1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed007a000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0500000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:09 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0xfeff}) 00:30:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x2) connect$netlink(r0, &(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbfd}, 0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x6}) [ 1808.217439] nla_parse: 12 callbacks suppressed [ 1808.217449] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:09 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0xff00}) 00:30:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0600000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x3ff, &(0x7f00000001c0)="0adc1f123c123f319bd070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f00000000c0)=0xc) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000380)={'nr0\x01\x00', 0x501e}) ioctl$TUNSETVNETBE(r1, 0x400454dc, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl(r1, 0x4, &(0x7f0000000140)="9b8876b516fdd822485ec2e8db87e26369a5f1a302c78863900cdcccabfb06f4576a85a56656a4b151ab0b11447c4fa4661c18ae9416d9858654e4fb86e4c2080112150f000000000000aee1a98867cacda686cc79d315d214718cede2cf3131fce09bbc94ffe9906a4b8d3563bad2e38b802e249b06b9d12888d7eff425df73") [ 1808.348302] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1808.367905] BTRFS error (device loop2): superblock checksum mismatch [ 1808.387484] BTRFS error (device loop2): open_ctree failed [ 1808.477856] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x101ff, 0x1, 0xd000, 0x1000, &(0x7f0000fff000/0x1000)=nil}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e23, @empty}}, 0x1, 0x4, 0x8000, 0x5, 0x8}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000340)=@assoc_value={r3, 0x3}, 0x8) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:30:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0700000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:10 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0xfffe}) [ 1808.520909] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1808.600889] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1808.619700] BTRFS error (device loop2): superblock checksum mismatch [ 1808.641192] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1808.663873] BTRFS error (device loop2): open_ctree failed 00:30:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x79d, 0x0) 00:30:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x2f1, &(0x7f0000000300)={&(0x7f00000009c0)={0x14, 0x29, 0x7, 0x0, 0x0, {0x3801}}, 0x14}}, 0x0) setitimer(0x0, &(0x7f0000000040)={{}, {0x0, 0x7530}}, 0x0) 00:30:10 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed017c000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:10 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x40000}) 00:30:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0800000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x103601, 0x1) recvfrom$unix(r0, &(0x7f0000000100)=""/58, 0x3a, 0x2020, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfc1000)=nil, 0xfc1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10000, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000140)={0x8, 0x20, 0x1, {0x7, @raw_data="3aca98ab01fc412abc743dacf1537bd892a925399207a2e92cfe613e8464c86916e73814ee4509a77e2dca88bcc7309ebc36d72a84971508ea07d90657ffb827ae7666a6d12fc8e1e3ae19d824739d2a22c3af8e8a3ab54e9937221ad0b4b2928300345eabbefc16e30e8964b57138b57e0c6c067e40b8801a1ecf102c2cd629c230f9068537f97eee73ae18fe18617fa7635126e2fb73a4584a42652f6ec44dfb2c51049b5aa3ae077e42567618bc8d58c5201867c17f6b06c41132d12446ba3a77adb745cdc32c"}}) r2 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fc1000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) eventfd(0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000a20000)={0x8, 0x0, &(0x7f0000fc1ffc)=ANY=[@ANYBLOB="027087ab02"], 0x0, 0x0, 0x0}) [ 1809.068103] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:10 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b52}) [ 1809.153995] binder: 23808:23809 unknown command 2 [ 1809.163927] binder: 23808:23809 ioctl c0306201 20a20000 returned -22 [ 1809.177239] BTRFS error (device loop2): unsupported checksum algorithm 22813 00:30:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000300)="44d9ee4a2ae92c86b64c0f05be03100020c4a37bf0c52541e2e941d82a4a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f450f2f02c421dd589fc4e10bf8c426f2f045f6196462bfffffffff0252262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53af6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f8a6465b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f38346800c4e3295e4c3dc8a3c4c1045ccc7d7526802d08000000fa0f5fd25cc401f82b90b6d50000f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") syz_emit_ethernet(0x74, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaa72d90af8aaaa0180c200000086dd60d8652b00140000fe8000000000000000000d00000000aafe8000000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x2080000, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000000)={'\x03\x00', {0x2, 0x4e24, @multicast1}}) close(r0) 00:30:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0a00000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1809.208289] BTRFS error (device loop2): superblock checksum mismatch [ 1809.224071] binder: 23808:23811 unknown command 2 [ 1809.237202] BTRFS error (device loop2): open_ctree failed 00:30:10 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b53}) [ 1809.259193] binder: 23808:23811 ioctl c0306201 20a20000 returned -22 [ 1809.298488] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x6, 0xf087}, 0x14) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000100)) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) r1 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x0, 0x200000) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000300)={0x4, 0x3f}) r2 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000240)={0x7, 0x0, [], {0x0, @bt={0x8, 0x0, 0x1, 0x2, 0x2, 0xbcd, 0xfffffffffffffffc, 0x800, 0x9d27, 0x4, 0x9, 0x0, 0x7146, 0x1, 0x1, 0x1}}}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x31000008912, &(0x7f0000000340)="0adc1f123c123f319bd07060c5a530f5e3e08695e978fc7e1fb2b166fb7eaedbabdbcddf6249338b4211a2d723204b6854802ec824eed52ed5f30bd9de1c6bb2e5b730a93a39e667fcba436dc7fe29ac8201829846d7fa2ced158ee50a8526a1eb48e441ffeb9a4f1ddbd5b769f65f892f4218e7a9cbca3498b5e0b5dfff24866fde6be83fedd5d21b452a7acebdb88082e43bfe5e99f25958972aace684b44b55a0d57a84d70341a839d58fd96c8f1f53b283dab6cde5e25eff36c2cad595d1fe5f4446fe4a7f854219df08399a63f0c19b630389f4771f44c0c62974e5d107ab061916fa847491962acfcb560afc01ecf84e403eff6819b56078be8cbf28") setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000140), 0x4) close(r0) [ 1809.359184] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1809.476554] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1809.542163] BTRFS error (device loop2): superblock checksum mismatch [ 1809.610850] BTRFS error (device loop2): open_ctree failed 00:30:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:11 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x900, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x4, 0x8000, 0x5, 0x2, 0x2, 0x497cad23}) ioctl$RTC_UIE_OFF(r0, 0x7004) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x200, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000140)={@empty, 0x51, r3}) fcntl$getownex(r1, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)=0x0) kcmp(r4, r5, 0xa6d44d7c88417581, r1, r2) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000380)={0x8, 0x1f3, 0x1, {0x4, @win={{0x3, 0x3f, 0xf0, 0x7fffffff}, 0x9, 0x2, &(0x7f0000000280)={{0x800, 0x20, 0xfffffffffffffeff, 0x4}, &(0x7f0000000240)={{0x4, 0x7f94, 0xcb, 0x100}, &(0x7f0000000200)={{0x80000001, 0xffffffffffff4558, 0x1, 0x4}}}}, 0x1, &(0x7f00000002c0)="099475efbce26853a28ecc41c2cd973f9625d81de6d9c56c510f80503974b12591c9ebeaf6d9a98aa98fb5a2160ef669cb9216b458414070c19a8a823512b9833c112f625968ca49c6fe830ff8b038d476a45a1e6bd00088338e20aa94bbb791fc83b847023419146195b2314f6104dab9132b5a7b416e5aace2541a75b681f43b53bf3a0ba3818fff77d34ef763523c6a414ed0ba75be8f0ae18c1fb5bd0b94ef79f88a52177a5c84c225d89ad1", 0x9}}}) openat$cgroup(r2, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r6, &(0x7f0000000500)={0x1, 0x1ff}, 0x2) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r6, 0x84, 0x7, &(0x7f0000000540)={0x5}, 0x4) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000580), 0x4) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f00000005c0)={'vcan0\x00', 0x9}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000600)={@local, 0x31, r3}) r7 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000640), &(0x7f0000000680)=0xb) fcntl$notify(r0, 0x402, 0x19) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000006c0), &(0x7f0000000700)=0x4) ioctl$TIOCNOTTY(r6, 0x5422) sendto$rose(r6, &(0x7f0000000740)="a6d2e0f6e9ef5fe29ce7074486696dcd227f51bb9cf740d1bdd3caee7998e0c66bdfec90ee19e8c805c4b2f2685639ec98c3803be35b7bab43f19fdd32828600f319083a06993b8c73ff4081a11f2b7139f4feafc9984e5eb31d4563b289f9fd319b910961d8304e01b962ced1a712ae71cb8892f5044eb8e98ce80120457ee1a0a8ae3fa1648c44caaa7a4b3dfcef50f312973ce72457700738d32180bea35f6edc5ac9400a0a917a0372dbb01ed2c34999", 0xb2, 0x20000000, &(0x7f0000000800)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x6, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @null]}, 0x40) sendmsg$kcm(r2, &(0x7f0000001c80)={&(0x7f0000000840)=@x25={0x9, @remote={[], 0x2}}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000008c0)="c8b49c5225da117a63da65df457f10ab333ba60c23e9a834687dfcce1cb91619f3fbcd37718fe500a4525bf60da27c4398f9f3578ba3e9acda0cfc9a63421e53db8d65a9dab9a4b4e6e9ef46bb18614113abb1b4efba8c9bf300c9a23bda8e314c270ec1f74ae01da243218a754f1bf48ad54cbcd559a94beae629f549ecafe79d0ef3b8d28816643bbc871edc2f4dc1f3d5b40648bb97e7e509a760a31bea97cfbe62e444072a707bf16036ba1d65c1959fdf0305b61eccccfc6623410afb8e248f98be", 0xc4}, {&(0x7f00000009c0)="df0fc885ec8d9118d4d5f98389055589560ca394e82133e1a0c6c26f965ec0350e47ad6d60cfeb6a8f02387a27735724ae384f7c8ff06daf6b8f3f6b3e7156927a82e40e09ecd32704", 0x49}, {&(0x7f0000000a40)="8473a1a31fcecfa4a5ac813da1e8179d7474a1a98101a49983e8e8b7359274a1a1fc33da", 0x24}, {&(0x7f0000000a80)="e5ea0326a91c9e1859f97a1f4ec0a22e55cdae426e994b1b1a7a8c9638ca1fcc9e537dc164a282b3009d8f70b4de7bc54a99eafc6b5f15bf2468dbd234d42954e9f46a6c390a536d7234c31adf13b9b808a9", 0x52}, {&(0x7f0000000b00)}], 0x5, &(0x7f0000000bc0)=[{0x20, 0x10f, 0x3, "6c1d66a9bbda78b83a24ee"}, {0x1010, 0x11f, 0x3, "2239acf67be47a3ff524fefc2213df4486573df73e355b22f0d393dd8243b5043ba6d2d90cfa207d97f3f00523fa3cecd3273169ba155f71b428e6ef7facfb7f60e17a8c294d150f0e8dce1c470325a1bf95219d88438e272c54d3c2ff46a41193d7501de253ea64b613310f50ab28f64f51c1f191193eb5cea192f69d48342125c06cb9e0c160a5f9a599e66f3978c186e76b41b3d4354dc26ae23d271dc2d846d59567d05d14c06c06364de86e3f549d109ba484abe3d28d6c98dd28bf248737a41d5c7894675200165e5be3f795f8c0d3d926854af796e7afd20347c4fed8acc7b91fb5526cec655864348e18a77f2874e8983348e37f6cad31125a70ca3345d617eeea74dc456f104b6c213cf89e643fdcef180659ca5ae9afd448dee938edd2422321347f47d1d871a2d03b163e1b9fe18f602bd74fcb58e6c5b92943f883ba0d3a101bb87a5c4bf8a45163f103a9d05c6ced60083374cf226efc4a09dcc08b621d04ac849922ba79635abe1e985b73e619a3cee17c7d8ae92b93dab07d80a65d65857a3b72966e68556533a6f4563408192641904b0f88a8d16196adcfe53420bbbd43c4a2fc2dfa22a9658f196bc0587a76da4ae8e871c567726ce1e1f8bdde6b492a5764102f55af7a9d34c530b9a6c1f5fb7c4f0935a8d3fd84f3c9d2b6252c0c704d1d40034deb5d413f1d266d69e8748200ae5afea3804f08a43db7f294b43787c5a5e40e30e412f7ff3be72452dd39835fd9b1cf260b918917cbd3386930d90c70c503653d1c467ca10318008bfb2ccb7b84d17801e06f96bfd640cae3e3b6c736446d3201a2a031e27e1c72dbdfdc7cfc9779a25e73a5a5e7143d55c7d850679ffd5873cb4582db8e8f34fd83a0535fce756db697fba610c35a3e2d4cf314c34c786f6e8f0d26d0c684a4b10f187ae5ecef9b7d5de80261b307d5d1c032673c509fd8dea5efd586386c6506d2a9fe4c6af0f7d0effa694e7722f0bbde3ace613e00fc1a8115139a623132baae708488df2506a225f2f8aebe5a869d73878356a075f5a21c170c75457ab03ef8d80041bd108823417408201985f3bcd4394689436db5914c8bef8e5d424e539718601a5a53127ceb59a4367e37e00580ca71a0d660ef102b09022781d89ead5fef7bd0a35775d66984e145554ecbd21f414d98b7e0dc36ad8ff91616e74b2963172c9a47a2f29e445c126b6527553460c654b8c26ca8c50f7fb09e444b531945dfdeaa32f9e7074714236b147b627621a5d5d2a7a04ede596736bc4fdef91fbcac1eec1318d1553349376ac84a3fb1eb20343360493b9321af4bf4645cd7313eae926f6fc56efb4ca139de62f8f8c723d75583e68cab70334ab888e6d296d7d58109afddbc8be54614f0c418e3d7901f34ebc0fa76946ff88b269ea2158e8eb799c814a1b0fe9e747eaeb9452bafd1f9b51bc5e4b93d8345eada983984464b364a1491722bdf7af8bef8d17055002dbfe142b77f6a82672c66f6d9fcaff087c776c6edf0df9698e3288ef6f0548fc3d96c5fc9eee35bc2c1c6c520637bbb34ba94c34e4711de80b6fc979e54cedadfde9a9ef23f2cb12283565411a74c4ba7119949b392733cced0a009c8691884bc4a1eeb4f70365f24248e91c56f2d7cee724d70505678184fbfc8fef69390a9dd0373745530804ad3f8d47a19e8e4bc1a91c79c30cadaeb9907c7543208a2b19e098e16316dc8383a40ce7dc86e96f67c67773624f95343436cda5a7ce22400e2caea4555284c2a1bf36ce4b648bd94e6a99a1ad8af95f3f157faecd9a577e74fc01ed619b37a8ea48d4a04e726aa31827af80285b5dc8a2c7daf3951bb2a40258604ab53926e4660900b585b02a30faf9e446922dc850da8592414b433824c630e4acc6763e682b3aff09dd371a192889cd9ae1cd977069c37c9e6dfa65637906e001e07bcfca32b0ca68bf4e0a32171f83eb4f94551a89c7b278dd2498851cc72823a1f13818367d7d3c78ba007c5e3acc6ef8fa6e50cc8a805d4e6143aff9b2fbfe6273133aec6deb8de14dedfb90cf52f0ebcf8221f8e2f0a40df413d181de1e5805e9d729ffa19b765997e5cbcf77de839482b55d0804f643a9243d00d17213d49dec447329caba397aa5bdc44bd8fe9d6596df9a25e642ad6ac01876f8006ddcd7a21ea2915a0a3ee51357da925fe528e46de2276db45c72867df1e715559cf7ce812614dbd7736382024510116a78fb4890f1d548c7480cf703eda332ee38904639970f405337fc3b7cac21004fdd75f6e176284f7315eaae2ff21728c3eb79f92d616fa4c8711622063eda26edb829290329c779be90477fb49e0d0e1533bf53363c8b8d50371018a82390f194238702bffaa1a678f66cab7df30cb9f500b8fde7301a8cd8f6e263762d06fba30f30e2e3910b365c2765633e2b8bf97a694214de8a945a3e5831ce82c8ce52ab62a9912d2d941709b227fcfb1021906166937aa7e8a79f40fe12aa9bfbfbf7f65918e9f57dd96f165a9992b3a04ba4831033e07dab7cd9a32df44bf91bea20048a30e98540c8331dcf5d5f7f3e71bb3b41483fc0e175db7aac38f96fed69ad9cc90f3753b56a4b998d1b21a442433cc00ece4dcd5393947f85937182dd3c0ddc9fe61b3f98d624c002059682fb112d123d4f013e8a60612413545d08d30a3ec85403d546f604377fcc0631d4ba412287386d524fe78fc07a7415f7a9e588f6e25bc5ed2b9707112f91726350ccf9d1e630fa0d411825dc9572d3a3c5971b96778fe276955799ee097764dcd8e9a60ddbb4efacb2bdd3bc00c4e6b37d6042ab7d55b8d679f9146c0cb735665707e5957acf14aac945640194462ad20d777e6c5cd05f9dd908a5222fae3c73fe4bf5bee3f4cb9bfd206a375aa43be770af310af773fbf3629fa46fca573bf85fca9db83e5c902ab0bf4079ce8428f5453afde999bed5cae51de98ad1be455d3670beebc16156eb8bc6df24f5d307b0df689e1c2b5d74652d678979d71cf06399f9c54c7bb9779839e22a203efef728fe5d8d61024b11acf365e824cda6a9d25effe85fdbb012950b6bd1ebaae34e0876f4dbab9b72710e4425205718877b29e54d28773f82920f743ad76a592bccef0f71dd39bf5c37db836967a8e280210395dcbfef71f1891fe8050c625f2f996b1ba30083b604dde2d67a27824c48449b418a6e67df3cb8ff12f57664932ccfed89f7f979b901d1c4a57aebdd07f0e1a8c51a21636d05ce46cdf3857e291201a2a0f53798be24e7af3cf866c66ec0177a12fca8bb744998ca8e06e9d2c80c25beb12e1d392ae7edcd4854d64a2bf681140566cb6f502d297db39cad3a78e468e1593268a544ea5b5c695535f57f9f65bb611b1d112c6f4de200aa312ca7db58e97f7429d9d6bca2fce8f22537ff8c5e66576018c8a24a8ae28e793162c0f6a019bfb89d7528daf7664a65a76b78c604e25aca319baa69c03e51e7b99fecbbf8fe07115af50725add1984a5f976c5eb25fea10aeff66fe6d7665e3da8bcc46dd29d6901b783375c6c005fc4c7c2e55617e255cd587bc23571dda664aa206624fee80da8150b39519d4862a16a5f6158010aa83d9dfbab30f12ecdb47815fdb94b73fe0a098f34f8c639e57d19ef58deeda8c4703035dadd19a5d00a4678b457394da65a826112d2002b39262f689fd628cb6a6b398083f92b712ac666a8056c89e9b83c3183fafbb028658bedcd8a568572d4ef15caa0076488cc39c90a9bb76e66a922614951862a081b519fb83d3c3b8b40d2c683666d763bc297be3cc188193915559a27788157ff077f413110643e69a6ea45ee68fc6732d299a9d3e7086e45af8d66ce92edeed95eb5190bcdd1f82f7dc6dd6be7ebdd7b3b26a8e965387a0bd6781a13a88ab60dc5e18983266292c19ceffe738460ac22bd7e7e76f6c6dd872f0f8610a2d21ab32fabd5329718c353ba951c0e355948e1f6d846fc1c3049f9287bd993bf28e828c44743a0170ef2a93ffc0128a7c6f64689aca20be8ef90a7d9ccac9082b80a8148492f0bfcfe0c52f48cd7752da1c330839f7061349dafc74b0207c99ea0448320e897e6b720f9db8bce7301e0de689061bd6e7eeda58095c54e7bf8181bfb340e399fb50c12599d3035d9a5e2de2e0b76b87d1f7a98284d6d146474024342fb8827397ea5d3c86fa6cc4a9dfa105d90cada27cf789e79d190313e93931dc3fc8632f1a3ca43be7ff681a02cc3700ef97c707f96c15c68f0721a63483517b96d9d8fa5a1ae4c9df10c63023fbb56b39da1db0d99ed28fd8d4b74428c23fac5537d34350bd645ec892a48ca2daca5b8382ec9a9a0f227f935686ae68e681372cd86f04f0ce8412eea0318724979968f47666d03080deaab5caaf780398514c7560a516e886100d1e57431486ec6f396b0e5f36a9530fbe61afa0a9710c6cae925d1edffd1b935a85705e9fdb2fa8fce113898fe949f0293f7e5955da8faa6184d0d7aadc65dda4d4405f68355d532c1cc3f55b1540d4660fff7b296ec78e20a6731a5201df6a26393b9a695e86e2db46dc2efcf3fea2ebc80acd84f4599aa38c31cb8a7b125fe114ec1a6fcdf9bf8a590364f3d8d5a38aa68a258caf2b3ee78294a1c29bcd3fce7a9c2389dcab6ab537b045ccb672ac786b347a78a7bc11256ba1de20d1efd2b91a4789162aa898a2d98ec27081d14448a9b1790175d1a9b7f16ee48d57772eb5776fb45d6ce79458eaef32fd9b444634d05621e2c1ad32fa35428f0f02a6aa0ab474ca96a049a323785d489c7644f3f8701f5fb42ea41e1a7c65cbb2502aef34ea1af1618cd6a0face0fe17ea1b01032ed1d2de7cbddbe2b892597c3916a392abd3f4e7be046ef0eda2f9b08695b5ed822611b287050ddfb30a156e61ae521998558bcf28c38d3b128d07a20755bba56aae95c0703388b2b1d45559d5875fe40a484f20d93024013a99818a369557a594d69c3c9e14fa972cb4c9d5054aa0b3d6da9e7bfdadd1e1f9efe1c73ca355fb4955be27ad9f0df8a7dca23edb703bf2372c7f9145848b1ea3209544b185bd77fd21d5b624f6c74c87b3cbdecad360d3c4811cb8bddacd2895fb876ede96d3dadbc9905f8e0be632b22c3d99d18700e2545a68655de77086cd452f3689dd52682ef7bc8e368dff5f85b4b90a959ea93bc9b24ac029ef90fa1ad68f055c1829a729b70b96a480e0dddc32d04d24d35d2fed32ea4528f6536a291eff5c8447004eef56ca742143183546f8f36839e89687d3f7585a204ef9a39098fd7f0491aa3933925f23e0ef8e7761e47b0673c18b64fd709793736ac356c4e96d54ee7589f3dcf0ddacc8d4d73c4f48132e509370a4ea9acd1f917346bb636c0a7b2a129000b3ce8d3568768fdb492b9502e53246b88e02fc530f1bcdc16569cb727dc69ff873e404cfd7de2fc3e1bfd93cf6d784cec6bec7d195c0ef6ddcbd02086b250b0a3c66d9e7aa71c84652df18b02ab192bb839d022d2944b739aeb7890901fb4e86969b02f2e01ffac740eb273d548708e40ca6881e38bf182cf872dbc227aae234d7e143611d438b1011081e657dce03811e24fde2641ec66f8bd062a9026836aa355050165ffb25f7be510eef87efe7ac963bff3579bb764fba1b82bbcd89281d88c9f39b44622fa06aec532381b385f9dae3a977f04aff3a5860fc662275c4b936d04f14504e4d7ce91d65a66a910835c6d0d79cb137c4c4de49f99ac30681f3cbfc4c54259f53f9c578db6b297d2b28553e9db6"}, {0x68, 