d4593a970dc3ee2528765fb739964f4fed7200d7e796a9f3d0d60834e638dd8c29d4e85011e4ba4f127fe765954a5b5bb5d1cc69f2376599d5a3e8c30714893f763c06061072c10cb0eee17eb2a2514acc584b04e169d4a33a330367bb725ff9462f5d50282a2e393293eec8ea1eaab8217cc108798a4a57eccdb00647ab9f07318993f7c59c395a93cbd681d0a967a56e3f13c832c48dcc0d0096870b0d51b754e70b12a849b6f376923f7f7d909f64d64e1d6e338d39166b725265b96ed21e36b12057148d66e5df04b7b734ed0957d47fde172be2473b9ac6fdb823abe3e11ec69a170a14511d5572d6c0d9f6b749acad7003f0567bb6f9381649e42d02764077330d5af3d93185968a9f8dfed16c4a7c768a2bb98304946a557182c0ce93e82b340074e384cc6bd6129483386c654a6ab3bb12fe8e86adafa93f218fdf5019c09292858acd8ef7aa6a78e3f846215856d630ae9c5fc4009693b2767ea55c469f9099693287b35d43ee0f7a5baf3328d37b2c536f2abd6e21e472c105ae982cdd26a5a20562122e71efb1486c28d9409c3114b608f297695958c5604cf0918c0c70c56c79170260d73bde297e47cae1c404cca0a96eed51a2dc8f6f6ad862fe767ee5b5e68f231096825d935b809b3c1b5d9a2cd76cae22652bed7d263b42612ed717eba0aaf2a3989c4520c402d29428010000000000000062fb3fdd073b91d4e2f6895fba9639ee78bd8ccb5bc3ce442fbeb9a1521314b82804293159fd7df4db66b78a06fe93e705bbc4e0d294a787c3cbf271b2acd15e7b4998c822f7724d3191e2265bd0d694dfb08063c9ff26a424884b46e26b5560d756c114ad1a7b92eee3f49dc2883b604ecc49c5ce92ce467778301326588a6577d44758e8d90710248d110dbf3d3d568779bd1c616369f84619dd089e38b51634f7c5d2ac9f1547a342877815a3864ad70b68b196bde9d810512f411d5235633ef65088788dfa3f152df7cee3a0803f6ac7ae192301dec07ff870ff3d7cf1c09cc9093263b225d01222376531007af9e6fb96e5ccaa8274f70adc786db7f33a20a752717b56b9a03bfce15a1aacd78c4adf8bdf41de8aaf421684c27526088c54322b5eea9175ef9c574c1f873218cc6f5df233892d7d5b0b0649ffc5a1c4909f2967a8c1f15b419ecde0448f071fa71e553f4f12cfa5e35022e75ddc5509edddc3de82d9097759b27f7c24776702e0ff64559281f796f11c1a9c77a156f390d2d18d1759b6be0347eb5bb4df912e9cfafa0db3be3243bacb378ca0946cece695a8099d6d7a24fc8bcca4c09695e3208f17f00bf404f6eb7852dfe73c163a19fd4e890e0edd5c7a727984b6f47a952373b95200bba061756c699c218b52c265b22bcd5cb24fdf056621fdd2126cede171e435320ca34e56e4c82a2afc9a59d3bf4647877658b6f23a6484f37acd8e2e184926993b5d1bbe6cdba64f486b4fb41bb94a644140540894f8fc14e585bc8beae88eabf926add289c82eb8cea99743baed842d76eb5c5573f7a7f3f2693960d6bfed697b5619afd942f41689dbd281a35e32478ba3a388dada82a2f4164481aa6a8f3946a84ea6186b20ce388c202be42996ae90feec7258d4a4a276353df84c96b160ac003d81cf395c0e61b0f0a9e692c32fab307f754cae5de7716a00cb96160cd39c931f4885d612862cecf6ba76502c9d266f97e4cf6cf0a16f787788e5471458a0dc24d3f2a28caa0f7ee00cf8bb113bd9c2b086037d765b5ec9a849df6f482fc01b48261e44299b0bc88321d837b6e2d221ebf2996b4140cd82e531de27f8de445f31c64469a5a145b031cd2569d19e27369c31ec63a989f0c9aaba7cc9d36d652001d40004f83a90d6465854f31bf15d1ef6bff4c02d60b948a37e3f50d250d7f85f545f507014aae5a35908283168c034f654acbb9d0fc261671d612e3d74261653e69e5e9cf7c8fda298b4d6c879cbbb97eafe648ba70150599089d65c1fdc0d5af879a2d46a443ac6dd21b33f72510742db4faf7eeb1580580ffe26e2d5ff", 0x1000}, 0x1006) 05:07:21 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000400)='./file0\x00', &(0x7f0000000000)='xfs\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000680)="98a84a2ae92c211c420f05bf00004000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c4e10bf8c45b70c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f680864360fe25800218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c450f918fffefffffbedcdca1c9fb110f66474f383ae34ba29fb7e2") 05:07:21 executing program 4: pause() ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="baf64a2be91c39980f05f7a6aae28920aec4a37bf0c52141e2e951eb9163a2a2a11975ed1cebc46112a10020e34df2466fc449d169c44e60fac4c27913b6b7b60da7c4a179e7a305d2dec461dc57b1e67d0b25c4837916d2becff346e1c44279346cee00491e2fe61ec443c55fc50084960300100002022870b63b3040c1d8ededa984844095b9b90f9bc4a1b1de7c3e003e53c4a155fc94e71900000055fa0f2cfa1fc4c13df37f14310f0d7a5c5ca866430fde992100f16fc4c19dfb96f8b68e0000343a16288836f72f8b2af27f0000536bd10499660f383ca3300a0000f3470e1854ef764179f4a7a7278ad9420f38ca920e00000042b5af6122507cc4a17e7fd1fe383b8932d4f3ac8f6a78106f6503000000404c74b1c461d1d4bd26000001a80f30cabfd448cfcd3333c4c4c481d37d97bd97bde559e2011145718585f28484c10c09d20ec463f5e91461c442a98c9a00000000c9f3f04e0fc78a00088041e9e1f19a26f2c3002ddd8f0b00d6df51f38fc9184c01be07000000004105d207f04711010bc41b644626ccc462fd4181070000000dc4e227046c3c0e0e800036b2aa59c765d9be99899999c401fdd7f34c59f30f0f63000cf5f5a85847ca0d000f75ff3cb00000f20fa0f343ab47ccf2a40f118b7b0000008888216f5a0cda21fd460f0fbdf18c0000907a7a2d080000007cb69b5d64650f1b36880036f042109ff265f4978eb19b0f5923fe89740000001d1d000000c4c36d4b7b0e32c082ad8f31c441c4a1f911656b97c4030968792ab48020c42248f396cd00003330") 05:07:21 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) [ 158.386687][ T2489] block nbd5: Attempted send on invalid socket [ 158.393203][ T2489] print_req_error: I/O error, dev nbd5, sector 0 flags 1000 [ 158.401763][ T8344] XFS (nbd5): SB validate failed with error -5. 05:07:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7, 0x10000}], 0x0, 0x0) 05:07:21 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) ioctl$TCFLSH(r0, 0x80045440, 0x70c000) [ 158.427824][ T8335] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 158.452677][ T8335] BTRFS error (device loop3): superblock checksum mismatch [ 158.490377][ T8335] BTRFS error (device loop3): open_ctree failed [ 158.511603][ T8372] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 158.542374][ T8372] BTRFS error (device loop3): superblock checksum mismatch 05:07:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) ioctl$TCFLSH(r0, 0x80045440, 0x70c000) 05:07:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0, 0x10000}], 0x0, 0x0) 05:07:22 executing program 0: setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000100), 0x4) getpgid(0x0) syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x6, 0x101800) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) io_setup(0xfffffffffffffff7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000004000, 0x0, 0xfffffffe, 0x1107, 0x2000000, 0x0, 0x1000000000000, 0x0, 0x6]}}) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4004700e, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, @loopback, 0x0, 0x0, 0x5}) request_key(0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x3, 0x2) [ 158.694585][ T8372] BTRFS error (device loop3): open_ctree failed 05:07:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) ioctl$TCFLSH(r0, 0x80045440, 0x70c000) [ 158.797634][ T8372] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 158.814363][ T8372] BTRFS error (device loop2): superblock checksum mismatch [ 158.821903][ T8372] BTRFS error (device loop2): open_ctree failed 05:07:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7, 0x10000}], 0x0, 0x0) [ 158.945597][ T8387] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 158.974678][ T8387] BTRFS error (device loop2): superblock checksum mismatch 05:07:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)) ioctl$TCFLSH(r0, 0x80045440, 0x70c000) 05:07:22 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000400)='./file0\x00', &(0x7f0000000000)='xfs\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000680)="98a84a2ae92c211c420f05bf00004000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c4e10bf8c45b70c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f680864360fe25800218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c450f918fffefffffbedcdca1c9fb110f66474f383ae34ba29fb7e2") 05:07:22 executing program 4: pause() ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="baf64a2be91c39980f05f7a6aae28920aec4a37bf0c52141e2e951eb9163a2a2a11975ed1cebc46112a10020e34df2466fc449d169c44e60fac4c27913b6b7b60da7c4a179e7a305d2dec461dc57b1e67d0b25c4837916d2becff346e1c44279346cee00491e2fe61ec443c55fc50084960300100002022870b63b3040c1d8ededa984844095b9b90f9bc4a1b1de7c3e003e53c4a155fc94e71900000055fa0f2cfa1fc4c13df37f14310f0d7a5c5ca866430fde992100f16fc4c19dfb96f8b68e0000343a16288836f72f8b2af27f0000536bd10499660f383ca3300a0000f3470e1854ef764179f4a7a7278ad9420f38ca920e00000042b5af6122507cc4a17e7fd1fe383b8932d4f3ac8f6a78106f6503000000404c74b1c461d1d4bd26000001a80f30cabfd448cfcd3333c4c4c481d37d97bd97bde559e2011145718585f28484c10c09d20ec463f5e91461c442a98c9a00000000c9f3f04e0fc78a00088041e9e1f19a26f2c3002ddd8f0b00d6df51f38fc9184c01be07000000004105d207f04711010bc41b644626ccc462fd4181070000000dc4e227046c3c0e0e800036b2aa59c765d9be99899999c401fdd7f34c59f30f0f63000cf5f5a85847ca0d000f75ff3cb00000f20fa0f343ab47ccf2a40f118b7b0000008888216f5a0cda21fd460f0fbdf18c0000907a7a2d080000007cb69b5d64650f1b36880036f042109ff265f4978eb19b0f5923fe89740000001d1d000000c4c36d4b7b0e32c082ad8f31c441c4a1f911656b97c4030968792ab48020c42248f396cd00003330") [ 159.144516][ T8387] BTRFS error (device loop2): open_ctree failed [ 159.161537][ T8400] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 159.200358][ T8400] BTRFS error (device loop2): superblock checksum mismatch 05:07:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)) ioctl$TCFLSH(r0, 0x80045440, 0x70c000) 05:07:22 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0, 0x10000}], 0x0, 0x0) 05:07:22 executing program 0: setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000100), 0x4) getpgid(0x0) syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x6, 0x101800) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) io_setup(0xfffffffffffffff7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000004000, 0x0, 0xfffffffe, 0x1107, 0x2000000, 0x0, 0x1000000000000, 0x0, 0x6]}}) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4004700e, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, @loopback, 0x0, 0x0, 0x5}) request_key(0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x3, 0x2) [ 159.324285][ T8400] BTRFS error (device loop2): open_ctree failed 05:07:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)) ioctl$TCFLSH(r0, 0x80045440, 0x70c000) [ 159.392053][ T2488] block nbd5: Attempted send on invalid socket [ 159.398416][ T2488] print_req_error: I/O error, dev nbd5, sector 0 flags 1000 [ 159.408393][ T8418] XFS (nbd5): SB validate failed with error -5. [ 159.449627][ T8433] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 159.505943][ T8433] BTRFS error (device loop3): superblock checksum mismatch 05:07:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7, 0x10000}], 0x0, 0x0) 05:07:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c12") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) [ 159.636010][ T8433] BTRFS error (device loop3): open_ctree failed [ 159.656699][ T8447] BTRFS error (device loop2): unsupported checksum algorithm 22813 05:07:23 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0, 0x10000}], 0x0, 0x0) 05:07:23 executing program 0: clone(0x16020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000800)="c4e379614832074a2be993980f0536410f57f0c4a37bf0c50141e2e922eb66d995f214fc25400640062ff2f3b60f449c38463dc402a1ad7d6af0410fbaaf7f000000bbc482514654fa00c4e2859ecf491e2f16c2e54cf042fe8d0e800000262666400f383b16c442319ebb70fe6581f0430fc0b25bf34cb4c46178510b8f6978db0ac4e10efde600008cb116c482e59b7509f0809f39a72dc89d26669f0fdf53e9e244c05c7e7e84dc849b5687660f383c94a33ca000003e660f6eb45b000880417cd866420f383bd4643619ec000046d01496400f38253d03000000662e660f38f65a03c4c2801d9c96c9e8e9362665e9468fc920011a818194d8000f092ddd8f0b00c4c165fc3500000000c48178ae9bd49e25f8362e362eba36646466264683b9080000000d0df8c5429565b1fafaa3394964ffe7d0c4646666460f1052020f6baf00c4e3990f1d56076566440fe5d58374fb0a07c423a97910b4d5a8edf20f1dbe001000008fe858a3130a8f659780479100c4a269ac150a000000c4834d6b830b00000041c4a37d494cd00333460fedbcf6ade2000083439b685c2626f343d813f3450f525c390ec4e1fe6f77e5c4a2a9b73a80200e0f4401c4417426c4c1657d55daf3450f1231c4a27508313bec") r0 = openat$null(0xffffffffffffff9c, 0x0, 0x400, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000040)={0x88, @rand_addr=0x1, 0x4e21, 0x3, 'ovf\x00', 0x0, 0x8, 0x3c}, 0x2c) r1 = accept(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x80) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000080)="7062d496aaed6f05da9078bdd74a6cf8b006e51dda8ad9eaca62b6806de41b0bc47bf9aaf1ddc983a084f1ed1b8c2fbb4cd33146705082551cbeb43f3e014eaa6a2fac4e1689c91bea1f9051cf2a0c9dc5e66381ff6affa90535033e0437d7c500c617a8ce973474cfc3b778148b815916c07bd8fe9bfcc277f4086cb1e9927d846cc78230d71ef72aed81f08bb3dbda718b3a25a316adf467e9444f86177b01d7440ebb1f22e2ea34a11d0b3a1b82046cd0baefb775493f65c59c", 0xbb, r1}, 0x68) [ 159.718169][ T8447] BTRFS error (device loop2): superblock checksum mismatch 05:07:23 executing program 0: clone(0x16020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000800)="c4e379614832074a2be993980f0536410f57f0c4a37bf0c50141e2e922eb66d995f214fc25400640062ff2f3b60f449c38463dc402a1ad7d6af0410fbaaf7f000000bbc482514654fa00c4e2859ecf491e2f16c2e54cf042fe8d0e800000262666400f383b16c442319ebb70fe6581f0430fc0b25bf34cb4c46178510b8f6978db0ac4e10efde600008cb116c482e59b7509f0809f39a72dc89d26669f0fdf53e9e244c05c7e7e84dc849b5687660f383c94a33ca000003e660f6eb45b000880417cd866420f383bd4643619ec000046d01496400f38253d03000000662e660f38f65a03c4c2801d9c96c9e8e9362665e9468fc920011a818194d8000f092ddd8f0b00c4c165fc3500000000c48178ae9bd49e25f8362e362eba36646466264683b9080000000d0df8c5429565b1fafaa3394964ffe7d0c4646666460f1052020f6baf00c4e3990f1d56076566440fe5d58374fb0a07c423a97910b4d5a8edf20f1dbe001000008fe858a3130a8f659780479100c4a269ac150a000000c4834d6b830b00000041c4a37d494cd00333460fedbcf6ade2000083439b685c2626f343d813f3450f525c390ec4e1fe6f77e5c4a2a9b73a80200e0f4401c4417426c4c1657d55daf3450f1231c4a27508313bec") r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000040)={0x88, @rand_addr=0x1, 0x4e21, 0x3, 'ovf\x00', 0x0, 0x8, 0x3c}, 0x2c) r1 = accept(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x80) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000080)="7062d496aaed6f05da9078bdd74a6cf8b006e51dda8ad9eaca62b6806de41b0bc47bf9aaf1ddc983a084f1ed1b8c2fbb4cd33146705082551cbeb43f3e014eaa6a2fac4e1689c91bea1f9051cf2a0c9dc5e66381ff6affa90535033e0437d7c500c617a8ce973474cfc3b778148b815916c07bd8fe9bfcc277f4086cb1e9927d846cc78230d71ef72aed81f08bb3dbda718b3a25a316adf467e9444f86177b01d7440ebb1f22e2ea34a11d0b3a1b82046cd0baefb775493f65c59cafb0f630d35c", 0xc1, r1}, 0x68) 05:07:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c12") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) [ 159.885068][ T8447] BTRFS error (device loop2): open_ctree failed [ 159.912485][ T8461] BTRFS error (device loop2): unsupported checksum algorithm 22813 05:07:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x98) 05:07:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") [ 160.000667][ T8461] BTRFS error (device loop2): superblock checksum mismatch 05:07:23 executing program 0: pause() syz_execute_func(&(0x7f0000000000)="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") 05:07:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c12") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) 05:07:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7, 0x10000}], 0x0, 0x0) [ 160.150485][ T8483] IPVS: ftp: loaded support on port[0] = 21 05:07:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318e") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) [ 160.224129][ T8461] BTRFS error (device loop2): open_ctree failed [ 160.251035][ T8488] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 160.300878][ T8488] BTRFS error (device loop2): superblock checksum mismatch 05:07:23 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0, 0x10000}], 0x0, 0x0) 05:07:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318e") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) [ 160.454174][ T8488] BTRFS error (device loop2): open_ctree failed 05:07:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 05:07:24 executing program 5: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000140)='loginuid\x00') writev(r1, &(0x7f0000000080)=[{&(0x7f0000000040)='0', 0x1}], 0x1) 05:07:24 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318e") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) [ 160.570655][ T8501] BTRFS error (device loop3): unsupported checksum algorithm 22813 05:07:24 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7, 0x10000}], 0x0, 0x0) [ 160.642907][ T8501] BTRFS error (device loop3): superblock checksum mismatch 05:07:24 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed0") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) [ 160.749661][ T8514] IPVS: ftp: loaded support on port[0] = 21 [ 160.774546][ T8501] BTRFS error (device loop3): open_ctree failed 05:07:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x1a, 0x0, &(0x7f0000000040)) 05:07:24 executing program 0: syz_execute_func(&(0x7f0000001200)="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") 05:07:24 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0, 0x10000}], 0x0, 0x0) 05:07:24 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7, 0x10000}], 0x0, 0x0) 05:07:24 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed0") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) 05:07:24 executing program 5: r0 = msgget(0x1, 0x0) semop(r0, &(0x7f0000000180)=[{0x2, 0x9}, {0x0, 0x8, 0x1800}, {0x1, 0x7, 0x800}, {0x3, 0x1, 0x1800}, {0x0, 0x0, 0x1800}], 0x5) [ 161.156932][ T8545] BTRFS error (device loop2): unsupported checksum algorithm 22813 05:07:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 05:07:24 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed0") ioctl$TCFLSH(r0, 0x80045440, 0x70c000) [ 161.202147][ T8545] BTRFS error (device loop2): superblock checksum mismatch 05:07:24 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7, 0x10000}], 0x0, 0x0) [ 161.354348][ T8545] BTRFS error (device loop2): open_ctree failed [ 161.417870][ T8566] IPVS: ftp: loaded support on port[0] = 21 05:07:25 executing program 5: r0 = socket(0xa, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev}, 0x10, 0x0, 0x0, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, 0x0, &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7, 0x10000}], 0x0, 0x0) 05:07:25 executing program 4: pause() socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 05:07:25 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(0xffffffffffffffff, 0x80045440, 0x70c000) 05:07:25 executing program 0: syz_execute_func(&(0x7f0000000480)="640fba71045d4a2be91cb9980f053eb3aec4a37bf0c501345de2e9e9ebc4a2fdc4e37bf03000362fed463da16379630000d2de26f2a700610080b3380000000066420f383b19c4817c2baa5b0000002e6736400f4e21cc82213ee9881010df0f7f1a16380136660f382895ed9600004cbec5c54d0f2c718f56476befee8f06c461335f00c4a38f6cb41500100000001c58c4627959c9c4217d2b951e76ba726666440f381decf2ae2e470f81f1ffffff42f72bfd660fdf53f0807533b804990d0d432dd8d8a1a1e1886466430f3a09abc20000009d4131fc410031aff33d000000003e0fae600beb0fd467460f334581ea00000080f440e4d216413a010ff30f521ad8f3c4c14ac2c81d00d5c421fa2cbca10800000036470f1806c482d1bb1ef0832d0090ef347a0fec02c4a17ae64295007b1c47781cf2edc4e101e916a9a7a4001e6a2a2666400f3a175a22510b5d5d98b9800000d4440fddaf9494b2aae7412f220f40d9f677c4787804c0c4e273f6810a0000008374fb0a070faee8c4837d09580203d0919100a8f7edc4037d092101f20f1dbe00100000c56197ba1ed322c9615cc481f950cc5c0b40da32c4e1717d0245d8d58f0948943d0000000064652e430f71f61442f9a709a7a728250000802026446fc4414974ec60c4e379096b2d0ffb26400f6b935f1f6100402a402a7b1261") 05:07:25 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(0xffffffffffffffff, 0x80045440, 0x70c000) 05:07:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7, 0x10000}], 0x0, 0x0) 05:07:25 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x403e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) prctl$PR_GET_UNALIGN(0x5, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x1) fallocate(0xffffffffffffffff, 0x10, 0x5, 0xa) dup3(r0, 0xffffffffffffffff, 0x0) 05:07:25 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(0xffffffffffffffff, 0x80045440, 0x70c000) 05:07:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7, 0x10000}], 0x0, 0x0) 05:07:25 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(r0, 0x80045440, 0x0) 05:07:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:07:25 executing program 5: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)='\n') r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(r0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:25 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0, 0x10000}], 0x0, 0x0) 05:07:26 executing program 4: pause() socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="baf64a2be91c39980f05f7a6aae28920aec4a37bf0c52141e2e951eb9163a2a2a11975ed1cebc46112a10020e34df2466fc449d169c44e60fac4c27913b6b7b60da7c4a179e7a305d2dec461dc57b1e67d0b25c4837916d2becff346e1c44279346cee00491e2fe61ec443c55fc50084960300100002022870b63b3040c1d8ededa984844095b9b90f9bc4a1b1de7c3e003e53c4a155fc94e71900000055fa0f2cfa1fc4c13df37f14310f0d7a5c5ca866430fde992100f16fc4c19dfb96f8b68e0000343a16288836f72f8b2af27f0000536bd10499660f383ca3300a0000f3470e1854ef764179f4a7a7278ad9420f38ca920e00000042b5af6122507cc4a17e7fd1fe383b8932d4f3ac8f6a78106f6503000000404c74b1c461d1d4bd26000001a80f30cabfd448cfcd3333c4c4c481d37d97bd97bde559e2011145718585f28484c10c09d20ec463f5e91461c442a98c9a00000000c9f3f04e0fc78a00088041e9e1f19a26f2c3002ddd8f0b00d6df51f38fc9184c01be07000000004105d207f04711010bc41b644626ccc462fd4181070000000dc4e227046c3c0e0e800036b2aa59c765d9be99899999c401fdd7f34c59f30f0f63000cf5f5a85847ca0d000f75ff3cb00000f20fa0f343ab47ccf2a40f118b7b0000008888216f5a0cda21fd460f0fbdf18c0000907a7a2d080000007cb69b5d64650f1b36880036f042109ff265f4978eb19b0f5923fe89740000001d1d000000c4c36d4b7b0e32c082ad8f31c441c4a1f911656b97c4030968792ab48020c42248f396cd00003330") 05:07:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(r0, 0x80045440, 0x0) 05:07:26 executing program 0: semop(0x0, &(0x7f0000000140)=[{0x0, 0x20}, {0x7, 0xffffffff}], 0x2) semop(0x0, &(0x7f0000000240)=[{0x0, 0x7fff}], 0x1) 05:07:26 executing program 5: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)='\n') r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(r0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f318ed070") ioctl$TCFLSH(r0, 0x80045440, 0x0) 05:07:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:07:26 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0, 0x10000}], 0x0, 0x0) 05:07:26 executing program 0: syz_execute_func(&(0x7f0000000780)="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") 05:07:27 executing program 5: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)='\n') r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(r0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:27 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0, 0x10000}], 0x0, 0x0) 05:07:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:07:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000340)="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", 0x4c1, 0xfffffffffffffffd) rt_sigqueueinfo(0x0, 0x0, 0x0) 05:07:27 executing program 4: pause() socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="baf64a2be91c39980f05f7a6aae28920aec4a37bf0c52141e2e951eb9163a2a2a11975ed1cebc46112a10020e34df2466fc449d169c44e60fac4c27913b6b7b60da7c4a179e7a305d2dec461dc57b1e67d0b25c4837916d2becff346e1c44279346cee00491e2fe61ec443c55fc50084960300100002022870b63b3040c1d8ededa984844095b9b90f9bc4a1b1de7c3e003e53c4a155fc94e71900000055fa0f2cfa1fc4c13df37f14310f0d7a5c5ca866430fde992100f16fc4c19dfb96f8b68e0000343a16288836f72f8b2af27f0000536bd10499660f383ca3300a0000f3470e1854ef764179f4a7a7278ad9420f38ca920e00000042b5af6122507cc4a17e7fd1fe383b8932d4f3ac8f6a78106f6503000000404c74b1c461d1d4bd26000001a80f30cabfd448cfcd3333c4c4c481d37d97bd97bde559e2011145718585f28484c10c09d20ec463f5e91461c442a98c9a00000000c9f3f04e0fc78a00088041e9e1f19a26f2c3002ddd8f0b00d6df51f38fc9184c01be07000000004105d207f04711010bc41b644626ccc462fd4181070000000dc4e227046c3c0e0e800036b2aa59c765d9be99899999c401fdd7f34c59f30f0f63000cf5f5a85847ca0d000f75ff3cb00000f20fa0f343ab47ccf2a40f118b7b0000008888216f5a0cda21fd460f0fbdf18c0000907a7a2d080000007cb69b5d64650f1b36880036f042109ff265f4978eb19b0f5923fe89740000001d1d000000c4c36d4b7b0e32c082ad8f31c441c4a1f911656b97c4030968792ab48020c42248f396cd00003330") 05:07:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, 0x0) mknod(0x0, 0xfffffffffffffff8, 0xfffd) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x3, 0x0, @pic={0x1, 0x0, 0xb6, 0x0, 0xff, 0x10000, 0x0, 0x1, 0x0, 0x2cd8b33a, 0x9, 0x4, 0x5, 0x0, 0x5, 0x94d7}}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x700000000000000, 0x300, 0x500, 0x0, 0x1000000000054}, 0x98) 05:07:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000340)="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", 0x4c1, 0xfffffffffffffffd) rt_sigqueueinfo(0x0, 0x0, 0x0) 05:07:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 05:07:27 executing program 5: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)='\n') r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(r0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:27 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0, 0x10000}], 0x0, 0x0) 05:07:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 05:07:27 executing program 5: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)='\n') r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000340)="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", 0x4c1, 0xfffffffffffffffd) rt_sigqueueinfo(0x0, 