0x102, 0x1, "a0d8b16724c36d8797ce7e95bbc3a1f9ddaaaa40c304defffbe06a5d62490fd24e7c18a562fa66e690571b21a59308520bd9e2e5dae2d7947b52c23533a7545480addc1041c5b0cd363c5f1651f564793dee86b3162d47"}], 0x1098}, 0x10) ioctl$KVM_GET_PIT(r6, 0xc048ae65, &(0x7f0000001cc0)) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000001d40)={0x0, 0x8001, 0x400, 0x5}) write$USERIO_CMD_SEND_INTERRUPT(r7, &(0x7f0000001d80)={0x2, 0x141}, 0x2) write$binfmt_elf64(r6, &(0x7f0000001dc0)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7fffffff, 0x6, 0x6, 0x2, 0x3, 0x3f, 0x3, 0x1f, 0x40, 0x23b, 0x4, 0x7, 0x38, 0x1, 0x4, 0x3, 0x5}, [{0x0, 0x1, 0x4, 0x400, 0x5, 0x3, 0x7}], "4aee9267020fb11683d0869a1e6fccb2d7382fb3719199a342f267b273818bd92d4cba882c20bd1ae30c8cb0730f4b4d24579cedcb368c879b393cdf0c95d4cc9af7a2c9e1c3732a1935626ab7e50426a730205cc11227b047e1c5c4cdb3f26d046de75de3cbbccba193b90e8fdb43710531bfff244aa1ae8e0c2c7c4edcadd0a685ff3026d26c307f89e127079097cdf897c2de632bdc1fd6be63bc2b7102f4dba5136ee0374dc13cab9cd21234a66015e56e52955f6f7e3e2d79d4aec8de6cbe40b3add0d1b089702ada023c367473309b78c8aad801", [[]]}, 0x24f) lstat(&(0x7f0000002040)='./file0\x00', &(0x7f0000002080)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000002100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002180)={r4, r8, r9}, 0xc) 00:30:11 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b54}) 00:30:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0c00000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:11 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0380000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) [ 1809.876619] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x100, 0x209e20, 0x8000000001, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x6f2b, 0x77fffb, 0x0, 0x10020000000, 0x0, 0x4, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffe}, 0x3c) 00:30:11 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b55}) 00:30:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0e00000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1810.018029] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1810.043698] BTRFS error (device loop2): superblock checksum mismatch [ 1810.089144] BTRFS error (device loop2): open_ctree failed [ 1810.138932] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x74, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140000fe8000000000000000000d00000000aafe8000000000000000000000000000aa00000000cf99a32bb22c81b46bed4c673017dbd190c08ff31403ae228f9671851d7f6a56b25f2afbc90b9c221b8305f0af8bb6", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) 00:30:11 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r0, 0x0) mbind(&(0x7f00005fe000/0x7000)=nil, 0x7000, 0x0, 0x0, 0x0, 0x0) mmap$binder(&(0x7f00005c1000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x4000, 0x0) sendmsg$nfc_llcp(r1, &(0x7f0000000140)={0x0, 0x3da, 0x0, 0x0, 0x0, 0x36}, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000180)=0x4) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 00:30:11 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b56}) [ 1810.230333] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0f00000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1810.331082] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1810.377242] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1810.417723] BTRFS error (device loop2): superblock checksum mismatch [ 1810.473135] BTRFS error (device loop2): open_ctree failed 00:30:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:12 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b57}) 00:30:12 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0284000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f1000000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:12 executing program 5: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0380000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) [ 1810.741496] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1810.859627] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:12 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b58}) [ 1810.915565] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:17487635432702809553 old:/dev/loop5 new:/dev/loop2 00:30:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f1100000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1811.030343] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 1811.066354] BTRFS error (device loop5): superblock checksum mismatch [ 1811.106647] BTRFS error (device loop5): open_ctree failed [ 1811.106810] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:12 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b59}) 00:30:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") fallocate(r0, 0x20, 0x7, 0x4) syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1811.237489] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1811.253032] BTRFS error (device loop2): superblock checksum mismatch 00:30:12 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000180)=0x100025f800000, 0x1dc) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x2, 0x448000) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000140)) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)="676fbfc4c767f2a7799f215b6a1c6e41fea9e30d059b50258a4ca91f053df7544e08030c967f980e3cefee1edcc44518d88702007a85d6bf86cdd53fe361906c137191cd36f108c8915bc0261c7827583ab629bd38dd7c170502b3d4fb2f77b9ea3444f523d7675042a6dc30ebbbcafdc18838cf511e9c4c56e7f5819c47e8a7fb4a702c1b36a7c2952126ee317e77bbb32524f08130ee22a385f95bd3885abae71eac3f9c61c02ab797e5231645279d6b9aeb718358e92be08eaf2d7a20e2b96b6bc56d10b8d52c42941ef1a4c7172ccbcf90af134ea546fbc57031356da018d951665a2d818f6d3e9940205b5d93953b", 0xf1) 00:30:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f1200000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1811.333119] BTRFS error (device loop2): open_ctree failed 00:30:12 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0386000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x74, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140000fe8000000000000000000d00000000aafe8000000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000020092780000"], 0x0) 00:30:13 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b5a}) 00:30:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) bind$nfc_llcp(r2, &(0x7f00000000c0)={0x27, 0x0, 0x2, 0x1, 0x3ff, 0xffffffffffffa611, "afbc68034e8435823db522370750b82cdcb7013b932d617c9b94a8e63b00b663dde2c0ffd4991823a11d6f5a1c4e5c60569b6dcb063113605367062d409a1f", 0x2c}, 0x60) fcntl$getown(r0, 0x9) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000040)={0x79, 0x0, [0x100000]}) 00:30:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f1800000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:13 executing program 5: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ecryptfs\x00', 0x1, 0x0) [ 1811.700865] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1811.723271] BTRFS error (device loop2): superblock checksum mismatch 00:30:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f1a00000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:13 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b5b}) [ 1811.842503] BTRFS error (device loop2): open_ctree failed 00:30:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x74, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140000fe8000000000000000000d00000000aafe8001000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) 00:30:13 executing program 5: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) 00:30:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f2800000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1812.019576] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:13 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed038a000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) [ 1812.345070] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1812.380295] BTRFS error (device loop2): superblock checksum mismatch [ 1812.407139] BTRFS error (device loop2): open_ctree failed [ 1812.503047] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1812.542327] BTRFS error (device loop2): unsupported checksum algorithm 22813 00:30:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:14 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b5c}) 00:30:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x8000, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000280)={0x20, @time={r2, r3+30000000}, 0x71, {0x1, 0x101}, 0x100, 0x1, 0x7}) syz_emit_ethernet(0x4e, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c20000008100310086dd60d8652b00140000fe8000000000000000000d00000000aafe8000000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="500000a20d0d1e8f"], 0x0) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000100)) ioctl$KDENABIO(r1, 0x4b36) 00:30:14 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0xff93}], 0x1, 0x0) close(r0) 00:30:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f4800000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1812.550428] BTRFS error (device loop2): superblock checksum mismatch [ 1812.565174] BTRFS error (device loop2): open_ctree failed 00:30:14 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed008e000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f4c00000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:14 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b5d}) 00:30:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000080)=0xe8) ioctl$SIOCAX25DELUID(r1, 0x89e2, &(0x7f00000000c0)={0x3, @bcast, r2}) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:30:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x1fe, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x36) bind$ax25(r1, &(0x7f0000000240)={{0x3, @default, 0x3}, [@default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @bcast]}, 0x48) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000040)='./bus\x00', 0x0, 0x8}, 0x10) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000080)=0x4) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) write$P9_RLOCK(r1, &(0x7f00000000c0)={0x8}, 0x8) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x3f00, 0x8080fffffffe) open_by_handle_at(r2, &(0x7f0000000300)={0x92, 0x3, "d1b486b9916c91a5abe48bf60e4d44df29dc25e4ac1b61afba8c01041295b4616bda9e1ee79b40ca6369c99ea6974b5f0777af16d1dfdb624677e179618e465e88a337c287bfe1824642f3e79f86d1045c2f065583745f38eacaaa82d970809d92d5019d0cdf02f30e675faf999041e18c0ba68a4ef9e11b74f8266378bde17d5e050c811a331988c1c0"}, 0x8000) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) accept4$llc(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x800) 00:30:14 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b5e}) 00:30:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x2fc0, 0x400) syz_execute_func(&(0x7f0000000140)="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") r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20080, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000280)) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1813.074626] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1813.098350] BTRFS error (device loop2): superblock checksum mismatch [ 1813.130727] BTRFS error (device loop2): open_ctree failed [ 1813.269067] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f6000000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:14 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b5f}) 00:30:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x3, &(0x7f0000000000)="01000000000000009bd070") syz_execute_func(&(0x7f0000000140)="44d9ee4a2ae92c86b64c0f05be03100020c4a37bf0c52541e2e941d82a4a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f450f2f02c421dd589fc4e10bf8c426f2f045f6196462bfffffffff0252262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53af6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f8a6465b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f38346800c4e3295e4c3dc8a3c4c1045ccc7d7526802d08000000fa0f5fd25cc401f82b90b6d50000f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") syz_emit_ethernet(0xfffffffffffffdd9, &(0x7f0000000040)={@local, @link_local, [{[], {0x8100, 0x2, 0x3, 0x2}}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:30:14 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xfff, 0x2) getsockname$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000340), &(0x7f0000000380)=0x40) 00:30:14 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed018e000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:15 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b60}) [ 1813.547338] nla_parse: 7 callbacks suppressed [ 1813.547347] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f6800000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:15 executing program 5: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed008e000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) [ 1813.722616] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1813.735244] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1813.753190] BTRFS error (device loop2): superblock checksum mismatch 00:30:15 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b61}) [ 1813.794822] BTRFS error (device loop2): open_ctree failed 00:30:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f6c00000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1813.963257] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1813.989390] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 1814.002770] BTRFS error (device loop5): superblock checksum mismatch 00:30:15 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b62}) [ 1814.011064] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1814.065297] BTRFS error (device loop5): open_ctree failed 00:30:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:15 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed018f000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f7400000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/netstat\x00') accept4$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000340)=0x1c, 0x80800) syz_emit_ethernet(0x74, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140000fe8000000000000000000d00000000aafe8000000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="9078ebff"], 0x0) 00:30:15 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b63}) 00:30:15 executing program 5: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed008e000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) [ 1814.406685] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f7a00000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:15 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b64}) [ 1814.548802] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1814.620645] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:17487635432702809553 old:/dev/loop5 new:/dev/loop2 00:30:16 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b65}) 00:30:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001ff000000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1814.697553] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 1814.723484] BTRFS error (device loop5): superblock checksum mismatch 00:30:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000280)="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") pause() syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) r1 = msgget$private(0x0, 0x402) msgctl$IPC_RMID(r1, 0x0) [ 1814.751659] BTRFS error (device loop5): open_ctree failed [ 1814.769193] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:16 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b66}) [ 1814.837435] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:16 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed02a8000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:16 executing program 5: 