0x0, 0x0) 05:07:28 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0, 0x10000}], 0x0, 0x0) 05:07:28 executing program 1: clone(0x16020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000800)="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") r0 = openat$null(0xffffffffffffff9c, 0x0, 0x400, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000040)={0x88, @rand_addr=0x1, 0x4e21, 0x3, 'ovf\x00', 0x0, 0x8, 0x3c}, 0x2c) r1 = accept(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x80) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000080)="7062d496aaed6f05da9078bdd74a6cf8b006e51dda8ad9eaca62b6806de41b0bc47bf9aaf1ddc983a084f1ed1b8c2fbb4cd33146705082551cbeb43f3e014eaa6a2fac4e1689c91bea1f9051cf2a0c9dc5e66381ff6affa90535033e0437d7c500c617a8ce973474cfc3b778148b815916c07bd8fe9bfcc277f4086cb1e9927d846cc78230d71ef72aed81f08bb3dbda718b3a25a316adf467e9444f86177b01d7440ebb1f22e2ea34a11d0b3a1b82046cd0baefb775493f65c59cafb0f630d35c", 0xc1, r1}, 0x68) 05:07:28 executing program 5: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)='\n') r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:28 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 05:07:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, 0x0) mknod(0x0, 0xfffffffffffffff8, 0xfffd) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x3, 0x0, @pic={0x1, 0x0, 0xb6, 0x0, 0xff, 0x10000, 0x0, 0x1, 0x0, 0x2cd8b33a, 0x9, 0x4, 0x5, 0x0, 0x5, 0x94d7}}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x700000000000000, 0x300, 0x500, 0x0, 0x1000000000054}, 0x98) 05:07:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 05:07:28 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0, 0x10000}], 0x0, 0x0) 05:07:28 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:07:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 05:07:28 executing program 5: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)='\n') r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:28 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:07:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 05:07:28 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') writev(r1, &(0x7f0000000080), 0x1a6) 05:07:28 executing program 1: clone(0x16020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000800)="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") r0 = openat$null(0xffffffffffffff9c, 0x0, 0x400, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000040)={0x88, @rand_addr=0x1, 0x4e21, 0x3, 'ovf\x00', 0x0, 0x8, 0x3c}, 0x2c) r1 = accept(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x80) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000080)="7062d496aaed6f05da9078bdd74a6cf8b006e51dda8ad9eaca62b6806de41b0bc47bf9aaf1ddc983a084f1ed1b8c2fbb4cd33146705082551cbeb43f3e014eaa6a2fac4e1689c91bea1f9051cf2a0c9dc5e66381ff6affa90535033e0437d7c500c617a8ce973474cfc3b778148b815916c07bd8fe9bfcc277f4086cb1e9927d846cc78230d71ef72aed81f08bb3dbda718b3a25a316adf467e9444f86177b01d7440ebb1f22e2ea34a11d0b3a1b82046cd0baefb775493f65c59cafb0f630d35c", 0xc1, r1}, 0x68) 05:07:28 executing program 5: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)='\n') msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:29 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 05:07:29 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:07:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 05:07:29 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x11, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="05630440000000000e630c4000000000da"], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 05:07:29 executing program 5: msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:29 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') writev(r1, &(0x7f0000000080), 0x1a6) [ 165.794121][ T8813] binder: 8811:8813 Acquire 1 refcount change on invalid ref 0 ret -22 [ 165.802537][ T8813] binder: 8811:8813 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 165.839073][ T8822] binder: 8811:8822 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 05:07:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) [ 165.911539][ T8813] binder: 8811:8813 Acquire 1 refcount change on invalid ref 0 ret -22 [ 165.911892][ T8822] binder: 8811:8822 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 05:07:29 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 05:07:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:29 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) [ 165.964646][ T8813] binder: 8811:8813 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 05:07:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 05:07:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = msgget$private(0x0, 0x86) msgsnd(r1, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(r1, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:30 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="baf64a2be91c39980f05f7a6aae28920aec4a37bf0c52141e2e951eb9163a2a2a11975ed1cebc46112a10020e34df2466fc449d169c44e60fac4c27913b6b7b60da7c4a179e7a305d2dec461dc57b1e67d0b25c4837916d2becff346e1c44279346cee00491e2fe61ec443c55fc50084960300100002022870b63b3040c1d8ededa984844095b9b90f9bc4a1b1de7c3e003e53c4a155fc94e71900000055fa0f2cfa1fc4c13df37f14310f0d7a5c5ca866430fde992100f16fc4c19dfb96f8b68e0000343a16288836f72f8b2af27f0000536bd10499660f383ca3300a0000f3470e1854ef764179f4a7a7278ad9420f38ca920e00000042b5af6122507cc4a17e7fd1fe383b8932d4f3ac8f6a78106f6503000000404c74b1c461d1d4bd26000001a80f30cabfd448cfcd3333c4c4c481d37d97bd97bde559e2011145718585f28484c10c09d20ec463f5e91461c442a98c9a00000000c9f3f04e0fc78a00088041e9e1f19a26f2c3002ddd8f0b00d6df51f38fc9184c01be07000000004105d207f04711010bc41b644626ccc462fd4181070000000dc4e227046c3c0e0e800036b2aa59c765d9be99899999c401fdd7f34c59f30f0f63000cf5f5a85847ca0d000f75ff3cb00000f20fa0f343ab47ccf2a40f118b7b0000008888216f5a0cda21fd460f0fbdf18c0000907a7a2d080000007cb69b5d64650f1b36880036f042109ff265f4978eb19b0f5923fe89740000001d1d000000c4c36d4b7b0e32c082ad8f31c441c4a1f911656b97c4030968792ab48020c42248f396cd00003330") 05:07:30 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 05:07:30 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa423ad41a879dde0) 05:07:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = msgget$private(0x0, 0x86) msgsnd(r1, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(r1, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 05:07:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = msgget$private(0x0, 0x86) msgsnd(r1, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(r1, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:30 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 05:07:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) 05:07:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = msgget$private(0x0, 0x86) msgsnd(r1, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(r1, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:30 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa423ad41a879dde0) 05:07:30 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 05:07:30 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_execute_func(&(0x7f0000000180)="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") 05:07:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = msgget$private(0x0, 0x86) msgrcv(r1, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) 05:07:30 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 05:07:30 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa423ad41a879dde0) 05:07:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) 05:07:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = msgget$private(0x0, 0x86) msgrcv(r1, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:31 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0x0) 05:07:31 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 05:07:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = msgget$private(0x0, 0x86) msgrcv(r1, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:31 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_execute_func(&(0x7f0000000180)="baf64a2be91c39980f05f7a6aae28920aec4a37bf0c52141e2e951eb9163a2a2a11975ed1cebc46112a10020e34df2466fc449d169c44e60fac4c27913b6b7b60da7c4a179e7a305d2dec461dc57b1e67d0b25c4837916d2becff346e1c44279346cee00491e2fe61ec443c55fc50084960300100002022870b63b3040c1d8ededa984844095b9b90f9bc4a1b1de7c3e003e53c4a155fc94e71900000055fa0f2cfa1fc4c13df37f14310f0d7a5c5ca866430fde992100f16fc4c19dfb96f8b68e0000343a16288836f72f8b2af27f0000536bd10499660f383ca3300a0000f3470e1854ef764179f4a7a7278ad9420f38ca920e00000042b5af6122507cc4a17e7fd1fe383b8932d4f3ac8f6a78106f6503000000404c74b1c461d1d4bd26000001a80f30cabfd448cfcd3333c4c4c481d37d97bd97bde559e2011145718585f28484c10c09d20ec463f5e91461c442a98c9a00000000c9f3f04e0fc78a00088041e9e1f19a26f2c3002ddd8f0b00d6df51f38fc9184c01be07000000004105d207f04711010bc41b644626ccc462fd4181070000000dc4e227046c3c0e0e800036b2aa59c765d9be99899999c401fdd7f34c59f30f0f63000cf5f5a85847ca0d000f75ff3cb00000f20fa0f343ab47ccf2a40f118b7b0000008888216f5a0cda21fd460f0fbdf18c0000907a7a2d080000007cb69b5d64650f1b36880036f042109ff265f4978eb19b0f5923fe89740000001d1d000000c4c36d4b7b0e32c082ad8f31c441c4a1f911656b97c4030968792ab48020c42248f396cd00003330") 05:07:31 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0x0) 05:07:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c75", 0x96, 0x10000}], 0x0, 0x0) 05:07:31 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 05:07:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:32 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:32 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0x0) 05:07:32 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c75", 0x96, 0x10000}], 0x0, 0x0) 05:07:32 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 05:07:32 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:32 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_execute_func(&(0x7f0000000180)="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") 05:07:32 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c75", 0x96, 0x10000}], 0x0, 0x0) 05:07:32 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 05:07:32 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:32 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:32 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b", 0xaf, 0x10000}], 0x0, 0x0) 05:07:33 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af4", 0x68, 0x10000}], 0x0, 0x0) 05:07:33 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:33 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000180)="baf64a2be91c39980f05f7a6aae28920aec4a37bf0c52141e2e951eb9163a2a2a11975ed1cebc46112a10020e34df2466fc449d169c44e60fac4c27913b6b7b60da7c4a179e7a305d2dec461dc57b1e67d0b25c4837916d2becff346e1c44279346cee00491e2fe61ec443c55fc50084960300100002022870b63b3040c1d8ededa984844095b9b90f9bc4a1b1de7c3e003e53c4a155fc94e71900000055fa0f2cfa1fc4c13df37f14310f0d7a5c5ca866430fde992100f16fc4c19dfb96f8b68e0000343a16288836f72f8b2af27f0000536bd10499660f383ca3300a0000f3470e1854ef764179f4a7a7278ad9420f38ca920e00000042b5af6122507cc4a17e7fd1fe383b8932d4f3ac8f6a78106f6503000000404c74b1c461d1d4bd26000001a80f30cabfd448cfcd3333c4c4c481d37d97bd97bde559e2011145718585f28484c10c09d20ec463f5e91461c442a98c9a00000000c9f3f04e0fc78a00088041e9e1f19a26f2c3002ddd8f0b00d6df51f38fc9184c01be07000000004105d207f04711010bc41b644626ccc462fd4181070000000dc4e227046c3c0e0e800036b2aa59c765d9be99899999c401fdd7f34c59f30f0f63000cf5f5a85847ca0d000f75ff3cb00000f20fa0f343ab47ccf2a40f118b7b0000008888216f5a0cda21fd460f0fbdf18c0000907a7a2d080000007cb69b5d64650f1b36880036f042109ff265f4978eb19b0f5923fe89740000001d1d000000c4c36d4b7b0e32c082ad8f31c441c4a1f911656b97c4030968792ab48020c42248f396cd00003330") 05:07:33 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:33 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b", 0xaf, 0x10000}], 0x0, 0x0) 05:07:33 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af4", 0x68, 0x10000}], 0x0, 0x0) 05:07:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:33 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:33 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b", 0xaf, 0x10000}], 0x0, 0x0) 05:07:34 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af4", 0x68, 0x10000}], 0x0, 0x0) 05:07:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:34 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3", 0xbb, 0x10000}], 0x0, 0x0) 05:07:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:34 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874", 0x9c, 0x10000}], 0x0, 0x0) 05:07:34 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:34 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000180)="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") 05:07:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3", 0xbb, 0x10000}], 0x0, 0x0) 05:07:34 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874", 0x9c, 0x10000}], 0x0, 0x0) 05:07:34 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3", 0xbb, 0x10000}], 0x0, 0x0) 05:07:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:35 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874", 0x9c, 0x10000}], 0x0, 0x0) 05:07:35 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000180)="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") 05:07:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:35 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xc1, 0x10000}], 0x0, 0x0) 05:07:35 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb", 0xb6, 0x10000}], 0x0, 0x0) 05:07:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:35 executing program 0: r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:35 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xc1, 0x10000}], 0x0, 0x0) 05:07:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:35 executing program 0: r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:36 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_execute_func(&(0x7f0000000180)="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") 05:07:36 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb", 0xb6, 0x10000}], 0x0, 0x0) 05:07:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:36 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:36 executing program 0: r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xc1, 0x10000}], 0x0, 0x0) 05:07:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:36 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:36 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xc4, 0x10000}], 0x0, 0x0) 05:07:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:36 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:37 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_execute_func(&(0x7f0000000180)="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") 05:07:37 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb", 0xb6, 0x10000}], 0x0, 0x0) 05:07:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xc4, 0x10000}], 0x0, 0x0) 05:07:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:37 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:37 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4", 0xc3, 0x10000}], 0x0, 0x0) 05:07:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:38 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_execute_func(&(0x7f0000000180)="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") 05:07:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xc4, 0x10000}], 0x0, 0x0) 05:07:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:38 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4", 0xc3, 0x10000}], 0x0, 0x0) 05:07:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:38 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59", 0xc6, 0x10000}], 0x0, 0x0) 05:07:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:39 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") syz_execute_func(&(0x7f0000000180)="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") 05:07:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:39 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4", 0xc3, 0x10000}], 0x0, 0x0) 05:07:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59", 0xc6, 0x10000}], 0x0, 0x0) 05:07:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:39 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0xa423ad41a879dde0) 05:07:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:39 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa423ad41a879dde0) 05:07:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59", 0xc6, 0x10000}], 0x0, 0x0) 05:07:39 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 176.214697][ T9388] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 209 transid 16708671943451224836 /dev/loop3 [ 176.253272][ T9388] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 176.265123][ T9388] BTRFS error (device loop3): superblock checksum mismatch [ 176.334043][ T9388] BTRFS error (device loop3): open_ctree failed 05:07:40 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") syz_execute_func(&(0x7f0000000180)="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") 05:07:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa423ad41a879dde0) 05:07:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7}], 0x0, 0x0) 05:07:40 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:40 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 176.627261][ T9398] BTRFS error (device loop3): unsupported checksum algorithm 22813 05:07:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa423ad41a879dde0) [ 176.688534][ T9398] BTRFS error (device loop3): superblock checksum mismatch 05:07:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7}], 0x0, 0x0) 05:07:40 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) [ 176.804195][ T9398] BTRFS error (device loop3): open_ctree failed 05:07:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0x0) 05:07:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7}], 0x0, 0x0) 05:07:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:40 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") syz_execute_func(&(0x7f0000000180)="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") 05:07:40 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 05:07:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0x0) 05:07:40 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:40 executing program 2: clone(0x16020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000800)="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") r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000040)={0x88, @rand_addr=0x1, 0x4e21, 0x3, 'ovf\x00', 0x0, 0x8, 0x3c}, 0x2c) r1 = accept(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x80) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000080)="7062d496aaed6f05da9078bdd74a6cf8b006e51dda8ad9eaca62b6806de41b0bc47bf9aaf1ddc983a084f1ed1b8c2fbb4cd33146705082551cbeb43f3e014eaa6a2fac4e1689c91bea1f9051cf2a0c9dc5e66381ff6affa90535033e0437d7c500c617a8ce973474cfc3b778148b815916c07bd8fe9bfcc277f4086cb1e9927d846cc78230d71ef72aed81f08bb3dbda718b3a25a316adf467e9444f86177b01d7440ebb1f22e2ea34a11d0b3a1b82046cd0baefb775493f65c59cafb0f630d3", 0xc0, r1}, 0x68) 05:07:41 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) [ 177.625506][ T9441] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 177.654361][ T9441] BTRFS error (device loop3): superblock checksum mismatch 05:07:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000280)={0x0, ""/79}, 0xfffffd8b, 0x0, 0x0) [ 177.744302][ T9441] BTRFS error (device loop3): open_ctree failed 05:07:41 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:41 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7", 0xcd, 0x10000}], 0x0, 0x0) 05:07:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:41 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) [ 177.993051][ T9471] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 3351844305 transid 16708671943451224836 /dev/loop3 [ 178.022825][ T9471] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 178.031867][ T9471] BTRFS error (device loop3): superblock checksum mismatch [ 178.104342][ T9471] BTRFS error (device loop3): open_ctree failed 05:07:41 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") syz_execute_func(&(0x7f0000000180)="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") 05:07:41 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:41 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7", 0xcd, 0x10000}], 0x0, 0x0) 05:07:41 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) [ 178.596597][ T9488] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 178.646950][ T9488] BTRFS error (device loop3): superblock checksum mismatch 05:07:42 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) [ 178.767443][ T9488] BTRFS error (device loop3): open_ctree failed 05:07:42 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:42 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7", 0xcd, 0x10000}], 0x0, 0x0) 05:07:42 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) [ 179.080085][ T9519] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 179.196419][ T9519] BTRFS error (device loop3): superblock checksum mismatch 05:07:42 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") syz_execute_func(&(0x7f0000000180)="baf64a2be91c39980f05f7a6aae28920aec4a37bf0c52141e2e951eb9163a2a2a11975ed1cebc46112a10020e34df2466fc449d169c44e60fac4c27913b6b7b60da7c4a179e7a305d2dec461dc57b1e67d0b25c4837916d2becff346e1c44279346cee00491e2fe61ec443c55fc50084960300100002022870b63b3040c1d8ededa984844095b9b90f9bc4a1b1de7c3e003e53c4a155fc94e71900000055fa0f2cfa1fc4c13df37f14310f0d7a5c5ca866430fde992100f16fc4c19dfb96f8b68e0000343a16288836f72f8b2af27f0000536bd10499660f383ca3300a0000f3470e1854ef764179f4a7a7278ad9420f38ca920e00000042b5af6122507cc4a17e7fd1fe383b8932d4f3ac8f6a78106f6503000000404c74b1c461d1d4bd26000001a80f30cabfd448cfcd3333c4c4c481d37d97bd97bde559e2011145718585f28484c10c09d20ec463f5e91461c442a98c9a00000000c9f3f04e0fc78a00088041e9e1f19a26f2c3002ddd8f0b00d6df51f38fc9184c01be07000000004105d207f04711010bc41b644626ccc462fd4181070000000dc4e227046c3c0e0e800036b2aa59c765d9be99899999c401fdd7f34c59f30f0f63000cf5f5a85847ca0d000f75ff3cb00000f20fa0f343ab47ccf2a40f118b7b0000008888216f5a0cda21fd460f0fbdf18c0000907a7a2d080000007cb69b5d64650f1b36880036f042109ff265f4978eb19b0f5923fe89740000001d1d000000c4c36d4b7b0e32c082ad8f31c441c4a1f911656b97c4030968792ab48020c42248f396cd00003330") 05:07:42 executing program 2: 05:07:42 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:42 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x7) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) [ 179.308205][ T9519] BTRFS error (device loop3): open_ctree failed 05:07:42 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x7) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:42 executing program 2: 05:07:42 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58f", 0xcf, 0x10000}], 0x0, 0x0) 05:07:42 executing program 2: 05:07:43 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x7) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) [ 179.586695][ T9546] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 158079623173585 transid 16708671943451224836 /dev/loop3 [ 179.642028][ T9546] BTRFS error (device loop3): unsupported checksum algorithm 22813 05:07:43 executing program 2: [ 179.701930][ T9546] BTRFS error (device loop3): superblock checksum mismatch [ 179.805516][ T9546] BTRFS error (device loop3): open_ctree failed 05:07:43 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") syz_execute_func(&(0x7f0000000180)="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") 05:07:43 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:43 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:43 executing program 2: 05:07:43 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58f", 0xcf, 0x10000}], 0x0, 0x0) 05:07:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:43 executing program 2: [ 180.343321][ T9568] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 180.372023][ T9568] BTRFS error (device loop3): superblock checksum mismatch 05:07:43 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:43 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) [ 180.445181][ T9568] BTRFS error (device loop3): open_ctree failed 05:07:43 executing program 2: 05:07:44 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58f", 0xcf, 0x10000}], 0x0, 0x0) [ 180.781066][ T9601] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 180.802360][ T9601] BTRFS error (device loop3): superblock checksum mismatch [ 180.919864][ T9601] BTRFS error (device loop3): open_ctree failed 05:07:44 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(0x0) 05:07:44 executing program 2: 05:07:44 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:44 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:44 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0}], 0x0, 0x0) 05:07:44 executing program 2: 05:07:44 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0}], 0x0, 0x0) 05:07:44 executing program 1: set_mempolicy(0x0, &(0x7f0000000280)=0xfffff, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:44 executing program 2: 05:07:44 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0", 