00:30:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0003000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:16 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b67}) 00:30:16 executing program 5: syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TCGETS2(r1, 0x802c542a, 0x0) [ 1815.281943] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:16 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b68}) 00:30:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0005000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000000)=0x100000001, 0x4) getsockopt$inet6_tcp_buf(r0, 0x6, 0x2f, &(0x7f0000000100)=""/60, &(0x7f0000000140)=0x3c) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000000c0)={0x477, 0x7, 0x1, 0x2, 0x1000}) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x1e}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) [ 1815.483318] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1815.500457] BTRFS error (device loop2): superblock checksum mismatch [ 1815.509624] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1815.539558] BTRFS error (device loop2): open_ctree failed 00:30:17 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed03a8000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) [ 1815.651423] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:30:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x74, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140000fe8000000000000000000d00000000aafe8000000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="500000009078000016d55134904240ea07a2088d34beb0065b732909475ae3d8f2190921ceeffa83603eec472d6b602ad2d1ce4e3f42228a2084a1c800dfcc97ef95056f5859c3401344a9b9c7fb8981bdbd60c04739c8f04a17117b7484ef4ac1be345293c8a9b54f8b17a0176ae1a808a1c4c96078d092c93223b0a4fbffffffe4c3dacb13dd1ea3f9b4729b0b18e167ad5e38bc314d5bf72dd7a3137b214f6356bece93e61aed74e6e7932aef7032a66cbf"], 0x0) 00:30:17 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b69}) [ 1815.856594] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1815.886326] BTRFS error (device loop2): superblock checksum mismatch [ 1815.914449] BTRFS error (device loop2): open_ctree failed [ 1816.017004] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1816.088029] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1816.120198] BTRFS error (device loop2): superblock checksum mismatch 00:30:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0006000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:17 executing program 5: r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x8c\x00'/15, 0x4) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000380)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0, r0}, 0x68) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000080)={0x2b, @rand_addr=0x8, 0x4e23, 0x3, 'rr\x00', 0x28, 0x5, 0x1f}, 0x2c) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000140)={0x401, 0x7, 0x8, {r2, r3+30000000}, 0x8, 0x3ff}) 00:30:17 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b6a}) [ 1816.141471] BTRFS error (device loop2): open_ctree failed 00:30:17 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2000, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0xd2}, 0x3f00) r2 = socket$kcm(0x2b, 0x1, 0x0) futimesat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)={{0x0, 0x7530}, {0x77359400}}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 00:30:17 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed03ac000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) [ 1816.219223] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:17 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b6b}) 00:30:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0007000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:17 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b6c}) [ 1816.447925] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f000a000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1816.565178] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1816.590569] BTRFS error (device loop2): superblock checksum mismatch [ 1816.622164] BTRFS error (device loop2): open_ctree failed [ 1816.713696] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4) r1 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x0, 0x2) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/hash_stats\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000002c0)='./file0\x00', r2, &(0x7f0000000340)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000140)="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") r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f00000000c0)={0x20, 0x8, 0x200000000, 0x9, 0xd9c}) socket$rds(0x15, 0x5, 0x0) syz_emit_ethernet(0x396, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d86500000000000d00000000aafe8000000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) 00:30:18 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b6d}) 00:30:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0e0a000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:18 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed02ae000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:18 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b6e}) 00:30:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x505100) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'yam0\x00', 0x2}) 00:30:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f000c000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:18 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b6f}) [ 1817.224560] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1817.239317] BTRFS error (device loop2): superblock checksum mismatch [ 1817.258110] BTRFS error (device loop2): open_ctree failed [ 1817.398652] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f000e000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:18 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b70}) 00:30:18 executing program 5: ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = accept4(0xffffffffffffff9c, &(0x7f00000001c0)=@sco, &(0x7f0000000240)=0x35, 0x80000) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000280), &(0x7f00000002c0)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x100) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f00000000c0)=0x3ff) clone(0x2902001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)={0x0, 0x6}) ptrace(0x10, r2) socket$inet_udplite(0x2, 0x2, 0x88) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) ptrace$pokeuser(0x6, r2, 0x0, 0xfffffffffffffffe) 00:30:19 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x81}}}, &(0x7f0000000080)=0x84) ioctl$SIOCRSGL2CALL(r0, 0x89e5, &(0x7f0000000100)) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)=ANY=[@ANYRES32=r1, @ANYBLOB="dc000000a0b60a6fe229dc80727fddb17081adbf615332e35c5528cf1612c7abcbdddf4ac435a0fb828821f118d2093af6c4daf1f6f1ff48d72145aefbfe986b746faa58394e2b696619a799cd8377cba84c6d9f3ff76ed5591365ba422eb8774a05663bb894d8ea02315e222f1dca604c6861bd05381ceffa3d2517e69a2f45495677cd732ca71ffeb058bbbc6b73cffe0ce03cab81b15f8fae725651ed487acfa9785688e0cb8d962404335f82a313b33947d36b792581b638ca8b60bfb2187fd42c16128146ec40540efda472a3e201a104e6bcf163ebce53ca2b2c"], &(0x7f00000000c0)=0xe4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") connect$bt_rfcomm(r0, &(0x7f0000000440)={0x1f, {0x8001, 0xdf1, 0x7fff, 0x80000000, 0x4, 0x7f}, 0x97a}, 0xa) 00:30:19 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed03b4000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:19 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b71}) 00:30:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0a0e000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:19 executing program 5: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_buf(r0, 0x0, 0x0, &(0x7f0000000200)=""/153, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000080)={0x1, [0x0]}) ioctl$VIDIOC_G_PRIORITY(0xffffffffffffffff, 0x80045643, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000040), 0x4) socket$inet6_udp(0xa, 0x2, 0x0) unshare(0x40000000) 00:30:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/54, 0x36) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x14006, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000300)={0x8, 0x5}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000340)={0x3cf, 0x3}) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) syz_emit_ethernet(0x74, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d86500000000000d00000000aafe80000000000000000000080000000000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) [ 1818.079858] IPVS: ftp: loaded support on port[0] = 21 00:30:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f000f000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0011000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1818.385567] IPVS: ftp: loaded support on port[0] = 21 00:30:19 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b72}) 00:30:19 executing program 5: clone(0x4103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) mlockall(0x0) tkill(r0, 0x1d) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1, 0x400000) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000040)={0x4, 0x0, [{0xd269, 0x4, 0x0, 0x0, @sint={0x3f, 0x9}}, {0x200000000, 0x3, 0x0, 0x0, @adapter={0x2, 0xffffffffffffffff, 0x7, 0xffff, 0xfffffffffffffffa}}, {0x7, 0x7, 0x0, 0x0, @msi={0x5, 0x20, 0x10000}}, {0x8, 0x2, 0x0, 0x0, @sint={0x7, 0xd0}}]}) ptrace$cont(0x4202, r0, 0x0, 0xa05000) [ 1818.459768] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1818.522483] BTRFS error (device loop2): superblock checksum mismatch 00:30:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0012000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1818.566043] BTRFS error (device loop2): open_ctree failed 00:30:20 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b73}) [ 1818.686015] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1818.693692] nla_parse: 9 callbacks suppressed [ 1818.693701] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1818.856483] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1818.875494] BTRFS error (device loop2): superblock checksum mismatch 00:30:20 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed01bc000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0018000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:20 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b74}) 00:30:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") [ 1818.923024] BTRFS error (device loop2): open_ctree failed [ 1818.979325] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:20 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b75}) 00:30:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0ac9db0000123d318bd070") syz_execute_func(&(0x7f0000000c80)="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") syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:30:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f001a000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1819.158886] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:20 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b76}) 00:30:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f001f000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1819.232327] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1819.243294] BTRFS error (device loop2): superblock checksum mismatch [ 1819.289771] BTRFS error (device loop2): open_ctree failed [ 1819.349118] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:20 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x200000, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1, 0x100) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1b0, r2, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x38, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'erspan0\x00'}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8000}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA={0x78, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x6c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_MEDIA={0x80, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ca}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7e}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x600000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8}]}]}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x4000}, 0x80) tkill(r0, 0x23) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) ioctl$IMCTRLREQ(r3, 0x80044945, &(0x7f0000000080)={0x4003, 0x1d8c, 0x401, 0x6}) ptrace$cont(0x1f, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 00:30:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x52, &(0x7f0000000280)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @link_local, [{[{0x9100, 0x1ff, 0x6}], {0x8100, 0x6, 0xa0, 0x1}}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:30:20 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b77}) [ 1819.418758] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:21 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed02bc000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0020000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:21 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b78}) [ 1819.611822] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0028000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:21 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b79}) [ 1819.862170] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1819.881096] BTRFS error (device loop2): superblock checksum mismatch [ 1819.908722] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1819.929866] BTRFS error (device loop2): open_ctree failed 00:30:21 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b7a}) 00:30:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f5d35000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1820.041272] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1820.129065] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1820.144030] BTRFS error (device loop2): unsupported checksum algorithm 22813 00:30:21 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b7b}) [ 1820.188349] BTRFS error (device loop2): superblock checksum mismatch [ 1820.244113] BTRFS error (device loop2): open_ctree failed 00:30:24 executing program 5: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed02bc000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:24 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed03be000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f003f000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:24 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b7c}) 00:30:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x74, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140000fe8000000000000000000d00000000aafe8000000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="ed3236ac77849d14"], 0x0) 00:30:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") [ 1822.633948] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:24 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b7d}) 00:30:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x7fffffff, 0x389281) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x42080) ioctl(r0, 0x1000008912, &(0x7f0000000280)="0ac51f123c123d319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0xbf, &(0x7f0000000040)={@remote, @dev={[], 0x10}, [], {@mpls_uc={0x8847, {[{0xff, 0x20, 0x0, 0xffffffffffffff4a}, {0x4d4, 0x8, 0x893f, 0x14}, {0x8, 0xffff, 0x1, 0xfffffffffffffffa}, {0x6, 0x6, 0x4, 0xf2}, {0x9, 0x3, 0x80000001, 0x8}, {0x0, 0xfffffffffffffffb, 0xffffffff, 0x8cd}, {0x7f, 0x7f, 0x7}], @ipv6={0x4, 0x6, "0bfa80", 0x6d, 0x1d, 0x2, @loopback, @mcast2, {[@hopopts={0x3b, 0x0, [], [@enc_lim={0x4, 0x1, 0x7fffffff}]}, @routing={0x0, 0x2, 0x3, 0xff, 0x0, [@mcast2]}], @udp={0x4e24, 0x4e24, 0x45, 0x0, [@guehdr={0x2, 0x7fff, 0x7ff, 0x81, 0x0, [0x80]}], "26358743d88c7fe414b335ff33979493413485e23c9b65d885dedca50e13a7b3f2cfebd929212d01fc956efbc9e48dad3995d16b9f"}}}}}}}, 0x0) 00:30:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0040000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:24 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000140)="480000001400190009004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x48}], 0x1) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0xfffffffffffffffe) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{}, {0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f00000001c0)={r2, &(0x7f0000000100)=""/2}) [ 1822.860470] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1822.895338] BTRFS error (device loop2): superblock checksum mismatch 00:30:24 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b7e}) [ 1822.909088] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1822.936496] BTRFS error (device loop2): open_ctree failed 00:30:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0048000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:24 executing program 5: r0 = socket(0x0, 0x802, 0x0) write(r0, &(0x7f0000000280)="240000001a0099f0003be90000ed190e020808160000000031ba0080080001007f196be0", 0x24) [ 1823.083469] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1823.087872] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:24 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed01c0000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:24 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b7f}) 00:30:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f004c000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffad}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffff26}, 0x48) r2 = syz_open_dev$audion(&(0x7f00000006c0)='/dev/audio#\x00', 0x6, 0x18b100) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000700)={0x0, 0x25, 0x4, 0x6, 0x4, 0x3f, 0x6, 0x6, {0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x9, 0x401, 0x6, 0x9, 0x1000}}, &(0x7f00000007c0)=0xb0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000800)={r3, 0x100000000, 0x9b, 0x3, 0x0, 0x80000001}, &(0x7f0000000840)=0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r1, 0x50}, 0x10) 00:30:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="656425a74a2ae92ca842980f05bf0f000fffc4a37bf0c50241e2e9b5c422ebaabb3c00ba00000fc7a4ea70db003f00000f383a9e020000002e420ff841169a8f698099005ba265aa104b26660f38091e2fdee5bebec421045f46eec421dd584243c4e10bf8d426d8f045f6196cef620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2ab440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53ffd2c4c40f9f3c6436b2aa42664d0f31c46500000ff7d29978c104c441c05983f9070bb3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") 00:30:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f6558000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1823.492403] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1823.530289] BTRFS error (device loop2): superblock checksum mismatch [ 1823.573432] BTRFS error (device loop2): open_ctree failed [ 1823.689705] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:25 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b80}) 00:30:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f355d000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:25 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x0) write$P9_RATTACH(r0, &(0x7f00000000c0)={0x14, 0x69, 0x2, {0x1, 0x2, 0x6}}, 0x14) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x4000400000000002, 0x1) sendmsg$nfc_llcp(r1, &(0x7f00000015c0)={&(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "2eacd145f60af70973e718b765077a567f221e8ffc8bacda80e54878c4b0c12b79c6e9af9ec6828d7436435a156dce7866c9d1b1481f18b34b0dc5660dce9f"}, 0x60, 0x0}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x3, {0x1, 0x0, "619de7aea19076053fa90c1427e23129bce634c525653e2c9f13fe63e5e436e41c45ed249a59dd5b275356094b16329ee12351e477a1bcc56b4d25b5e13a7ecc33c4c2afa957dae8f8c12f8127559845ff5da7dae1ebe659b68b43288e1d1ef351479ce23bb7d778f9867a0d6d293e26e85515e21c537b462731a3328b17f43e3e8f22dcf9b8a24a90a4e1d3b53a62dec9d173a1e546ebca8d522c01611f426e4f99cea85e48556c0c36fee844f0733d74ccd1ab7c94657c92caf3619b4e7480e57c2fa3e4d3cb3c7c599446f01a5897de0511b6e8d3899186ad00fd83898d765ec46dfe6c89dd98fa1d79354ba53128b32716fa8554a96cb7ce839202615312", 0xe8, 0x5, 0x1, 0x7, 0xffff, 0x1000, 0xe6, 0x1}, r2}}, 0x128) 00:30:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000080)=""/20) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') accept$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'erspan0\x00', 0x0}) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000400)={@dev, @broadcast, 0x0}, &(0x7f0000000440)=0xc) getpeername$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0}, &(0x7f00000004c0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000500)={0x0, @dev, @broadcast}, &(0x7f0000000540)=0xc) getsockname$packet(r1, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000005c0)=0x14) getsockname$packet(r1, &(0x7f0000000600)={0x11, 0x0, 0x0}, &(0x7f0000000640)=0x14) getsockname$packet(r1, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000006c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@empty}}, &(0x7f0000000a40)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000a80)={@empty, @multicast1, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000bc0)={@initdev, 0x0}, &(0x7f0000000c00)=0x14) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000c40)={@mcast2, 0x0}, &(0x7f0000000c80)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000cc0)={'bpq0\x00', 0x0}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000d00)={0x0, @loopback, @multicast1}, &(0x7f0000000d40)=0xc) accept4$packet(r1, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000dc0)=0x14, 0x800) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001540)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@empty}}, &(0x7f0000001640)=0xe8) recvmsg$kcm(r1, &(0x7f0000001840)={&(0x7f0000001680)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/111, 0x6f}, {&(0x7f0000001780)=""/15, 0xf}], 0x2, &(0x7f0000001800)}, 0x2) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001c00)={@loopback, @empty, 0x0}, &(0x7f0000001c40)=0xc) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000001c80)={@remote, 0x0}, &(0x7f0000001cc0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001dc0)={0x0, @rand_addr, @loopback}, &(0x7f0000001e00)=0xc) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000001f00)={@ipv4={[], [], @loopback}, 0x0}, &(0x7f0000001f40)=0x14) getpeername$packet(r1, &(0x7f0000002140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002180)=0x14) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000021c0)={@rand_addr, 0x0}, &(0x7f0000002200)=0x14) recvmmsg(r1, &(0x7f0000003f40)=[{{&(0x7f0000002240)=@isdn, 0x80, &(0x7f0000002540)=[{&(0x7f00000022c0)=""/117, 0x75}, {&(0x7f0000002340)=""/229, 0xe5}, {&(0x7f0000002440)=""/18, 0x12}, {&(0x7f0000002480)=""/10, 0xa}, {&(0x7f00000024c0)=""/77, 0x4d}], 0x5, &(0x7f00000025c0)=""/158, 0x9e}}, {{&(0x7f0000002680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000002a40)=[{&(0x7f0000002700)=""/200, 0xc8}, {&(0x7f0000002800)=""/129, 0x81}, {&(0x7f00000028c0)=""/227, 0xe3}, {&(0x7f00000029c0)=""/113, 0x71}], 0x4, &(0x7f0000002a80)=""/179, 0xb3}, 0x4}, {{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000002b40)}], 0x1, &(0x7f0000002bc0)=""/4096, 0x1000}, 0x80}, {{&(0x7f0000003bc0)=@generic, 0x80, &(0x7f0000003e80)=[{&(0x7f0000003c40)=""/95, 0x5f}, {&(0x7f0000003cc0)=""/154, 0x9a}, {&(0x7f0000003d80)=""/67, 0x43}, {&(0x7f0000003e00)=""/65, 0x41}], 0x4, &(0x7f0000003ec0)=""/75, 0x4b}, 0x1}], 0x4, 0x10000, &(0x7f0000004040)={0x77359400}) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000004240)={@local, @empty, 0x0}, &(0x7f0000004280)=0xc) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000004a40)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x81800000}, 0xc, &(0x7f0000004a00)={&(0x7f0000004a80)=ANY=[@ANYBLOB='(\a\x00\x00', @ANYRES16=r2, @ANYBLOB="08002dbd7000fddbdf250000000008000100", @ANYRES32=r3, @ANYBLOB="cc00020040828c34ea3d54d2a449a89f39d68d6e0001002400010071756575655f6964000000000000000000000000000000000000000000000000080003000300000008000400c1ffffff0800060077f65938546dc91ef1e6a2e5e4860796ca66c872f1e06fc520eed2dfeeed5540425245ee0ae3808ce5363961e8039ace9a6f5ac5b0c1eaaa91a0b3dc26457743e000df5e1513087b258e72010d7c55a065476d6e6f76cb5e6b6229e97b091ea1dd64ad17b6b3965c8fd434bc61ac91f3f1fae5ee62ad2bf180b2", @ANYRES32=r4, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000008000100", @ANYRES32=r6, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004009304000008000600", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3001020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040008000000080007000000000038000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000008000300030000000800040001000100400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000200000008000600", @ANYRES32=r9, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r10, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000200000008000100", @ANYRES32=r11, @ANYBLOB="f000020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004000500000008000700000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r12, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000100010038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004004200000008000100", @ANYRES32=r13, @ANYBLOB="f400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000700000008000600", @ANYRES32=r14, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000000000008000600", @ANYRES32=r15, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r16, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r17, @ANYBLOB="08000100", @ANYRES32=r18, @ANYBLOB="7c0002003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r19, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r20, @ANYBLOB="08000100", @ANYRES32=r21, @ANYBLOB="3002020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000200000008000600", @ANYRES32=r22, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000200000008000600", @ANYRES32=r23, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000200000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000600000008000600", @ANYRES32=r24, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000900000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000400000008000600", @ANYRES32=r25, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e63650040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004000300000008000700000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r26, @ANYBLOB="08000100", @ANYRES32=r27, @ANYBLOB="04000200"], 0x728}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) 00:30:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x18, r2, 0x5, 0x0, 0x0, {0x5}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) r3 = socket(0x1, 0x2, 0x0) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f00000000c0)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r3, &(0x7f0000000100)="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", 0x1000, 0x0, 0x0, 0x0) ioctl(r5, 0x7fff, &(0x7f0000000080)="0adc1f123c123f319bd070") ppoll(&(0x7f0000000000)=[{r4, 0x1}], 0x1, 0x0, 0x0, 0x0) shutdown(r3, 0x0) [ 1823.813607] nla_parse: 2 callbacks suppressed [ 1823.813616] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1823.831795] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1823.852706] BTRFS error (device loop2): superblock checksum mismatch 00:30:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0060000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1823.933270] BTRFS error (device loop2): open_ctree failed 00:30:25 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed03c0000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x101000, 0x0) accept4$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000180)=0x1c, 0x80800) syz_execute_func(&(0x7f0000000b40)="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") syz_emit_ethernet(0x74, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaafe2521a0113491d286dd60d8652b00140000fe8000000000000000000d00000000aafe8000000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) shutdown(r0, 0x0) 00:30:25 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b81}) [ 1823.990352] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f5865000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1824.155481] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1824.229019] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1824.271486] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1824.302595] BTRFS error (device loop2): superblock checksum mismatch [ 1824.336755] BTRFS error (device loop2): open_ctree failed 00:30:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:25 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b82}) 00:30:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0068000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1824.417925] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1824.489104] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1824.510352] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1824.530109] BTRFS error (device loop2): superblock checksum mismatch 00:30:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f006c000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:26 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b83}) [ 1824.573903] BTRFS error (device loop2): open_ctree failed 00:30:26 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed03c2000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) [ 1824.646918] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:26 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x400000, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'vlan0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="420000008000f7a681c630e014fef0d2826f9b1127951e1037764c043b9b7a7125dbbe4c76662b81de304f42ec5378ac0bfe7510e89f4f463ce3d363602471507281ad91e53c671b2233cea7ded49add6c56b49af196fcaa2ec3000000000000"]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0a0000000000000000ef6a") ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f00000000c0)={{0x56e, 0x2, 0x9, 0x2, 0x57dd, 0x5}, 0x80000001}) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) set_mempolicy(0x4003, &(0x7f0000000040)=0x10003, 0x101) mbind(&(0x7f000000b000/0x3000)=nil, 0x3000, 0x4, 0x0, 0x0, 0x2) 00:30:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0074000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:26 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b84}) [ 1824.864634] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:26 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000240)={0x0, 0x1}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180)={r1, 0x8}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000400)={r2, 0x2}, 0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000380)={'ip6gretap0\x00', &(0x7f00000002c0)=@ethtool_rx_ntuple={0x35, {0x7, @hdata="46ac6dc7e7e00a589e507debf470df1e825144c6644e120f985568e0fcedcfb98d34ece4299422367e33b660b1b99eeeeab5cc26b183a130ea4aa93ee2be6555e80af56ca277aecd", @tcp_ip4_spec={@broadcast, @remote, 0x4e20, 0x4e24, 0x5}, 0x4, 0x10000, 0xffff, 0x5, 0xfffffffffffffffe}}}) fcntl$setstatus(r0, 0x4, 0x2000) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") fcntl$setstatus(r3, 0x4, 0x2000) syz_execute_func(&(0x7f0000001080)="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") syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) sendfile(r3, r0, &(0x7f00000003c0), 0x3) r4 = open(&(0x7f0000000000)='./file0\x00', 0x10000, 0x4) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000080)={0x1, 0x0, [0x0]}) [ 1824.943782] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1824.980811] BTRFS error (device loop2): superblock checksum mismatch 00:30:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f007a000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1825.006485] BTRFS error (device loop2): open_ctree failed 00:30:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3380b070") r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000200)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"/405], 0x190) setsockopt$inet6_group_source_req(r1, 0x29, 0x2c, &(0x7f0000a83000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x2, @loopback}}}, 0x108) r2 = socket(0xa, 0x800, 0x2) setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000000)=0x6, 0x2) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000040)=0x10, &(0x7f00000000c0)=0x4) [ 1825.122651] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1825.136588] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="3c123f319bd07000000004") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f00000000c0)=&(0x7f0000000040)) syz_execute_func(&(0x7f0000000140)="44d9ee4a2ae92c86b64c0f05be03100020c4a37bf0c52541e2e941d82a4a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f450f2f02c421dd589fc4e10bf8c426f2f045f6196462bfffffffff0252262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53af6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f8a6465b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f38346800c4e3295e4c3dc8a3c4c1045ccc7d7526802d08000000fa0f5fd25cc401f82b90b6d50000f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:30:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:26 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed03c6000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:26 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b85}) 00:30:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0081000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:26 executing program 5: syz_emit_ethernet(0x36, &(0x7f00000002c0)={@local, @dev={[], 0x10}, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@lsrr={0x83, 0x7, 0x4, [@multicast1]}, @rr={0x7, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @local}}}}}, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) r1 = getegid() ioctl$TUNSETGROUP(r0, 0x400454ce, r1) [ 1825.392056] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:26 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x101000) setsockopt$inet_int(r1, 0x0, 0x13, &(0x7f0000000340)=0x400, 0x4) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x168}, 0x1, 0x0, 0x0, 0x20048890}, 0x40081) ioctl$VHOST_RESET_OWNER(r0, 0x8008af26, 0x70c000) 00:30:26 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b86}) 00:30:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f00f0000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:27 executing program 4: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000005c0)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x7f, 