0xd0}], 0x0, 0x0) 05:07:45 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(0x0) 05:07:45 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:45 executing program 2: 05:07:45 executing program 1: set_mempolicy(0x0, &(0x7f0000000280)=0xfffff, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:45 executing program 3: 05:07:45 executing program 2: 05:07:45 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:45 executing program 3: 05:07:45 executing program 1: set_mempolicy(0x0, &(0x7f0000000280)=0xfffff, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:45 executing program 2: 05:07:46 executing program 4: pause() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(0x0) 05:07:46 executing program 3: 05:07:46 executing program 2: 05:07:46 executing program 1: set_mempolicy(0x4001, 0x0, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:46 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:46 executing program 2: 05:07:46 executing program 1: set_mempolicy(0x4001, 0x0, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:46 executing program 3: 05:07:46 executing program 2: 05:07:46 executing program 3: 05:07:46 executing program 2: 05:07:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:47 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:47 executing program 3: 05:07:47 executing program 1: set_mempolicy(0x4001, 0x0, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:47 executing program 2: 05:07:47 executing program 4: 05:07:47 executing program 3: 05:07:47 executing program 2: 05:07:47 executing program 4: 05:07:47 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280), 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:47 executing program 3: 05:07:47 executing program 4: 05:07:47 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:47 executing program 2: 05:07:47 executing program 3: 05:07:47 executing program 4: 05:07:47 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280), 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:47 executing program 3: 05:07:47 executing program 2: 05:07:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:47 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:47 executing program 4: 05:07:47 executing program 2: 05:07:47 executing program 3: 05:07:48 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280), 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:48 executing program 4: 05:07:48 executing program 3: 05:07:48 executing program 2: 05:07:48 executing program 4: 05:07:48 executing program 2: 05:07:48 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:48 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:48 executing program 4: 05:07:48 executing program 3: 05:07:48 executing program 3: 05:07:48 executing program 2: 05:07:48 executing program 4: 05:07:48 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:48 executing program 3: 05:07:48 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:48 executing program 4: 05:07:48 executing program 2: 05:07:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:48 executing program 3: 05:07:48 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:48 executing program 2: 05:07:48 executing program 4: 05:07:48 executing program 3: 05:07:49 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:49 executing program 2: 05:07:49 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:49 executing program 3: 05:07:49 executing program 4: 05:07:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180), 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:49 executing program 2: 05:07:49 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$IOC_PR_PREEMPT(r0, 0x80026101, &(0x7f0000000840)) 05:07:49 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:49 executing program 3: r0 = socket$unix(0x1, 0x3, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$unix(r0, &(0x7f0000000400)={&(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x10}, 0x0) 05:07:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000440), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102041ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0xfffffffffffffffe, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, 0x0, 0x0) 05:07:49 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:49 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:49 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$IOC_PR_PREEMPT(r0, 0x80026101, &(0x7f0000000840)) 05:07:49 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x1800000000010d, 0x800000000b, &(0x7f0000000100)="9d6daa82", 0x4) 05:07:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180), 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:49 executing program 3: setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000100), 0x302) r0 = getpgid(0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x6, 0x101800) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) io_setup(0xfffffffffffffff7, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f00000000c0)='/dev/cec#\x00', 0xa) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000004000, 0x0, 0xfffffffe, 0x1107, 0x2000000, 0x0, 0x1000000000000, 0x0, 0x6]}}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x6, 0x6, 0x9, 0x0, 0x0, 0x4000000000000, 0x10, 0x6, 0xfffffffffffffffd, 0xfff, 0x0, 0x3, 0x4, 0x1, 0x3, 0x5, 0x1, 0x7, 0x7ff, 0x1ff, 0x7fff, 0x0, 0x100, 0x9e, 0x300, 0x4, 0x9, 0x16, 0x6, 0x2, 0x101, 0x3, 0x8, 0x7f, 0x0, 0x8, 0x0, 0xad69, 0x4, @perf_config_ext, 0x8000, 0xef, 0x9, 0xf, 0x1, 0x7, 0x5}, r0, 0x0, r3, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4004700e, 0x4) setsockopt$inet6_int(r1, 0x29, 0xff, &(0x7f0000000000)=0x3ff, 0x4) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x7, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000000), 0x10000012a) connect$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) 05:07:49 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:49 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$IOC_PR_PREEMPT(r0, 0x80026101, &(0x7f0000000840)) 05:07:49 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$IOC_PR_PREEMPT(r0, 0x80026101, &(0x7f0000000840)) 05:07:49 executing program 3: 05:07:49 executing program 5: socket$inet6(0xa, 0x10000000000006, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:50 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000380)={0x13, 0x10, 0xfa00, {0x0}}, 0x18) 05:07:50 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180), 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:50 executing program 3: 05:07:50 executing program 4: ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x80026101, &(0x7f0000000840)) 05:07:50 executing program 5: socket$inet6(0xa, 0x10000000000006, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:50 executing program 3: syz_execute_func(&(0x7f0000000140)="f3e100def9575c8ac2c2c9734e424a2664f0ff06c4a279184fe2f04311b5147c00002e67660e50e94d00c9c9c4625dbae5feabc4aba39ddf450732ef0c0c0fae9972b57111f6") syz_execute_func(&(0x7f00000007c0)="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") 05:07:50 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:50 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x1, &(0x7f0000000040)=0x5) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) write$binfmt_elf64(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) 05:07:50 executing program 4: ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x80026101, &(0x7f0000000840)) 05:07:50 executing program 5: socket$inet6(0xa, 0x10000000000006, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0x709000}}) 05:07:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:50 executing program 4: ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x80026101, &(0x7f0000000840)) 05:07:50 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, 0x0, 0x0) 05:07:50 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, 0x0, 0x0) 05:07:50 executing program 4: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) ioctl$IOC_PR_PREEMPT(r0, 0x80026101, &(0x7f0000000840)) 05:07:50 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, 0x0, 0x0) 05:07:50 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, 0x0) 05:07:51 executing program 3: clone(0x2102009ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) clone(0x1fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@loopback, 0x0, 0x2}, 0x20) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) 05:07:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:51 executing program 2: syz_execute_func(&(0x7f0000000a00)="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") 05:07:51 executing program 4: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) ioctl$IOC_PR_PREEMPT(r0, 0x80026101, &(0x7f0000000840)) 05:07:51 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040), 0x0) 05:07:51 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, 0x0) 05:07:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) getsockopt$inet6_int(r1, 0x29, 0x10, 0x0, &(0x7f00000000c0)=0x297) 05:07:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:51 executing program 4: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) ioctl$IOC_PR_PREEMPT(r0, 0x80026101, &(0x7f0000000840)) 05:07:51 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040), 0x0) 05:07:51 executing program 3: syz_execute_func(&(0x7f0000000040)="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") 05:07:52 executing program 4: syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x80026101, &(0x7f0000000840)) 05:07:52 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, 0x0) 05:07:52 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040), 0x0) [ 189.221741][T10012] Unable to find swap-space signature 05:07:52 executing program 2: pause() syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") r0 = getpid() syz_open_procfs$namespace(r0, 0x0) syz_execute_func(&(0x7f0000000240)="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") 05:07:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x0) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:52 executing program 4: syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x80026101, &(0x7f0000000840)) 05:07:52 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{0x0}], 0x1) 05:07:52 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', 0x0}) 05:07:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(0x0, 0x85, 0x0, 0x0, &(0x7f0000000080), 0x1f000000) 05:07:52 executing program 4: syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x80026101, &(0x7f0000000840)) 05:07:52 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{0x0}], 0x1) 05:07:52 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', 0x0}) 05:07:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x0) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:52 executing program 3: pause() syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_open_procfs(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000880)="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") 05:07:53 executing program 1: set_mempolicy(0x4001, &(0x7f0000000280)=0xfffff, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{0x0}], 0x1) 05:07:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet6_tcp_int(r0, 0x6, 0x17, 0x0, &(0x7f0000000000)=0x12a) 05:07:53 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', 0x0}) 05:07:53 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$IOC_PR_PREEMPT(r0, 0x80026101, 0x0) 05:07:53 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, 0x0) write$P9_RAUTH(r0, 0x0, 0x0) 05:07:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x0) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:53 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$IOC_PR_PREEMPT(r0, 0x80026101, 0x0) 05:07:53 executing program 1: syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0x4000) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f00000000c0)=0x91c) openat$random(0xffffffffffffff9c, &(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x5, 0x400) sendto(0xffffffffffffffff, 0x0, 0xa8, 0x0, 0x0, 0x863b6b7602ec05da) setitimer(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000004000, 0x0, 0xfffffffe, 0x1107, 0x2000000, 0x0, 0x1000000000000, 0x0, 0x6]}}) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc010643a, &(0x7f0000000700)={0x0, 0x1}) ioctl$VIDIOC_SUBDEV_G_EDID(0xffffffffffffffff, 0xc0245628, &(0x7f0000000200)={0x0, 0x0, 0x0, [], 0x0}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x2800]}, @empty={[0x0, 0x0, 0x0, 0x4000000000000]}, @loopback, 0x3, 0x0, 0x5, 0x0, 0xfffffffffffffffc}) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) 05:07:53 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$IOC_PR_PREEMPT(r0, 