0x400000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000580)={r2, 0x1}) syz_execute_func(&(0x7f0000000440)="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") getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000080)={'broute\x00', 0x0, 0x3, 0xfd, [], 0xa, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000340)=""/253}, &(0x7f0000000600)=0x78) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x3, 0x2) ioctl$KDSETMODE(r3, 0x4b3a, 0x3) [ 1825.590716] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1825.615370] BTRFS error (device loop2): superblock checksum mismatch 00:30:27 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b87}) [ 1825.648963] BTRFS error (device loop2): open_ctree failed 00:30:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) r1 = dup2(r0, r0) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000300)={0x8, 0xe7}) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x8f0b) futex(&(0x7f0000000080)=0x1, 0x8b, 0x0, &(0x7f0000000280)={r2, r3+30000000}, &(0x7f00000002c0)=0x1, 0x1) fcntl$setstatus(r0, 0x4, 0x800) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) 00:30:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x20011, r3, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000100)={0x545c67631ca05564, 0x0, @pic={0xcca, 0x7, 0x9, 0xfffffffffffffffd, 0x5, 0x4, 0x1, 0x74, 0x4, 0x80000000, 0x0, 0x3, 0x9, 0x0, 0xd5, 0x6}}) ioctl$VIDIOC_G_DV_TIMINGS(r3, 0xc0845658, &(0x7f0000000200)={0x0, @reserved}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000003000/0x1000)=nil}) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 1825.709729] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1825.799275] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:27 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b88}) 00:30:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0040030000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:27 executing program 4: syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000080)='./file0\x00', 0x800, 0x4, &(0x7f0000000600)=[{&(0x7f00000000c0)="50c3db20314e9cfa623cd0a1dbebc0e484c3c92a2dc5b364f928e06717952587f3ee0e2777eb42bb76211f8f2f05237b97283c989260c46d3c52976287643e9eb099f8d4d3e6026cb7fbceee58dfe274f78bc7a04ca20018566730236d7a33f5eae470526be5546c579d69bebb9e599b89de7408470d50", 0x77, 0xfffffffffffffffc}, {&(0x7f00000003c0)="5ac37c40f2b8474be9055dd480da98e294f600e1a01dd3678eeaa5d6e69721e9ed8f40f90b83cb0e17a97a8e6f2c8af093bb42bc9ffa967246064c624f49b21f5bededa37135ff363cf9bc1cc062178f75a693bb92ee0a4034ac08241de63c6b7f94a0dc45e8b0990a1742a1e42cfcf52320f8057af7c329545a63565bb77271d9b86b038afb40d29fa179018eef0ec5191ab40992e28fffee359fddb1decbc8b498dfaaf18ec6597de08e8da2e21dfb656a5752710d53a8a1ceff6224a63b8f6cd73d2828", 0xc5, 0x1666}, {&(0x7f00000004c0)="c3a054bde25ba69448d526b749beeb858040a2ba0680610de927cdfce6edce1cf3b82744fda869361736e47cd2e7ba24295cfdb03309106db8b108dc695c7b15a95f14d51c408bb8b79f272379a5790f11969ed9f6736e5ea6d02c93b8b3691febbd801f6ebba9e612dea485b8079ef46529", 0x72, 0x1}, {&(0x7f0000000540)="cf5c09d5681d57f91f428c183f53999992077ae1a3deb06081571f680f23beee956846f7d263525b9f82aad7862017b2ca73bfdfd577b65d69a4c8852d1ee97d40e7131dbd3c7576a2f64d4ebdde36f0ccd0e6c5445d0d58dda30a6efd41119288f045222bc21271ecf7f189ac80e72a5bf48ceef57262994608f7f77e1d4bf4baaaf392e357733434972061bc571f5cbf9a6b60838d6bc3867c75ef31f7a0", 0x9f, 0x8}], 0x0, &(0x7f0000000680)='#\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x74, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaad8652b00140000fe8000000000000000000d0000000aaafe80000000000080000000000000004000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="d00000009078000093a59eccaa2f3fe0156ae80e7795b6c960a2bfc23d5f8c55fd50c3c98dde6928ff86cfc174d2bf01c85f6818cc4d629729e2e4055158dc4ed3716bb521c6a4249f762f02a7d814d2508b3f4241ede2ccd1fd02d0f0de74af251b03c6fa0a2a98726a7495026c7ca10da42d8856bd7318d3a5d9c4559f74cd1e9963560dbec4e27c99d10bb08bad7d34b3ae60bc3dd3b47d16ef1fed09fb40386719bf5b7c3df04ab9674683d080b3272553ec8dafc762840305c83ee24a33e2f61e2c2f6cc4b56eff93c48856656a5e81939abba64479e447a9385f11debaf120d0dd14fd605290459ee09ea0a40d0ff7"], 0x0) syz_emit_ethernet(0x58, &(0x7f00000006c0)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [], {@llc_tr={0x11, {@snap={0xaa, 0xaa, "ce", 'Hkd', 0x22eb, "58e9a80243f870b26d167b5888ee069d5e3e25987487b40e014f0032e65f09d02ed38b5410153eb04762405761397d439dc6f64691a0772ed6215c082d771a755f35"}}}}}, 0x0) 00:30:27 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed03c8000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:27 executing program 5: r0 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000005, 0x32, 0xffffffffffffffff, 0x0) io_setup(0x7, &(0x7f00000001c0)) 00:30:27 executing program 5: r0 = socket(0x10, 0x802, 0x0) socket$inet6(0xa, 0x6, 0x5) write(r0, &(0x7f0000000000)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0400010010041100", 0x24) 00:30:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000040000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:27 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b89}) [ 1826.458560] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1826.486239] BTRFS error (device loop2): superblock checksum mismatch [ 1826.516605] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 1826.529856] BTRFS error (device loop2): open_ctree failed [ 1826.579006] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 00:30:28 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b8a}) [ 1826.619798] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0003400000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:28 executing program 5: mkdir(&(0x7f0000000340)='./control\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./control/file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='mode=00000000000000000100001,mode=00000000000000000200000,mode=0000000000000000000000Y,mode=00000000000000000000001,mode=00000000000000000003676,pcr=00000000000000000035,permit_directio,context=system_u,subj_user=vmnet0wlan0cpusetem0,context=s']) [ 1826.750923] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1826.792139] BTRFS error (device loop2): superblock checksum mismatch [ 1826.834623] BTRFS error (device loop2): open_ctree failed 00:30:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:28 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b8b}) 00:30:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001ffffff00000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x2080, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000080)) 00:30:28 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b8c}) 00:30:28 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f00000001c0)={0x10, 0x0, {0x0, 0x0, 0x0, {}, {}, @ramp}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x0) 00:30:28 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed03d2000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000100080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:28 executing program 5: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x35, 0x0, &(0x7f0000000200)) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:devicekit_power_exec_t:s0\x00', 0x2c, 0x2) 00:30:28 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b8d}) 00:30:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000200080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x109002, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000180)={0x9, 0x8}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="300000000aa7f12dbfe10fdec2b35a9e52cd3ef9e52b7d7317b72014728cdd36b12b58561e4d2557b65e122614fd53421baecf786a2cb86357bdd31e567e8ad886bbe5d77f5c69e09014cec8c27ec7ab890a29d8dd95549a0171911b6ea5319a29e6c839930094", @ANYRES16=0x0, @ANYBLOB="010000000000fddbdf25010000000000000008410000001400187fffffff6574683a6970646470300000"], 0x30}}, 0x4000000) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) r4 = add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f00000002c0)="dbcb86d9155623c3719315dde210f31c1582b3a0a3c50a477c7dc6f1c01e4ea6d70f2f1b0484074eb53529a2dbb187395e458f33b4b914e8a374dfec2cd8f14bc8a0e28cd710fe74c24c496a318bceed4cb20aba82179f93ec57809abb173cd14fe810cb0c6f2d4b7f86fdcf79fe5ccba0219cb9b055ac8f1c0f413eafa8ce811195f95f2d763b09813c13227db188794d5e5b7bb5dba76ef7fd83df924890b243a396b06e", 0xa5, 0xfffffffffffffffc) keyctl$describe(0x6, r4, &(0x7f0000000380)=""/144, 0x90) connect$tipc(r2, &(0x7f0000000200)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x4}}, 0x10) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f00000000c0)={0x77, 0x0, [0x4b564d02, 0x3]}) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40400, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, 0x0) [ 1827.385422] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1827.417902] BTRFS error (device loop2): superblock checksum mismatch [ 1827.526891] BTRFS error (device loop2): open_ctree failed [ 1827.621145] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1827.720644] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1827.777594] BTRFS error (device loop2): superblock checksum mismatch [ 1827.853934] BTRFS error (device loop2): open_ctree failed 00:30:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1acc, 0x200) setsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f00000000c0), 0x4) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:30:29 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b8e}) 00:30:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000300080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x40, 0x20180) connect$tipc(r1, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x2, 0x1}, 0x3}}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc2b123c123f319bd070") clock_gettime(0x7, &(0x7f0000000240)) 00:30:29 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed00d6000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000400080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:29 executing program 5: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mlock2(&(0x7f0000ff2000/0xe000)=nil, 0xe000, 0x1) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0xfffffffffffffffb) 00:30:29 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b8f}) 00:30:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="44d9ee4a2ae92c86b64c0f05be03100020c4a37bf0c52541e2e941d82a4a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f450f2f02c421dd589fc4e10bf8c426f2f045f6196462bfffffffff0252262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53af6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f8a6465b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f38346800c4e3295e4c3dc8a3c4c1045ccc7d7526802d08000000fa0f5fd25cc401f82b90b6d50000f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x800) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000080)=0xffff, 0x4) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000280)={0x82, 0x10001, 0xffffffff, {0x0, 0x1c9c380}, 0x3, 0x2}) 00:30:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000500080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1828.204967] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1828.238861] BTRFS error (device loop2): superblock checksum mismatch 00:30:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000140)) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r2 = socket$inet(0x10, 0x800000003, 0x10000000000000c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="240000000c0607021dfffd946fa2830020200a0009000600001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000000)={'ip6erspan0\x00', 0xffffffffffffff81}) [ 1828.283836] BTRFS error (device loop2): open_ctree failed [ 1828.395878] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1828.467061] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1828.476454] BTRFS error (device loop2): superblock checksum mismatch [ 1828.643101] BTRFS error (device loop2): open_ctree failed 00:30:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:30 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b90}) 00:30:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000600080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x12200, 0x80) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req={0x0, 0x9, 0x2, 0x800}, 0x10) r1 = socket$can_bcm(0x1d, 0x2, 0x2) close(r1) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) 00:30:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x4e, &(0x7f0000000280)={@empty, @link_local, [{[], {0x8100, 0x20, 0x100000001, 0x4}}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:30:30 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed00dc000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) [ 1828.973184] nla_parse: 10 callbacks suppressed [ 1828.973195] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:30 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b91}) 00:30:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000700080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:30 executing program 5: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x141046, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000040)=0x1e) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x44}}, 0x14) r3 = memfd_create(&(0x7f0000000880)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\xc6\x94\xd8\":\x16\xf5\xd4Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Z\x91\"\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16M\x00\x80\x00\x00\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00&m=E\xa2\x95\xbc\xbfI\x0fU\x7fj\xac', 0x1) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r3, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r2, 0x4c01) fallocate(r1, 0x10, 0x0, 0x5f8) connect$caif(r0, &(0x7f0000000140)=@rfm={0x25, 0x5, "0f811e5c09671e37e3bfee6eb9de8565"}, 0x18) lseek(r0, 0x0, 0x1) [ 1829.179682] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1829.188700] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1829.229326] BTRFS error (device loop2): superblock checksum mismatch 00:30:30 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b92}) [ 1829.281160] BTRFS error (device loop2): open_ctree failed 00:30:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000800080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:30 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b93}) [ 1829.419891] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1829.447527] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:31 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed02e8000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000a00080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:31 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b94}) 00:30:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:30:31 executing program 5: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed00dc000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) [ 1829.878653] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f00000e0a00080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:31 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b95}) [ 1830.057388] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:17487635432702809553 old:/dev/loop5 new:/dev/loop2 00:30:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x1f0, &(0x7f0000000280)={@local, @random="0a3f7dd71ed7", [], {@ipx={0x8137, {0xffff, 0x0, 0x9, 0x1, {@random=0x3, @random="596bab9b1d82", 0x9}, {@broadcast, @current, 0x60}, "1665b212ea8a5e2b35314e5f86cb573f354dd379a07926d6b7a5f15ea6d6e68dad3727ca34278d34540c0b01451d372b0b26e1a4e190b1f2e029bda1c3fa50f755722bdbae30a14800285ad1af0ea425b28e6b2dc3e77acbd322ee85dffad880c491bd866eb87ca1832a83ff0c9a90c36ec6dc858369706e1f60da77a8db95500d9a218da08a9412bec85e2bb77a5b86469e9f2e5d715b9caca419dc7e4c41703c90cfcec34dc3"}}}}, 0x0) 00:30:31 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b96}) [ 1830.109671] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1830.171894] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1830.188536] BTRFS error (device loop5): unsupported checksum algorithm 22813 00:30:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000c00080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1830.252324] BTRFS error (device loop5): superblock checksum mismatch 00:30:31 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b97}) [ 1830.296304] BTRFS error (device loop5): open_ctree failed [ 1830.351680] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:32 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed03e8000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:32 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b98}) 00:30:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000e00080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:32 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000540)='./file0\x00', 0x800) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xd8c, 0x8080) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = fanotify_init(0x44, 0x0) fanotify_mark(r2, 0x11, 0x800001f, r1, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:30:32 executing program 5: mkdir(&(0x7f0000000680)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={0x0, r0, 0xa, 0x3}, 0x14) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x1, 0x2) write$P9_RREADDIR(r1, &(0x7f0000000140)={0x2a, 0x29, 0x2, {0x9, [{{0x40, 0x3}, 0x1, 0x68f1, 0x7, './file0'}]}}, 0x2a) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r2) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') readlinkat(r2, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/5, 0xffffffffffffff2c) [ 1830.789883] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:32 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b99}) 00:30:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000f00080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1830.951320] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1830.976183] BTRFS error (device loop2): superblock checksum mismatch [ 1831.012364] BTRFS error (device loop2): open_ctree failed [ 1831.034832] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xc) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="44d9ee4a2ae92c86b64c0f05be03100020c4a37bf0c52541e2e941d82a4a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f450f2f02c421dd589fc4e10bf8c426f2f045f6196462bfffffffff0252262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53af6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f8a6465b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f38346800c4e3295e4c3dc8a3c4c1045ccc7d7526802d08000000fa0f5fd25cc401f82b90b6d50000f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:30:32 executing program 5: r0 = socket(0x10, 0x1000040000000003, 0x0) write(r0, &(0x7f00000000c0)="22000000150007068d000005004c0204020803130100000008000200410209e376ab", 0x22) flock(r0, 0x2) 00:30:32 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b9a}) 00:30:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000001000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1831.165203] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1831.192612] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1831.228139] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1831.275643] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1831.302267] BTRFS error (device loop2): superblock checksum mismatch [ 1831.344910] BTRFS error (device loop2): open_ctree failed 00:30:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000001100080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:33 executing program 5: r0 = userfaultfd(0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000000)=""/63) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f0000000040)) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) close(r0) 00:30:33 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b9b}) 00:30:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) 00:30:33 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed03ea000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000001200080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:33 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b9c}) 00:30:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:30:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r2, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x10201, 0x0, 0xfffffffffffffffe, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1831.877099] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1831.926082] BTRFS error (device loop2): superblock checksum mismatch 00:30:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000001800080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1831.976806] BTRFS error (device loop2): open_ctree failed 00:30:33 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b9d}) [ 1832.104143] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="656425a74a2ae92ca842980f05bf0f000000c4a37bf0c50241e2e9b5c422ebaabb3c0fba00000fc7a4ea70db003f00000f383a9e020000002e420ff841169a8f698099005ba265aa104b26660f38091e2fdee5bebec421045f46eec421dd584243c4e10bf8d426d8f045f6196cef620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2ab440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53ffd2c4c40f9f3c6436b2aa42664d0f31c46500000ff7d29978c104c441c05983f9070bb3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") 00:30:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='_trie\x00\x00\x00\x00\x00\x00\x00\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000040)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000080)=0x15, 0x4) ioctl(r0, 0x800001000008912, &(0x7f00000002c0)="0a9c1f133c123f319bd070") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$FUSE_WRITE(r2, &(0x7f00000000c0)={0x18, 0x0, 0x3}, 0x18) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r2, 0x0) ioctl$FS_IOC_GETFLAGS(r2, 0xc020660b, &(0x7f0000000000)) 00:30:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000001a00080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319b0200") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x4e, &(0x7f0000000080)={@random="3c36465b59ed", @link_local, [{[], {0x8100, 0x3, 0xddd8, 0x2}}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:30:33 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b9e}) 00:30:33 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edc0ed000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000001f00080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0xfffe0000) setsockopt$inet_int(r1, 0x0, 0x10, &(0x7f0000000100)=0xfffffffffffffff9, 0x4) sendto$inet(r0, &(0x7f0000000140)="821f068b7fb4d2545ab450b4037f7b9aa9a8f227856a5f84bab96de23817deff9fdc9058389baba8e65e95487f93d261c6004f72dae986b13a9b6b3d869e34cb3ddaf3763f9f764be39aad663bfd170ce518747543658da372", 0x59, 0x800, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x0, @rand_addr=0x9}], 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240), 0x252) prctl$PR_SVE_GET_VL(0x33, 0x1183e) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d24000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}, @in={0x2, 0x0, @local}], 0x2c) 00:30:34 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43b9f}) [ 1832.791373] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1832.818086] BTRFS error (device loop2): superblock checksum mismatch 00:30:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000002000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:34 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='.\xdb8\xa4tu\xb6J_=W\xc3\xf5#\x88\xa15/hgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.bfq.weight\x00', 0x2, 0x0) r2 = accept(r0, 0x0, &(0x7f0000000000)) getsockname$tipc(r2, &(0x7f0000000100)=@id, &(0x7f0000000140)=0x10) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) [ 1832.857732] BTRFS error (device loop2): open_ctree failed 00:30:34 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43ba0}) [ 1832.995712] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000002800080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:34 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000000100)={[], 0x3, 0x7fffffff, 0x2d9, 0x0, 0x5, 0xd000, 0x100000, [], 0x2}) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x5, 0xc00) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000080)={0x10001, 0x1}) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x7, 0x4) 00:30:34 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x1, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:30:34 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed03f2000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:34 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x43ba1}) 00:30:34 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x141080, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000180)=""/162) r2 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x7b, &(0x7f0000000000), &(0x7f0000000080)=0x8) 00:30:35 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x80000}) 00:30:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000003f00080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000140)="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") getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1833.683362] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1833.728947] BTRFS error (device loop2): superblock checksum mismatch 00:30:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net\x00') r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x9, 0x8000) r2 = fcntl$getown(r1, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = fcntl$getown(r1, 0x9) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f00000032c0)=0x5, 0x8) fstat(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getgid() ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000001bc0)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001c00)={{{@in=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001d00)=0xe8) getresgid(&(0x7f0000001d40)=0x0, &(0x7f0000001d80), &(0x7f0000001dc0)) r11 = getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001e00)={{{@in6=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000001f00)=0xe8) r13 = getegid() r14 = syz_open_dev$sg(&(0x7f0000002580)='/dev/sg#\x00', 0x1c0000000000, 0x400) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000025c0)=0x0) r16 = getuid() lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000003100)=[{&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000000240)="06f220804c340426f1c5cda9be7171d699620b8c6089d5a8d7307ec7fc76fcb320bbdb6c6a0794da36bdb2234a227af3a36d0de232db4a03ae20072d4cedabdb6c71c3bb79ca3c12530a9ad1975298c6db7656f5a38eeb9bc4ec2448af8a7fd74ad47de9ab10781ba1bad532b8", 0x6d}], 0x1}, {&(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000340)="ea210d874478ebb1dc8007fecee35e027a3a42d8217e34429f60036f75baeeb3cbeea85090a18fd13fbd1ef8579569fa12b40c1ecb96c4015bfd8e9954aaff6151065adff6dec008c2e8c5335ce4dc906a34a51e85fc9db4d394e2d7a69ec46eb796b4c773885bd4d17638d80d2f6f02cb5c7cf9ae9b86c18a5ef660f49f6e6ec1", 0x81}], 0x1, &(0x7f0000000680)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r1, r0, r0, r0, r1, r0]}, @rights={0x38, 0x1, 0x1, [r1, r1, r1, r0, r0, r1, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0}, {&(0x7f0000000740)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001b40)=[{&(0x7f00000007c0)="09f5e72342a1201e09babdbdc229375ed3a313157c4ef67f25631b4be1184795e9468fc2cc7259c598b05c4f8e5dfbf8813b84ecc0c65e214c084007c79b8d032374d315f233819a2c8298972190a0f33da02ad88036d7b03bfcef247c25fff542b548c16f63620c99233e2f12ea1f44a6605608d2ee306d189332d6cabb85d91eea38ca39b7e4d9d8d007b2efb576b2943e6f09190ca05851c12eb96c1a78e7686796a5c5772f9871d40645fff056dd7cc866e572c3528e71a2e3d3647040ddcc64fbd994e4488932d5b169fd2ed95deaea052527a838c5bf7345e160f74b60f110469af54c", 0xe6}, {&(0x7f00000008c0)="fd3ad080aa66d399ba91553573d2b689d2faeff7bc4952c9cec226fc072cb40a135b8191c829fff3ec27c26e465040263707aa699d96a9228f1cde518fa10019f7fa6de3a8f4beebdeea1eae683745e9e060e6cf65a8d0766ae69464db6719f77fc1572d888bc3b68db6b812a550f30651", 0x71}, {&(0x7f0000000940)="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", 0x1000}, {&(0x7f0000001940)="924961c2b40fb6bd61e37b96c07f4b8d4f9954145a9314b5cf8dc58d3e3df49c259f468fe9c30c81042b9b4800213a4fd1f772ea7864e769ef6739f33dffd37e20e773be43c8f64bdfc00704e7dc85bcb2cbeee39fea8dd525a92bc1de8f1ec2d6ed9076faab181c37ceeff9ad56b07370029b5036e8f20c1e9b74665c9c3ec05b92b1b4da421940d93bb4de616ab4adf7be62f2e5b10aff84e8bb688f53c42f1aa3587f87dab52fe1b05e89fc525994f39759ca0e2639409043065b759f87866cb66d1a3ffae96e041351ec549dde9dc50925a61672ed0a73e4092159941f099e398a4beb3527f3", 0xe8}, {&(0x7f0000001a40)="ea10b84ebebc608aa934f74db8db4b851930ec673e097745", 0x18}, {&(0x7f0000001a80)="000dffbf901eef0b39b5852b57977aaf5383e0ad47bc6f3fabc5f4291b1f4b75dd97b3ccefcea2f3da1a3e0b94f3f1f7bbf19a550f721373bac42a5ee37c7e298740067e73f42972b01a0c1c899b66941380bcc08349ff4928e028509dceecc8d7577689227362963253707d7be71dde8056d80c5cd1f64b094489a766528b4b42ef1091992a1cbafc8c50e990ca7d606376fb2fd8eea4ae46a44a248077012c686766525351373680f8c218ce2977c1cc2a174a", 0xb4}], 0x6, &(0x7f0000001f40)=[@cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}], 0x40, 0x4040040}, {&(0x7f0000001f80)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f00000023c0)=[{&(0x7f0000002000)="9897a8cc9df4d53bf0b2929d6d369f6a7a9dc06298cc72efde3e6e04", 0x1c}, {&(0x7f0000002040)="a99208c6c9b033fee33a56e116f947d50a0297d247dade179857aeb19f222f1592a235ae3eff59955a43636edf3daa1d517463375744c94bd7777a7c64f762017da7e43c1660b0563357f3b70d64aa2a5f848273545df2319bdb3bfb91dfb673b531574984d62aef381d74c3a7d49374ab43360234bfcb296af86f380820618e028d11921432e056f857e5538ec8d490de03f907432a468141214e43d84d26a7132f36049482d24c3eda802bad5e03f4e20d4434f315fe26b1fb1c950b8b2203dceb9567043e0beafa371d73d3ca6e21df0d53c8287b497cf414876bce1f36d2846dae049fabd0f5667c36af9cc2036e9120abe894", 0xf5}, {&(0x7f0000002140)="7300fad739b4e024a9dd5ea6e1bb2deb7b8d18c9b9effd2fe88a2221b0da6981bca09ae18b4af1948ee54d1cec78c64555a1cff47e9dd72f239162c5cd2e0b934ae06fba0559edfea03222abf4c6837410cca1969cb06c3f983073d30ab9548a71726388abff5c651bfada92e568d0adf5c5391f7710083db4bbb0ca3eae48db0a4539fd5f0e68a6f46803ba4c3409f30993480c06f4e839e67916330576c913a969d4603aaca755e6b60f56d83a754fc6cac8b5966499699724c0d02eb13ccfd98fc411f62abf666bde3c1c2397c445cbfb20", 0xd3}, {&(0x7f0000002240)="b88a6b433ee9b93b758ce2bd4f", 0xd}, {&(0x7f0000002280)="8b3a4cf757cfb8f949fac89c9d9ea98326466e149bd439ae2a4fe4e075ba70786437771135607d07253f31a619a048329148d256780d5e0786496697e25a5c249f29d25228a218d3398a71", 0x4b}, {&(0x7f0000002300)="f1248ecd008c29834d5b58d7c5972452fc04bff3c8ba3a2f63c2044683fc720d283cf957783df28444c03872534f3aa55ea4a515d2a1f63d843db838c5c7537982f2d46668b2cc226cc47f6904a476d841a6259ae0e96aeeca9843a31e6db4193b092bba1b579f5afe1580e06b8410ac0369f565e0cab52d94b6cdfc6b9d20e2c5e5d606d9692a64b3cb6b102a01c65a944cd74e9aee6d45a759a175ec4e526ce5899e6ba9a1e171dceec12f", 0xac}], 0x6, 0x0, 0x0, 0x4}, {&(0x7f0000002440)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000002540)=[{&(0x7f00000024c0)="db6a3d45ff9bf9fe7b8b1b16e075ecd02b3976a51830570cfb682a640b2219736c4744bc4628767b2ed73b4e3c252c6b356d3367be7d4c69f18181840bb624ca467f36251b511d62502e9ff93972cb27f7133bae90c82f1e51bf54fc46c114ff73501474a3ce509e9677467dd4acc10961a3", 0x72}], 0x1, &(0x7f00000026c0)=[@rights={0x28, 0x1, 0x1, [r0, r14, r0, r1, r0]}, @cred={0x20, 0x1, 0x2, r15, r16, r17}], 0x48, 0x1}, {&(0x7f0000002740)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002c00)=[{&(0x7f00000027c0)="0d1aac5c70a88e96549ec0e6e8403e6ece25cce1214af200b3fb10cc847861d564213d6a9c8a8c0a4ab9acf3f034abba264cb27a4d3093d3ad5c2da5e5e2cac286473a1da6a882332eb0dcc9e5ad3cd6b8294a8b5cc7c2204d9cd7d66f4e4155e3cb76d98539c25d377547e194dbd4f7ee76024dd8d9d72681d969c03ac1f9d25bec4933e4f6a1b1725177b9c1f5d43ed170a901b00492768ef5d44b675c19cb3c97e2f5f26e6527d683c976", 0xac}, {&(0x7f0000002880)="9fc9b7b6397936eb614ad420d676dec81d601d1dde525133f9ade441dbc7bb134be2c575183585a5e0c896da7a517930437c0c9a03", 0x35}, {&(0x7f00000028c0)="ef75391d14f40acf6c2f2695fa350c9e04667213fb211caf8bf69b51f66c7f8009dec247545af4dde0e6b3785102857a2f8c9123fd9e210506c247a7beb687b3a4ccd667d44ced7d064c3c62e490376b7575398445369452196e3f87bba6084bea73075a4326c54e4fd3334ba3130c894ce95c449296e119d9f79aee2f6162a12b4bb24fa24280", 0x87}, {&(0x7f0000002980)="3e5fc3b1d3d3b0cb7c1da08309c7234a5b5b8cec44837907f3b658", 0x1b}, {&(0x7f00000029c0)="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", 0xfe}, {&(0x7f0000002ac0)="70fcd5a9bc7f1730d535989c3a4c2c857b41a1516151d33ccd638e52c0870591c5993a82e39f3b90734d005e2009485bfb228b09ece38a1c7f87e86fb146b98710ad39a9037de6fc821133865dfe207502a3b92e7eb571f7ec2fe3f1a1a2870d08ff9a9b44f02b4ac0d0651c99e44a55c25fe4ca2f5f8e53ba49b4c1a99a522783692ab5cb59e86be7c70b398f5ab5c44a7c81afac8b0a613b2e8fca73145ad70e6ef27d59ca6fee05ccaefa8aed5776724aa45f5ccd0848a1919a65a5ae8d2879333de88858dec92138a9787720500e7c931f202f437bd34b345b83d1aa97580ee2d19240c6d12f6f0ea7e14ed8", 0xee}, {&(0x7f0000002bc0)="a78232972df82f2b8e2fcbc299aaa219c73d3933b9b35357eebda6a12748332df7b87cb107698b383078bf62899bff", 0x2f}], 0x7, 0x0, 0x0, 0x40}, {&(0x7f0000002c80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002d80)=[{&(0x7f0000002d00)="b4c99ce485ca8743c3f043de994c64995be63ddcc09456999d276b79796a04e26b3925ed87f7eeef3869b4f0", 0x2c}, {&(0x7f0000002d40)="f9ac5b88ce8dd2f8bd59412e207a3ed6bd2e1b77b587c8a174afa32c0e1014f607461205f71469", 0x27}], 0x2, 0x0, 0x0, 0x800}, {&(0x7f0000002dc0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000030c0)=[{&(0x7f0000002e40)="700f4b9405956f3126c28c6bda5c13b0abb170f8ae503215956b08b9097979a317d3654a0b9ec6d90488860acc0018037a4019b4c8ab6fa96a85fee5e93b10da4dafb1d9ed7630e39a68864ded5c92c5f2913257b6f5216635c362181f64f5483f8bb33bc2c84b6b966cb59d290dedbbeb49e5cc43f7139768d801ae492f6bb9088a5ce0a77ceea6905792620d4676d4e4047f4881315600c88866dc3fc8f983c05fc1a7c443f047da", 0xa9}, {&(0x7f0000002f00)="980ce73476b1bd4258347bbadefece08aafc9a3e67da01b815f6a405b8cd2388d4a4001de0ae689afebcdaa1c9a05c4bab01b6260b0470f7b0ff17f1183cef750ec435576c0f19934fffe88131e9554105d06d3dc845ac4dfd974e5c4483a111b8c00da81e73b204c3844be02912f16f5d7bfe9bbdb4b10b93f3415e5f553c6ed5a35dc4f8d93349153bfe542cbed13bcc759b6b2bfdaa446994045715514c091f7996c69e972c338899013a44d69715186071ec9d00ff24d40fc091553a901012aa", 0xc2}, {&(0x7f0000003000)="b1d5579a1f9654b338fd5002cfbc7ae3647d22b5cb4ff1608911aa26c04fbbc8851e7b01d6bf6979db8ceee5def00d2df3e650dac2f8282f38960ebe8ea1d595ef0643da5c71e977067f118e5aa592d79078fa7c8bed2f0d36ed8caf4c23e37194d2b934c6fe0e91f0fd9c48372e9b1c99744d4f5ba7775e62b25170dfdb172437b939949585e2785bffdfb9ed5d82bb066bffd02bbf7cd7ca867dad7f49d842abb1e573eb1e454a34bc0bc5a91c40cf17200e8d91111dd8e66b339e7ef53d", 0xbf}], 0x3, 0x0, 