0x80026101, 0x0) 05:07:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet6_tcp_int(r0, 0x6, 0x17, 0x0, &(0x7f0000000000)=0x12a) 05:07:53 executing program 3: syz_emit_ethernet(0x103, &(0x7f0000000080)={@broadcast, @remote, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0xf4, 0x0, 0x0, 0x0, 0x73, 0x0, @initdev, @local}, @igmp}}}}, 0x0) 05:07:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:54 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0x0, 0x0, 0x709000}}) 05:07:54 executing program 4: io_setup(0x1fd, &(0x7f0000000000)) futex(&(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000040)="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") 05:07:54 executing program 3: syz_emit_ethernet(0x103, &(0x7f0000000080)={@broadcast, @remote, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0xf4, 0x0, 0x0, 0x0, 0x73, 0x0, @initdev, @local}, @igmp}}}}, 0x0) 05:07:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1f, &(0x7f0000000000)=""/59, &(0x7f00000014c0)=0x3b) 05:07:54 executing program 3: syz_emit_ethernet(0x103, &(0x7f0000000080)={@broadcast, @remote, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0xf4, 0x0, 0x0, 0x0, 0x73, 0x0, @initdev, @local}, @igmp}}}}, 0x0) 05:07:54 executing program 4: syz_execute_func(&(0x7f0000000800)="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") 05:07:54 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0xffffffffffffffff, 0xffff000000000000}}, 0x48) 05:07:54 executing program 4: semctl$SETALL(0x0, 0x0, 0x11, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x80}, {}], 0x2) semop(0x0, &(0x7f0000000240)=[{0x0, 0x7fff}], 0x1) 05:07:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:54 executing program 2: pause() syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_open_procfs$namespace(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000200)="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") 05:07:54 executing program 3: syz_emit_ethernet(0x103, &(0x7f0000000080)={@broadcast, @remote, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0xf4, 0x0, 0x0, 0x0, 0x73, 0x0, @initdev, @local}, @igmp}}}}, 0x0) 05:07:54 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0x0, 0x0, 0x709000}}) 05:07:55 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 05:07:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, 0x0, 0x0) 05:07:55 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 05:07:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0xffffc}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:07:55 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0x0, 0x0, 0x709000}}) 05:07:55 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) [ 191.812399][T10156] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 05:07:55 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 05:07:55 executing program 3: syz_emit_ethernet(0x103, &(0x7f0000000080)={@broadcast, @remote, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0xf4, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev, @local}, @igmp}}}}, 0x0) 05:07:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, 0x0, 0x0) 05:07:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dc86055e0bceec7be070") sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)={0x18, 0x15, 0x400000000000109, 0x0, 0x0, {0xa}, [@nested={0x4}]}, 0x18}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 05:07:55 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 05:07:55 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'lo\x00'}) 05:07:55 executing program 3: syz_emit_ethernet(0x103, &(0x7f0000000080)={@broadcast, @remote, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0xf4, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev, @local}, @igmp}}}}, 0x0) 05:07:55 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe}}) 05:07:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, 0x0, 0x0) 05:07:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x70}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:56 executing program 3: syz_emit_ethernet(0x103, &(0x7f0000000080)={@broadcast, @remote, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0xf4, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev, @local}, @igmp}}}}, 0x0) 05:07:56 executing program 1: syz_open_dev$admmidi(0x0, 0x0, 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 05:07:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:07:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x70}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:07:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:07:56 executing program 2: syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000300)) shutdown(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000000)="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") 05:07:56 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="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") 05:07:56 executing program 3: syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f00000004c0)='t\bu\x00\x00\x01\x00\x00\x8c\x0f\x00\x00\x00\x00\x88\xcb&\x96}\xdb\xfb\xe4\x1e\xb0\xde\x1c\x0f\t\x92<\xe7#\x04n\xcfc\x1a\xdfI\xd1\xb9\xb0\xe1\xea8\xe2g|\x96\xb3\xa7!\x1d}\xe7\x81\xb3\x86\x19\xd7\\\xc4\xe7\xcb\x9f\x91\xa4\x84EH\x0f\xf3E=\xb2\x9bt\x1a\xf06r9:\xea\x13WaHSa\x8a\xf8\xd6YF\xb9c\x18)\xadG\xa7\xfa\xc00\xd1\x84\xd8\xafP\v\x16\xb2\x92\x92\xabX/\xf1\x9cRp0\x02ye\xe5l`\xfdm\x12\xa7\x84\x9a\xe8\x11\xf7#\xd3Q\x0f\x002\xba\xa1\x11\xbf\x1b\x19\xf6\xac$Rj\x88\xc0\xd7\x1ca \x98\xe9w\xcb+\x7f\r\xdc\x1b\x1au\xdfK\xb43}\xba2\x8f\x03\xbaX\xeah\xce\xd8K\xfa\x90\xa7A\xed\xfbf\xd1\xcb\x03\xd1\xd9\x1f>\xac\v\x19\xc3\xce\xfdL\xe5\x97\xfb\x0f\xc5\xf9\x92\x0e\xa7z\x1e\x95\x19g\xa2\xd8\xddfW\xca\xb5\x9f\xc2\xf1\xf7w\xd5\xd6} 1\x8c|G\x1e\x80\x88Sv\x86\xfaL\xady\xb6;\xc7\xf9\x00~/\x89\xd28\xfcB3uSc\xd9RB\xd0\x13\x877\x05V\xc2v\xa5\x81 \x9b6\xcf\xa4\xe8\xd7\x1bJ\xf1\xbd(2\xf4\xac\x8c\x88\x87\xcb/G2eGf9L\x1f\xe5\xafV\x1b+_y;\xae\xba\xdb$\x88\xb5\x866\xfcJC\xa4\x8e\x9a\xd4W\xa9@\xbf1M\xd7\x19\x04.\x85\t\xee\xb0\xb3p\xba -\xc6\xa7\xa8\xde\x92\x00\xee5R\xac\x12\xfd\x88\xd6B\xb4>Al\x13\xde8\xea\x98\f\xcf\x9a:\x16u\x83J7\x13\xc8\xea\n\x00E\xba\xd8\x00\x00\x00\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f0000000340)={[], 0x0, 0x3f, 0xffffffff}) 05:07:56 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe}}) 05:07:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x70}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:07:56 executing program 3: syz_execute_func(&(0x7f0000000500)="f3e100def9575c8ac2c2c9734e424a2664f0ff06c4a279184fe2f04311b5147c00002e67660e50e94d00c9c9c4625dbae5feabc4aba39ddf450732ef0c0c0fae9972b57111f6") syz_execute_func(&(0x7f0000000780)="640fce71045d4a2be91cb9980f053ef3aec4a37bf0c5013474e2e9e9b7ebc4a2fdf2476d237bf0362fed66c60f492a0000d2de26f2a700610080b33800000000fac4a27d59947a02000000c482213e0488c4a2559d50ae0f7f1a16380136660f382895ed9600004cbec5c54d0f2c718f56476befee8f2870b63b30f34453c44fc44f8f6cb415001000007cfa11112e440f18d9c4217d2b951e76ba72c422cdbcaa0d100000f2ae2e470f81f1ffffff43f7942bfd660fdfdf6bd10499e143f3f081156af77bfa092f81dbd8a1a1e18864cf36400f0d8301000000410031af0f0f6d4f0d3e0fae600beb0fd467460f33c4c1ddf973fef440e4d216f5413c3a775c1e0f775c1ef3c4c14ac2c81d00593ef245a7bb1e9a0fec02c4a17ae64295007b1cffd2400f0f0aa7c4e1016948a9a7a4001e6a2a366464662683b9080000000df698b9800000d4440fddaf9494b2aaf00fc04307f62f26220feba177c4e33a787804c02e666766450f13bd076e42d38374fb0a070faee8c4837d09580203570000a8f7edc4037d092101f20f1dbe00100000c56197ba1ed322c95c0b5c0b40da32c4e1717d0245d8d58f0948943d00000000009b42a7a72885250000802026446fc4414974ec603131fb26400f6b935f1f6100402a402ac4c27d18eee3") 05:07:56 executing program 5: r0 = socket$inet6(0xa, 0x10000000000006, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe}}) 05:07:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:07:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0xc0109207, 0x0) 05:07:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x253) connect$inet6(r0, &(0x7f0000000340), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) setsockopt$sock_timeval(r1, 0x1, 0x0, 0x0, 0x0) 05:07:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x1a, 0x0, &(0x7f0000000040)) 05:07:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0xc0109207, 0x0) 05:07:57 executing program 4: execve(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000001c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_smack_entry(0x0, &(0x7f00000000c0)='security.SMACK64IPIN\x00', &(0x7f0000000100)='/dev/ptmx\x00', 0xa, 0x3) execve(&(0x7f0000000180)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(r2, &(0x7f0000005f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 05:07:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0xc0109207, 0x0) 05:07:57 executing program 2: syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0x4000) ppoll(&(0x7f0000000080)=[{}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800060c0045006, &(0x7f00000000c0)=0x91c) openat$random(0xffffffffffffff9c, &(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, &(0x7f0000000000)) syz_open_dev$audion(0x0, 0x5, 0x400) sendto(0xffffffffffffffff, 0x0, 0xa8, 0x0, 0x0, 0x863b6b7602ec05da) setitimer(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000004000, 0x0, 0xfffffffe, 0x1107, 0x2000000, 0x0, 0x1000000000000, 0x0, 0x6]}}) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc010643a, &(0x7f0000000700)={0x0, 0x1}) ioctl$VIDIOC_SUBDEV_G_EDID(0xffffffffffffffff, 0xc0245628, &(0x7f0000000200)={0x0, 0x0, 0x80000001, [], 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x2800]}, @empty={[0x0, 0x0, 0x0, 0x4000000000000]}, @loopback, 0x3, 0x0, 0x5, 0x0, 0xfffffffffffffffc}) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) 05:07:57 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r0, 0xc0109207, 0x0) 05:07:57 executing program 3: set_mempolicy(0x4002, &(0x7f0000000280)=0xfffff, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 05:07:57 executing program 4: pause() syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_open_procfs$namespace(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000005c0)="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") 05:07:57 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r0, 0xc0109207, 0x0) 05:07:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:57 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x800000000010d, 0x800000000b, &(0x7f0000000000)="73de7232", 0x4) 05:07:58 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000004e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="3aaa6665b36e44c3d4aa5747a076f065"], 0x10}}], 0x1, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x390, 0x0) 05:07:58 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r0, 0xc0109207, 0x0) 05:07:58 executing program 3: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file1\x00', 0xc009, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000001ac0)=""/11, 0x58) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, 0x0) 05:07:58 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r0, 0xc0109207, 0x0) 05:07:58 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000004e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="3aaa6665b36e44c3d4aa5747a076f065"], 0x10}}], 0x1, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x390, 0x0) 05:07:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000000004004, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0xffc00}], 0x1, 0x0) 05:07:58 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r0, 0xc0109207, 0x0) 05:07:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x700000000000000, 0x0, 0x500, 0x0, 0x20}, 0x98) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) 05:07:58 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000004e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="3aaa6665b36e44c3d4aa5747a076f065"], 0x10}}], 0x1, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x390, 0x0) 05:07:58 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:07:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:58 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r0, 0xc0109207, 0x0) 05:07:58 executing program 2: 05:07:59 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:07:59 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r0, 0xc0109207, 0x0) 05:07:59 executing program 2: 05:07:59 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:07:59 executing program 2: 05:07:59 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r0, 0xc0109207, 0x0) 05:07:59 executing program 4: 05:07:59 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:07:59 