0x0, 0x4000000}], 0x8, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000140)={{0xff, 0x1}, {0x5, 0x3}, 0x1, 0x3, 0x9}) unlinkat(r0, &(0x7f0000000100)='./file0\x00', 0x4000) [ 1833.793244] BTRFS error (device loop2): open_ctree failed 00:30:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000004000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1833.944696] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1834.027452] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1834.038930] BTRFS error (device loop2): superblock checksum mismatch [ 1834.073123] BTRFS error (device loop2): open_ctree failed 00:30:35 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x100000}) 00:30:35 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edfff4000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:35 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0xffffffffffffffff, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000200)={&(0x7f0000001140)=""/4096, 0x1000}) 00:30:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000004800080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="44d9ee4a2ae92c86b64c0f05be03100020c4a37bf0c52541e2e941d82a4a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f450f2f02c421dd589fc4e10bf8c426f2f045f6196462bfffffffff0252262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53af6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f8a6465b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f38346800c4e3295e4c3dc8a3c4c1045ccc7d7526802d08000000fa0f5fd25cc401f82b90b6d50000f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") syz_emit_ethernet(0x74, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140000fe8000000000000000000d00000000aafe8000000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090ae54177821e0"], 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000000)) [ 1834.391064] nla_parse: 12 callbacks suppressed [ 1834.391073] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000004c00080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1834.566528] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1834.584057] BTRFS error (device loop2): unsupported checksum algorithm 22813 00:30:36 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x202301}) [ 1834.607744] BTRFS error (device loop2): superblock checksum mismatch [ 1834.649677] BTRFS error (device loop2): open_ctree failed 00:30:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000355d00080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:36 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x1000000}) [ 1834.771644] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1834.830898] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:36 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed03fa000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000006000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:36 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x1030000}) [ 1835.101909] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1835.217885] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1835.253280] BTRFS error (device loop2): superblock checksum mismatch [ 1835.274935] BTRFS error (device loop2): open_ctree failed 00:30:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:36 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x30) mount(0x0, &(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='6\xbb\xfd\x19F\xcd$u\xbaw^o\xfb\xe67', 0x1000, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x20400, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', r1}, 0x10) chdir(&(0x7f0000000340)='./file0\x00') bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 00:30:36 executing program 4: uname(&(0x7f0000000080)=""/142) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="0adc1f123c1200319bd070") syz_execute_func(&(0x7f0000000140)="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") r1 = fcntl$dupfd(r0, 0x406, r0) bind$netrom(r1, &(0x7f00000005c0)={{0x3, @default, 0x6}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 00:30:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000586500080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:36 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x1232000}) [ 1835.380117] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1835.403417] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000006800080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:36 executing program 5: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000000000006000000000000000000000000000200e06d8e6624520b0040e0ff00000000000000000000000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000800423b1d63070000000000000000c7000000000000000000"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) socket$key(0xf, 0x3, 0x2) 00:30:36 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed02fc000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) [ 1835.557781] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:37 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x2000000}) 00:30:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000006c00080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:37 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000a80)="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") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) [ 1835.764685] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:37 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x3000000}) [ 1835.845220] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1835.876372] BTRFS error (device loop2): superblock checksum mismatch [ 1835.917808] BTRFS error (device loop2): open_ctree failed [ 1836.051244] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000007400080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x9, &(0x7f0000000000)="0adcfd1270") syz_execute_func(&(0x7f0000000480)="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") ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x3, 0x800, 0x6}) syz_emit_ethernet(0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140000fe8000000000000000000d00000000aafe8000000000000000000000000000aa0000000017dde2a5f20ee4b1c059cd3e3156ef055a7a1b7ac1c4daacc74d75acfe1b6a5e411646971f5e01b1fe17beeb388ccd43e7973de1d2376c62f7a7c2bd738e67b13be68139ea847712efe5d6f6ec4acf51a37ad01270f3d95a5762a4c84c", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYPTR64], @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRESHEX=r0, @ANYRESHEX=r0, @ANYRESHEX=r0, @ANYBLOB="e7ef86ac261ace573e2b38ac842d78231bf579e24b326e519beb580b90929ef98b515ae28f0ad69b30a5580b7e5aed0536ff0b24aecbff373444ad988b58d1b21b077d9cf3607b17561ee3da815c6867201cb288679a0a67d1b7"], @ANYPTR=&(0x7f0000000180)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYPTR64, @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX, @ANYRES32=0x0], @ANYRESDEC=r0]], 0x0) 00:30:37 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[]) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='gfs2\x00', 0x5, 0x3) 00:30:37 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x4000000}) 00:30:37 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed03fc000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) [ 1836.261766] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000007a00080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1836.375771] gfs2: invalid mount option: ./file0 [ 1836.428355] gfs2: can't parse mount arguments [ 1836.481133] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1836.507022] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1836.527344] gfs2: invalid mount option: ./file0 [ 1836.536095] gfs2: can't parse mount arguments 00:30:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000008100080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:38 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x5000000}) [ 1836.579293] BTRFS error (device loop2): superblock checksum mismatch 00:30:38 executing program 5: r0 = accept4(0xffffffffffffff9c, 0x0, 0x0, 0x800) syz_genetlink_get_family_id$ipvs(&(0x7f0000002100)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000002200)={0x0, 0x0, 0x0}, 0x40) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x3) add_key$user(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000340)={0x0, 0x0, 0x5}, 0x0, 0x0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000000), 0x4) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240), &(0x7f00000001c0)=0x68) write$P9_RSETATTR(r1, &(0x7f0000000180)={0x7}, 0x7) syz_open_dev$usbmon(0x0, 0x40, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001440)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@multicast2}}, &(0x7f0000001540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local, 0x3a, r4}) listen(0xffffffffffffffff, 0x0) fdatasync(r3) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f00000000c0), 0x4) [ 1836.620540] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1836.641077] BTRFS error (device loop2): open_ctree failed 00:30:38 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x6000000}) 00:30:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001fffffa88800080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1836.787898] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1836.957361] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1836.998298] BTRFS error (device loop2): superblock checksum mismatch [ 1837.028967] BTRFS error (device loop2): open_ctree failed 00:30:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:38 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x800) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000140)={r1, 0x1000, "ceb18c497650f58ce76af21238e9d3cc380587edbcb977cf8ba897d4fc80bb3ff98b7d29b9d9ef6f5366536cabf39133f964ac73c54f217bf3d56832827d9d2a2f4585fc988dda2682c7110b05c8de61e3966385027a73e0913e6f86a1f6106cc939fc1b0727527cb3ee45ce03010152f626edd3639a04b4654bd7f575d809a8d02bc6fc0139f2a986544695c9e68c661e599a977c81c731b1dba523df1de3af384ab31b9bd61cc06558b01867aef1590c456299bd1f6d5bd8abad9ed75ff6bcf03e85a25762b7d8637d907480359883d32361c975df711b6acf72da896debda024fdd4cfa26d15c8adc5c152cf0ae2e21bb8f189627e13e56b4841ecec14b12b1f70f9fac36fdfcf9e24f14a04391a842480f983ba80a505de7946c5eb08eb66b98502434b8e2a5bb1df84e47b0579ca042b74736dfa0f7c5800afc8c2609220fb6c168655572778301ba9eee9d84c998fdbbfe32bafa698da6191ceec3d3f1027f785905a9d6e3e0567c61a10b59ace3af1979998c04b24f0e0cdebaa424d5866f70b007b080a32f0c1e086fbc95ba5b138f8dd8192ac8bdf511d7468fac8955560cb962e4b4a2efe60dbc5834c2e4f11abd45e83511af0654a2c5bb38e911dae1d8d0dff4adeeac5073065ea7ed76d106ccd477bb9ed762ed82cde4a784dafe5b12517f89b76656591011c7fa33baab51686aeeb18b5607c3a826521341f3707629a1358adc07970429935eba474a461639937a7fb28709bd49dd881d40cadddaf5f63e2f150880c6fed5461b15d09a091c6fd13b46600e37c05cae0cb1ee2ed7e27d30da591b391afdb075681c04196895d3f0a7d7f5579cbbc695f974537a2546314f2847e1d37fb85206c18f0cf7896d34127d78628b782a79e15d4b533861d8d35388fb5719a27bb7d14cd71d3933e235ff282b7378973ea1860ce7c5ffe010271ab240ac8fce00169f25f18f1fb8dc0e33d5c446e05f6dafb369a18c1eee36c46d3ab1c59d4c23a5c7bc8be038c7b53b6be3a9133a8446e8de6850bea29802cd0d6965252ba8824bb4700ea23398f38ed346bb6942fb7cf02faaaa6c055e6d04400a71f1aeb8dc0fd4436c4e39d210e6c0a2e5b4b344a201f355763889ccb991f6315715059932ca1221a113ee3ea36bd6b04a7fd8f3a0874232f5182078561695a397d03c6a4dec4c5c3ad3a9bef078a41118afd0bd38cc71c07acdfc2808420aeda4d0d7a6b05b0a26a2b79b89bd81da5978a4c967ec17039478fba447ada2edf523338084c6722a39f9eb95efa80fb2f480c1d7249f08dedb6fe7d4fa9c478b72a0ae7533362d3e0ad580c2badf43e2141bcd52a9eaeeda7317f30f9712e1b70ab8a59c5dc00ebb0d16843b3767cf5171ed01d4a92ade4aeb921150a878bdebeb87d81f588db6a57423abd13125dae63832221a3d80c9db60fa63f83f52557387e9aa4f4fb8d525f18f9c87c2a4563a52b97845517d9747be55473011a3efdb6e919205274b01a9e1cb483f55a0304c9409ba038767167296fb9f6f009023f58e17a1d8e904688276eda06989e244c721f99f94e490a0008e50ab49d25f25028119b0b3fa519786b90ac1e336bb83c1bc75ad8e218339784af17f919180fcb0ef62f86bc83d333218651304c0b77edd3355316b40e0757edc2728c3786dd8e90b0fb9dbd5d41470fadf884f69ce8cef6268f74a31facb27b35d4fa509ec2e6b29f6ee4d0bfcf1b0697f0e7c7dcc255e306d431ec7d7a26b06604fe5140bbb574dc907a35061fc2a2108cb4532de78e5175fff705efa13c28d39238be259408d27e4c2f01b531feecdf0191cd44e852b38cdca09bdff6c3fc67ead8abd871191ec1757c468f74554d29f8e0fe54d0ed38481cb174c0f2a69f99f6ee04223ae9ab1ba346385d31c8780382e38628f636ab0f7599d55d934132ce3f2ffd68d234f3912a85770f465e46ddd897e5ab920c8e836ccf555fb44ecfdf1948d9cc7b2b519d27a47c0ec965a195edfbe35fd56adfb6f3beb0c5080652830858b5bd74c217504929bb82d2dd2b8b0d0e6b3f011ea01bbdf7614a146d4ebc8dbb058acd87a93333f9dfb8c04f1c96af9d9638ac788e3cebf563922ff86296423562a1fb91a8264edc8e43901db65f2f63f8e23bdafd70fa12b42583fd79909dcc6e17a69ea86c6d533a68b381e980dfcdd6b253b55a8f4376cdb092d9305c0ffb12eb50690e4dd6a27cacbba7a564bb9e5f18cd9837eedec01ee474130e6e4ef3687a239fa5a5da024a402b59e8da4719f061d0ae6cdd4d471e34fae7c81e4316e8ab803eb545b47a9562aff26a2c96ab5a32dc87509b158f9d5083c2339b40e9a2149948e597b3bf34057a426b84531e92ecd1346bed4d501afd75e2c55b9cee04e59f2e5c49c4724f074d2f753c89a0e6ea09f6e1b1498772c582dbc2264faa246d9f39303b26fd9c8ab28ffdfadab116cdc6e94ef40c1612134054fe249fc8b595f3bb7eadb3987946c5518eb3d69e40da9fced70b3cf2da859b7de028db56eac660cc9be91ea77ff57c93ab7215846946e69cc527d11062e71b3ec7ce7b205ca9a90644b97414269ccba9712143d7c7e541437fd28fc32ff6d37c0dba530cdf0ace4274c85913c62ea716339b22a2215008850595acdff1eb8c542d8b03053f847aa31cb90c4efc5033d7b6c9b0105bd0fe33bb81e6504a8c269c6a45053273cb5beb58d6076c1f11b5c0fc3c7c4f4e8301c190f259288036ac19ec52626730ddc67c501f3375ad4cb5edf6584f13170b2c3a3dc1e3a9dfe2487ffda45c8719c91f0d881c36c096c913d9b9aace2545b66a1dcc9d0a7c5d50d9725f1733b48d91e9188666a88824db88e1faec2083289b00d372625c745d714d27d4970c9c5bb5acb71f1024e885ad62c708ed274695fbe510e859e08fe19462bb40292d2b1f26ce9fdff921b0c9332627c5676c11590912273330bee7b646852e4fc356a689b386e969beaf0e06b01489cb2d1e4bef0ae5cbc36edb0d494a2c20b6c15780b9d7feb0e162f8d748a57d75d4fd48e9c78349c522602fca0f9f396433c6c4d2fbbc4a0c819234630d0623cc0115d3545b416383ca37a626508324b43f4b2fe4c97212a7677b049378bb9094e4237c52c9017c3349ad6651baa8348dfc396f37be9739d17ff24c790c7fe4b2ac845fb6b9e6507f98ad9bc4211a8b57650a847049df0f5fb5805c4e71c7a334f6a225d6916ec654f5c3b6b3759ace5e4d87ca3578b7b95d1d46e4ab8baaa0b2546e37f37665bc8e6858a7a7be188924ed58975bb42535155c0f478d0aa41460b61aea43f8d6101d83dc1f43d40988245c653021b75cc490c4e6c9382e8b9813d21661a78119825df4a6b18993a23df4a2a68409125fd781a4d2064b02b5ddc792cc55c0d7a064b3e8c2736bbe53d43534502da58360899e7ea6744666cb48ba8577ae9cb84d0fb9df01555459d07231765412a26f1993d85c234b6c54f799684f51ed5144c1f7184d044b068ef51fbe2fe738abe733a498ec55fc52a1ee7ffb57bc49cb08bcdaf56366428705231c4ef7a1c6d37215c1a955a009bad5d6eb8783e149c2f35b90a0520eb8dc852dd18f97590966a467db2674293963f02b88b4a68c9ad13094e1f72ef0e0b48dd42aae66b0e551bc956334aa9f294e60d1e232cfbb8ddd121e4301b2568b94ddd4166387f9cf77d5e1ee96842c54441f5cfb73008ce858bcb82036f3216b26b96ba36caaeea2cd6d3dd0a17e298f4736f66946e1d9fd19f50760cfdb9551f7df75712df0cff774f7963034bd0a833c9ee48ba9aca07176aea587bccf3d8e3a9cebf9887dec2e28503f2669788e0f6c146e5a4d6e94a001bd54e55737372094b671284039a6e2a7293382e88b45eb83abfc6ae4bb78c0f02f2108d6f90c1ffbf1eb42a3b21c8f457742b95c9797c95f9d38ff1d54cb061214e5a99bd0fbc65a3e0a8b1ac2b3d603350603081b56a2219815c2b5b303bbd268209b24d3da8ae40c34a984fe15c449787a6661f96b79ed346286c732b6679f480d14fbe236634a58fc39573d542bc7ac116e08820ea4fd5c81091d15adc060d6ac46e45a3aefd9deedab48fadab2510076154d8dd7cce6c15a2e07cae2d2192319cc390a25c14d5fc01b569f7935a14f3a2cbcdf13125cabf3d63748eb03f04b07b3c410cc4e57461708d81edcc228d373364ca38865acb6350fcb9eef93af31e29d2b002a07930e42530ce3e29dc25184e69a294d82335a9448bb1c9f67ba479de76bbafea199e78031af44d91e5450a8bf878d7d5286c73a95d82b60b94782770c985dfcec13200f6a7571777d753ba8bdf5bf2c681b51d772ca7cb0051ad53c2e400c665d3126a7d3e29cfbafa3161cb9877ac03d3cd28c2ff13137d0ccf6537fc9c83bf27f1040a17e68f989e9b509b66aabebf149213473bd3887172f134cb1b0173aeb2a2b2e00a0762f0474c8b1d2bb1d93aeeff5679251d595bbf2f5f26d344e6e9c5acaec0884c8b0449ebe864e66d82364221f41f2eb021d4647bf823bdf135ab7f030c2675e211852e9d2399e37f075006db4419a1954f7357ed0f3aa397e1ebf1f1869a1baba31acf0ed02841b449f614e89779944e6d0fc92c9c254c22f8b4561a8dbb2498b14046f5077c294663e3b308e6339de4fb65fccf9e8658eb50ba7ff72b0c313c449890986b8e075166d5900818a4cc90a11792aca110fe52cefc12e9c7a27ac716f572e4e5824b995f7fa092d819c8f5b6debded42ef3b2939acc2f18153fe21dc08d581fbfa01761819b8fb81f6e06396f0baedf5ea5876662462f53ac5f46711e9a4c351644cd16b96c733fedd3c3a432017ca563d6a6959877bb14aeec807799df247d5c6456afb85bc0bd41a33b3b305f8cabc38230ad4b7dbd1e4899303f3de4f2592d9abdddb848047139df8d0bf1792996292df872d04eef4b5f9a94e4175845e4f63138113af5707936617c9d8c5ac00aa94b8e3105ecc10ea4de38be1c823bcce67f23d541e7e1558f030b249f045f77044be360b4858157974b48bb11df3330303509171ab85e24728c51f357f8caec13d3f0af2df06752d48730aba7d3dabfb0ab3922bf231bb2e535444be9199ebc35c3dfb83791d1995f30e16879b24c7783a6712fe6118369adfd5b42c7081fcf1c480e045da4bb9f1284df7da6d437478d4454b3de8da806d676dbf676297f885366513373ea832b13d070bf53d527896eeb5176c2c54a4734901dc85856d577ed262c9292377c016eb01c34c52a0496523e2e1c9e849ef18205d1c7565d084f1aeda1f8b8d2732281ea55ac107641db68e44b8c11c04456edb1602a901a4e38523a7fa6ad85b06c71bb3a2cd21b0956590023a1a527fc03019fe055f45431cdf8b5827e9d4218a3bcdd34137778e699153c3c68712249d2e1a0a04fe080b026ea69a327c639c0c7c62d36939048d5dd603f2890106c89eeec297e11a83aad9d0472cab46810cbf7752ec05840487a168eca3a0df3781044c32d70a7b836bc24ed025b7cc7d584342cc1b1a4dbd08ec8bf915e7b6d5e2635dbeb9ef0e6d1ae485762714474fd2a122e82f83b4da477c7ad0d0c492d8d1814b7932bdeab22a9467d117eec32f1ed6f7726bdee55a07695280497be2e11ef8b7f74f97b3063f9533be9a49062bde84b50c876e051a2822e93e8046b553c126106559e87bd8d2ba5b21f79e403dcd4e3337e38fa09c487aa9cb8da37f26e43021fbcf66a7c6eb6dcd889ad6f2f6236449c31df1e4af6b"}, &(0x7f0000001180)=0x1008) syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @random="188d3ea1dabc", [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev, @mcast2, {[], @icmpv6=@pkt_toobig={0x3, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 