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000004e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="3aaa6665b36e44c3d4aa5747a076f065"], 0x10}}], 0x1, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x390, 0x0) 05:07:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, 0x0, 0x0, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:07:59 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r0, 0xc0109207, 0x0) 05:07:59 executing program 2: 05:07:59 executing program 4: 05:07:59 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:07:59 executing program 4: 05:07:59 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000004e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="3aaa6665b36e44c3d4aa5747a076f065"], 0x10}}], 0x1, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x390, 0x0) 05:07:59 executing program 2: 05:07:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:07:59 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:00 executing program 2: 05:08:00 executing program 4: 05:08:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, 0x0, 0x0, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:08:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:08:00 executing program 2: 05:08:00 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:00 executing program 4: 05:08:00 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000004e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="3aaa6665b36e44c3d4aa5747a076f065"], 0x10}}], 0x1, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x390, 0x0) 05:08:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:08:00 executing program 2: 05:08:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, 0x0, 0x0, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:08:00 executing program 4: 05:08:00 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:00 executing program 2: 05:08:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480), 0x0, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:08:00 executing program 4: 05:08:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:08:00 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:00 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000004e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="3aaa6665b36e44c3d4aa5747a076f065"], 0x10}}], 0x1, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x390, 0x0) 05:08:00 executing program 4: 05:08:00 executing program 2: 05:08:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480), 0x0, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:08:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:08:00 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:00 executing program 4: 05:08:00 executing program 2: 05:08:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:08:00 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000004e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="3aaa6665b36e44c3d4aa5747a076f065"], 0x10}}], 0x1, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x390, 0x0) 05:08:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480), 0x0, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:08:00 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:01 executing program 4: 05:08:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:08:01 executing program 2: 05:08:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{0x0}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:08:01 executing program 4: 05:08:01 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:08:01 executing program 2: 05:08:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8955, &(0x7f0000000040)=0x2) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8953, 0x0) 05:08:01 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000004e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="3aaa6665b36e44c3d4aa5747a076f065"], 0x10}}], 0x1, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x390, 0x0) 05:08:01 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8955, &(0x7f0000000040)=0x2) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8953, &(0x7f0000000040)=0x2) sendmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000280)=@ipx={0x4, 0x3233, 0x4, "e0a0aa9643fd", 0x497a8895}, 0x80, 0x0}, 0x4004000) 05:08:01 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:08:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{0x0}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:08:01 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000004e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="3aaa6665b36e44c3d4aa5747a076f065"], 0x10}}], 0x1, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x390, 0x0) 05:08:01 executing program 3: r0 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{0x0}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:08:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8955, &(0x7f0000000040)=0x2) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8953, 0x0) 05:08:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:08:01 executing program 3: r0 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:01 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8955, &(0x7f0000000040)=0x2) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8953, &(0x7f0000000040)=0x2) sendmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000280)=@ipx={0x4, 0x3233, 0x4, "e0a0aa9643fd", 0x497a8895}, 0x80, 0x0}, 0x4004000) 05:08:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x70}], 0x1}, 0x0) 05:08:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:08:01 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000004e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="3aaa6665b36e44c3d4aa5747a076f065"], 0x10}}], 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(0xffffffffffffffff, &(0x7f0000002dc0), 0x390, 0x0) 05:08:01 executing program 3: r0 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:01 executing program 4: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8955, &(0x7f0000000040)=0x2) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8953, &(0x7f0000000040)=0x2) sendmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000280)=@ipx={0x4, 0x3233, 0x4, "e0a0aa9643fd", 0x497a8895}, 0x80, 0x0}, 0x4004000) 05:08:02 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8955, &(0x7f0000000040)=0x2) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8953, &(0x7f0000000040)=0x2) sendmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000280)=@ipx={0x4, 0x3233, 0x4, "e0a0aa9643fd", 0x497a8895}, 0x80, 0x0}, 0x4004000) 05:08:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:08:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x70}], 0x1}, 0x0) 05:08:02 executing program 3: write(0xffffffffffffffff, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$FUSE_STATFS(r0, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:02 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x2}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000000)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') 05:08:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319b") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:08:02 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000004e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="3aaa6665b36e44c3d4aa5747a076f065"], 0x10}}], 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(0xffffffffffffffff, &(0x7f0000002dc0), 0x390, 0x0) 05:08:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x70}], 0x1}, 0x0) 05:08:02 executing program 3: write(0xffffffffffffffff, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$FUSE_STATFS(r0, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:02 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8955, &(0x7f0000000040)=0x2) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8953, &(0x7f0000000040)=0x2) sendmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000280)=@ipx={0x4, 0x3233, 0x4, "e0a0aa9643fd", 0x497a8895}, 0x80, 0x0}, 0x4004000) 05:08:02 executing program 3: write(0xffffffffffffffff, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$FUSE_STATFS(r0, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319b") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:08:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x70}], 0x1, &(0x7f00000008c0)}, 0x0) 05:08:02 executing program 3: r0 = socket(0x0, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000200)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000880), 0x40000000000034e, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 05:08:02 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000004e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="3aaa6665b36e44c3d4aa5747a076f065"], 0x10}}], 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(0xffffffffffffffff, &(0x7f0000002dc0), 0x390, 0x0) 05:08:02 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000001600)="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", 0x298, 0xb001, 0x0, 0x0) 05:08:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319b") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:08:02 executing program 3: r0 = socket(0x0, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x70}], 0x1, &(0x7f00000008c0)}, 0x0) 05:08:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd0") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:08:03 executing program 3: r0 = socket(0x0, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:03 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x390, 0x0) 05:08:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd0") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:08:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x70}], 0x1, &(0x7f00000008c0)}, 0x0) 05:08:03 executing program 3: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000200)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000880), 0x40000000000034e, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 05:08:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd0") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:08:03 executing program 4: close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000440)={0xfff}) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(0xffffffffffffffff, 0x114, 0xa, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_netrom_SIOCDELRT(r2, 0x890c, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r4, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, 0x0, 0x0) vmsplice(r0, &(0x7f0000000540)=[{&(0x7f0000000000)="b7722c443df4d82b2d5e74f7f05d4f839ad8b37bee", 0x15}, {0x0}, {0x0}], 0x3, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) uselib(&(0x7f0000000140)='./file0\x00') socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmsg(r3, 0x0, 0x100) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 05:08:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x70}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, 0x0, &(0x7f0000000580)}}], 0x58}, 0x0) 05:08:03 executing program 3: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:08:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:08:03 executing program 3: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:04 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x390, 0x0) 05:08:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x70}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, 0x0, &(0x7f0000000580)}}], 0x58}, 0x0) 05:08:04 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0xc0109207, 0x0) 05:08:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000200)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000880), 0x40000000000034e, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 05:08:04 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:04 executing program 4: close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000440)={0xfff}) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(0xffffffffffffffff, 0x114, 0xa, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_netrom_SIOCDELRT(r2, 0x890c, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r4, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, 0x0, 0x0) vmsplice(r0, &(0x7f0000000540)=[{&(0x7f0000000000)="b7722c443df4d82b2d5e74f7f05d4f839ad8b37bee", 0x15}, {0x0}, {0x0}], 0x3, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) uselib(&(0x7f0000000140)='./file0\x00') socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmsg(r3, 0x0, 0x100) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 05:08:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x70}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, 0x0, &(0x7f0000000580)}}], 0x58}, 0x0) 05:08:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0xc0109207, 0x0) 05:08:04 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28c3767f58", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000200)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000880), 0x40000000000034e, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 05:08:04 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:05 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x390, 0x0) 05:08:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0xc0109207, 0x0) 05:08:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x70}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), 0x0}}], 0x58}, 0x0) 05:08:05 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:05 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0xc0109207, 0x0) 05:08:05 executing program 4: close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000440)={0xfff}) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(0xffffffffffffffff, 0x114, 0xa, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_netrom_SIOCDELRT(r2, 0x890c, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r4, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, 0x0, 0x0) r5 = dup3(r4, r3, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, 0x0, 0x0) vmsplice(r0, &(0x7f0000000540)=[{&(0x7f0000000000)="b7722c443df4d82b2d5e74f7f05d4f839ad8b37bee", 0x15}, {0x0}, {0x0}], 0x3, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) uselib(&(0x7f0000000140)='./file0\x00') socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmsg(r3, 0x0, 0x100) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 05:08:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000200)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000880), 0x40000000000034e, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 05:08:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x70}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), 0x0}}], 0x58}, 0x0) 05:08:05 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140), 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:05 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x240002, 0x2, 0x0, 0x1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0xe, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x18) 05:08:05 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140), 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:06 executing program 5: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x390, 0x0) 05:08:06 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x240002, 0x2, 0x0, 0x1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0xe, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x18) 05:08:06 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140), 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x70}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), 0x0}}], 0x58}, 0x0) 05:08:06 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000200)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000880), 0x40000000000034e, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 05:08:06 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c", 0x13) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:06 executing program 4: 05:08:06 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x240002, 0x2, 0x0, 0x1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0xe, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x18) 05:08:06 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c", 0x13) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:06 executing program 0: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000080)="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") 05:08:06 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c", 0x13) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:06 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x240002, 0x2, 0x0, 0x1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0xe, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x18) 05:08:07 executing program 5: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x390, 0x0) 05:08:07 executing program 4: 05:08:07 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500", 0x1d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:07 executing program 0: 05:08:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000200)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000880), 0x40000000000034e, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 05:08:07 executing program 1: 05:08:07 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x20140, 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbd, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x12) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 05:08:07 executing program 1: pause() syz_execute_func(&(0x7f0000000cc0)="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") 05:08:07 executing program 0: accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000a00)="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") 05:08:07 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500", 0x1d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:07 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500", 0x1d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:07 executing program 4: setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000100), 0x302) r0 = getpgid(0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x101800) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) io_setup(0xfffffffffffffff7, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f00000000c0)='/dev/cec#\x00', 0xa) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000004000, 0x0, 0xfffffffe, 0x1107, 0x2000000, 0x0, 0x1000000000000, 0x0, 0x6]}}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x6, 0x6, 0x9, 0x3e, 0x0, 0x4000000000000, 0x10, 0x6, 0xfffffffffffffffd, 0xfff, 0x0, 0x3, 0x4, 0x1, 0x3, 0x5, 0x1, 0x7, 0x7ff, 0x1ff, 0x7fff, 0x0, 0x100, 0x9e, 0x0, 0x4, 0x9, 0x16, 0x6, 0x2, 0x101, 0x3, 0x8, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x4, @perf_config_ext, 0x8000, 0xef, 0x9, 0xf, 0x1, 0x7}, r0, 0x0, r3, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4004700e, 0x4) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x3f000000]}, @empty, @loopback, 0x0, 0x0, 0x5}) request_key(0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0xff, &(0x7f0000000000)=0x3ff, 0x4) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x7, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x3, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000000), 0x10000012a) connect$pptp(r1, 0x0, 0x0) 05:08:08 executing program 5: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x390, 0x0) 05:08:08 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28", 0x22) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) 05:08:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000200)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000880), 0x40000000000034e, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 05:08:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:08:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet(0x2, 0x802, 0x1) 05:08:08 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28", 0x22) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) [ 204.718386][T10868] kasan: CONFIG_KASAN_INLINE enabled [ 204.723899][T10868] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 204.732078][T10868] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 204.739026][T10868] CPU: 0 PID: 10868 Comm: syz-executor.4 Not tainted 5.1.0-rc7-next-20190430 #33 [ 204.741374][ T3879] kobject: 'loop0' (00000000bf75adb0): kobject_uevent_env [ 204.748146][T10868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.748175][T10868] RIP: 0010:vcpu_enter_guest+0xbcd/0x5fb0 [ 204.748203][T10868] Code: 48 c1 ea 03 80 3c 02 00 0f 85 6f 48 00 00 49 8b 9f b0 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 78 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 39 48 00 00 8b 5b 78 31 ff 89 [ 204.748213][T10868] RSP: 0018:ffff8880622b7a00 EFLAGS: 00010006 [ 204.748228][T10868] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000e856000 [ 204.748238][T10868] RDX: 000000000000000f RSI: ffffffff810cd7b2 RDI: 0000000000000078 05:08:08 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050022ffff00000000001c20000f1f0001ab033500b0c9cb2f28", 0x22) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0xffffffffffffffda}, 0x60) [ 204.748258][T10868] RBP: ffff8880622b7b10 R08: ffff88806b4d86c0 R09: ffffed1015d06be0 [ 204.786973][ T3879] kobject: 'loop0' (00000000bf75adb0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 204.790810][T10868] R10: ffffed1015d06bdf R11: ffff8880ae835efb R12: ffff888062f1806c [ 204.790819][T10868] R13: 0000000000000001 R14: ffff888062f18070 R15: ffff888062f18040 [ 204.790832][T10868] FS: 00007f51c390d700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 204.790841][T10868] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 204.790859][T10868] CR2: 000000000073c000 CR3: 000000009bdc1000 CR4: 00000000001426f0 [ 204.830491][ T3879] kobject: 'loop3' (00000000659b901f): kobject_uevent_env [ 204.831073][T10868] Call Trace: [ 204.873362][ T3879] kobject: 'loop3' (00000000659b901f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 204.878482][T10868] ? emulator_read_emulated+0x50/0x50 [ 204.878500][T10868] ? lock_acquire+0x16f/0x3f0 [ 204.878516][T10868] ? kvm_arch_vcpu_ioctl_run+0x240/0x1750 [ 204.878534][T10868] kvm_arch_vcpu_ioctl_run+0x425/0x1750 [ 204.878548][T10868] ? kvm_arch_vcpu_ioctl_run+0x425/0x1750 [ 204.878566][T10868] kvm_vcpu_ioctl+0x4dc/0xf90 [ 204.878580][T10868] ? kvm_set_memory_region+0x50/0x50 [ 204.878606][T10868] ? tomoyo_path_number_perm+0x263/0x520 [ 204.934948][T10868] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 204.940779][T10868] ? __fget+0x35a/0x550 [ 204.944974][T10868] ? kvm_set_memory_region+0x50/0x50 [ 204.950276][T10868] do_vfs_ioctl+0xd6e/0x1390 [ 204.954887][T10868] ? ioctl_preallocate+0x210/0x210 [ 204.960014][T10868] ? __fget+0x381/0x550 [ 204.964190][T10868] ? ksys_dup3+0x3e0/0x3e0 [ 204.968613][T10868] ? nsecs_to_jiffies+0x30/0x30 [ 204.973475][T10868] ? tomoyo_file_ioctl+0x23/0x30 [ 204.978436][T10868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 204.981026][ T3879] kobject: 'loop3' (00000000659b901f): kobject_uevent_env [ 204.984710][T10868] ? security_file_ioctl+0x93/0xc0 [ 204.984730][T10868] ksys_ioctl+0xab/0xd0 [ 204.984747][T10868] __x64_sys_ioctl+0x73/0xb0 [ 204.984765][T10868] do_syscall_64+0x103/0x670 [ 204.984784][T10868] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.984795][T10868] RIP: 0033:0x458da9 [ 204.984820][T10868] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 204.992834][ T3879] kobject: 'loop3' (00000000659b901f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 204.997023][T10868] RSP: 002b:00007f51c390cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 204.997036][T10868] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 204.997044][T10868] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 204.997052][T10868] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 204.997058][T10868] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f51c390d6d4 [ 204.997066][T10868] R13: 00000000004c1d42 R14: 00000000004d4550 R15: 00000000ffffffff [ 204.997077][T10868] Modules linked in: [ 204.997099][T10868] ---[ end trace 6a6d45eabc2fbd47 ]--- [ 204.997118][T10868] RIP: 0010:vcpu_enter_guest+0xbcd/0x5fb0 [ 204.997136][T10868] Code: 48 c1 ea 03 80 3c 02 00 0f 85 6f 48 00 00 49 8b 9f b0 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 78 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 39 48 00 00 8b 5b 78 31 ff 89 [ 204.997151][T10868] RSP: 0018:ffff8880622b7a00 EFLAGS: 00010006 [ 205.140191][T10868] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000e856000 [ 205.148264][T10868] RDX: 000000000000000f RSI: ffffffff810cd7b2 RDI: 0000000000000078 [ 205.156259][T10868] RBP: ffff8880622b7b10 R08: ffff88806b4d86c0 R09: ffffed1015d06be0 [ 205.159456][ T3879] kobject: 'loop2' (00000000c403a340): kobject_uevent_env [ 205.164245][T10868] R10: ffffed1015d06bdf R11: ffff8880ae835efb R12: ffff888062f1806c [ 205.164253][T10868] R13: 0000000000000001 R14: ffff888062f18070 R15: ffff888062f18040 [ 205.164265][T10868] FS: 00007f51c390d700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 205.164274][T10868] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 205.164281][T10868] CR2: 000000000073c000 CR3: 000000009bdc1000 CR4: 00000000001426f0 [ 205.164295][T10868] Kernel panic - not syncing: Fatal exception [ 205.165363][T10868] Kernel Offset: disabled [ 205.222342][T10868] Rebooting in 86400 seconds..