00:30:38 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x7000000}) 00:30:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$capi20_data(r1, &(0x7f0000000280)={{0x10, 0x4, 0xff, 0x83, 0x7, 0x81}, 0xf1, "51333465c44f5e5734615b40e6d800d1bd10c8250d9942e35c6269913494eaff7c537a299c05f92acebae1140a6a5c002c96482dbc47ad1dc949d12074f455138109b28bac8e329b3d794560bab5b60be76a6eec3c93d57cef9a944cc0ab610bdf6b1ae3d88e9e5e64ca111865bd023e148e7bff9490f774002d433f0a8f51cf602bc5a2315da881b17b959d3255c4bad0abedd6ced027787974bdf5cbcdd885b5d68bd6cf47597eb957dd2885bcfb5baaaf7affce6cb3d14221096402e2f6331cc1355e4d09786cf485834c797c33e7afa57aa583db61e9cb2a52687dc63eda344760f29811d942179c8d07fc3e433d06"}, 0x103) syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:30:38 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed03fe000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001fffffff9e00080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) lsetxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x1000000077, 0x0, [0x4b564d03, 0x1]}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r3, 0x0, 0x1, &(0x7f0000000000)='\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs(r4, &(0x7f0000000180)='statm\x00') socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4004ae86, &(0x7f0000000100)) 00:30:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001fffffffc300080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:38 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x8000000}) [ 1837.457096] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1837.479384] BTRFS error (device loop2): superblock checksum mismatch 00:30:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001ffffffff000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1837.505437] BTRFS error (device loop2): open_ctree failed 00:30:39 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x11, 0x409) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f00000000c0)) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'veth0_to_hsr\x00', 0xe0}) [ 1837.603485] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xffffffffffffff01, 0x400) ioctl$TIOCCBRK(r1, 0x5428) 00:30:39 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0xa000000}) 00:30:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001ffffffff500080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:39 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0fff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:39 executing program 5: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed03fe000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KDSETMODE(r0, 0x4b3a, 0x200) ioctl(r0, 0x101, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x0, &(0x7f0000000000)=ANY=[], 0x0) 00:30:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001ffffffffe00080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:39 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0xa0e0000}) [ 1838.174647] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:17487635432702809553 old:/dev/loop2 new:/dev/loop5 00:30:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f88a8ffff00080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:39 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x1f000000}) [ 1838.266487] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1838.289836] BTRFS error (device loop2): superblock checksum mismatch 00:30:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f00f0ffff00080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1838.371008] BTRFS error (device loop2): open_ctree failed 00:30:39 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x4000) poll(&(0x7f0000000280)=[{r0}], 0x1, 0x3) 00:30:39 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x20000000}) [ 1838.519929] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f7fffffff00080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:40 executing program 5: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x5, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x10000) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e22, 0xfffffffffffffff9, @loopback, 0x3ff}, {0xa, 0x4e20, 0x7, @remote, 0x7}, 0x3, [0x1, 0x400, 0x1, 0x10001, 0x4, 0x91, 0x4, 0x7fff]}, 0x5c) syz_emit_ethernet(0x7a, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x0) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000200)=0x568, 0x4) 00:30:40 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edf4ff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:40 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x29000000}) 00:30:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x1e, &(0x7f0000000380)={@empty, @remote, [], {@can={0xc, {{0x0, 0x100000001, 0x8}, 0x4, 0x1, 0x0, 0x0, "439ea923d0e1dbfc"}}}}, 0x0) 00:30:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket(0x100000400000010, 0x2, 0x0) write(r0, &(0x7f0000000100)="2400000052001f0014f9f407010904000800943708000000", 0x18) 00:30:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f9effffff00080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:40 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x3f000000}) [ 1839.015694] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1839.042180] BTRFS error (device loop2): superblock checksum mismatch 00:30:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="2a29a1613fc1ec763383d99869546c8d", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007640)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f0000001b00)="c721539568bd0d480230f4d31852d15a", 0x10}], 0x1, 0x0, 0xfef0}}], 0x1, 0x4004000) 00:30:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001fc3ffffff00080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1839.131460] BTRFS error (device loop2): open_ctree failed 00:30:40 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r3, 0x89e4) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000000c0)="66b8ea000f00d8eadd5484f88a00f0833600660f71d50066ba4100edb8010000000f01d90f0866b8bd008ee0b94d0200000f32360f07", 0x36}], 0xaaaaaaaaaaaabce, 0x5, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1839.215136] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1839.280316] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1839.301425] BTRFS error (device loop2): superblock checksum mismatch [ 1839.350394] BTRFS error (device loop2): open_ctree failed 00:30:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:41 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000030000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001ff0ffffff00080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:41 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x40000000}) [ 1839.772217] nla_parse: 12 callbacks suppressed [ 1839.772227] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x0) getsockopt$inet6_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000080)=""/116, &(0x7f0000000280)=0x74) syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:30:41 executing program 5: r0 = socket(0x40000000002, 0x3, 0x2) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x7, 0x20000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r1, 0xfffffffffffffdab, &(0x7f0000000080)}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8907, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000140)={0x0, @bt={0xfffffffffffffffb, 0x3fa, 0x1, 0x2, 0x3, 0x1, 0xe8, 0x696, 0x101, 0x54, 0x6, 0x8, 0x5, 0x0, 0x10, 0x10}}) ioctl$NBD_SET_TIMEOUT(r2, 0xab09, 0x800000000005) 00:30:41 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x48000000}) 00:30:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001ff5ffffff00080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1839.971624] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1840.015693] BTRFS error (device loop2): superblock checksum mismatch [ 1840.039251] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1840.068597] BTRFS error (device loop2): open_ctree failed 00:30:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x8800, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000040)={0x0, 0xff}) ioctl(r0, 0x6, &(0x7f00000002c0)='\x00'/13) syz_execute_func(&(0x7f0000000140)="44d9ee4a2ae92c86b64c0f05be03100020c4a37bf0c52541e2e941d82a4a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f450f2f02c421dd589fc4e10bf8c426f2f045f6196462bfffffffff0252262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53af6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f8a6465b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f38346800c4e3295e4c3dc8a3c4c1045ccc7d7526802d08000000fa0f5fd25cc401f82b90b6d50000f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:30:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001ffeffffff00080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1840.243890] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:41 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x48020000}) 00:30:41 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) [ 1840.374342] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="656425a74a2ae92ca842980f05bf0f000000c4a37bf0c50241e2e9b5c422ebaabb3c00ba00400fc7a4ea70db003f00000f383a9e020000002e420ff841169a8f698099005ba265aa104b26660f38091e2fdee5bebec421045f46eec421dd584243c4e10bf8d426d8f045f6196cef620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2ab440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53ffd2c4c40f9f3c6436b2aa42664d0f31c46500000ff7d29978c104c441c05983f9070bb3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") 00:30:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="44d9ee4a2ae92c86b64c0f05be03100020c4a37bf0c52541e2e941d82a4a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f450f2f02c421dd589fc4e10bf8c426f2f045f6196462bfffffffff0252262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53af6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f8a6465b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f38346800c4e3295e4c3dc8a3c4c1045ccc7d7526802d08000000fa0f5fd25cc401f82b90b6d50000f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") pipe(&(0x7f0000000000)) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:30:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0002000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:42 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x4c000000}) [ 1840.648886] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1840.676431] BTRFS error (device loop2): unsupported checksum algorithm 22813 00:30:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0003000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1840.700567] BTRFS error (device loop2): superblock checksum mismatch [ 1840.740770] BTRFS error (device loop2): open_ctree failed [ 1840.816145] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1840.828376] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000080)=0x6, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:30:42 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x52020000}) 00:30:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000000)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e21, 0x4, @rand_addr="709086482154628f6a73b67345942fb2", 0x100000001}, {0xa, 0x4e20, 0x702f, @empty}, 0x7f, [0x9, 0x4, 0x7, 0x0, 0x625, 0x101, 0xffffffffffffffff, 0x8]}, 0x5c) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x4000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000240)=[@in6={0xa, 0x4e24, 0x0, @rand_addr="f6081047c057a08f878df3394369240f", 0x7}, @in6={0xa, 0x4e21, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x100000000}, @in6={0xa, 0x4e22, 0x2, @dev={0xfe, 0x80, [], 0x28}, 0xfffffffffffff801}], 0x54) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00\x06\f\x00\x00\x01\xfc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, &(0x7f0000000140)=0x54) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x4}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000340)={r4, 0x3de4}, 0x8) connect$bt_sco(r3, &(0x7f00000003c0)={0x1f, {0x406, 0x3, 0x4000000000000000, 0xfff, 0x76f6, 0x54000000000000}}, 0x8) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f0000000080)) [ 1840.912546] BTRFS error (device loop2): unsupported checksum algorithm 22813 00:30:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0004000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1840.963082] BTRFS error (device loop2): superblock checksum mismatch 00:30:42 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x523b0400}) 00:30:42 executing program 4: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) r1 = accept4$rose(0xffffffffffffff9c, &(0x7f00000000c0)=@short={0xb, @dev, @rose, 0x1, @bcast}, &(0x7f0000000280)=0x16, 0x80800) splice(r0, &(0x7f0000000080), r1, &(0x7f00000002c0), 0x1, 0xf) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1841.029083] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1841.033100] BTRFS error (device loop2): open_ctree failed [ 1841.068430] IPVS: ftp: loaded support on port[0] = 21 00:30:42 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edeac6040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0005000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:42 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x533b0400}) 00:30:42 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x181000, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x74, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140000fe8000000000000000000d00000000aafe8000000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="320000005fa75dbe2ed4416b41f003c109000000"], 0x0) [ 1841.447961] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1841.465061] BTRFS error (device loop2): superblock checksum mismatch [ 1841.475810] BTRFS error (device loop2): open_ctree failed [ 1841.546814] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1841.581147] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1841.608093] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:43 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x543b0400}) 00:30:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0006000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1841.669280] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1841.691204] BTRFS error (device loop2): superblock checksum mismatch [ 1841.703867] BTRFS error (device loop2): open_ctree failed 00:30:43 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x553b0400}) [ 1841.831792] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:43 executing program 5: r0 = open$dir(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(r2, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r2, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x193331d74fee1757, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, 0x0) ioctl$CAPI_GET_MANUFACTURER(r3, 0xc0044306, &(0x7f0000000080)=0x9) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) ioctl$VT_RELDISP(r2, 0x5605) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000180)) memfd_create(0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) ftruncate(r4, 0x7fff) sendfile(r2, r4, 0x0, 0x800100000000) 00:30:43 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edebc6040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:43 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x563b0400}) 00:30:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0007000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1842.073919] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1842.108199] BTRFS error (device loop2): unsupported checksum algorithm 22813 00:30:43 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x573b0400}) [ 1842.173495] BTRFS error (device loop2): superblock checksum mismatch [ 1842.240097] BTRFS error (device loop2): open_ctree failed [ 1842.345325] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0008000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:43 executing program 5: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x101000, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x8000) fcntl$setpipe(r0, 0x407, 0xe000000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = msgget$private(0x0, 0x0) msgsnd(r2, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(r2, &(0x7f0000000400)=ANY=[], 0x0, 0x0, 0xa423ad41a879dde0) 00:30:43 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x583b0400}) 00:30:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x2, &(0x7f0000000340)=[{&(0x7f00000000c0)="d800c25e2e43471ec8606de06b2d7bdd223c169b188a5743e60884b9345b8d6a0da629299734e777ba26cb6397fe71d01deb0431d315f9c022c4a967e7", 0x3d, 0x7}, {&(0x7f0000000280)="8bfd5a838eee3659bb36cd97bb38119d8d2e5863faf5da9da30e9b8f6d5bb0e893c041c85bafb875da9bd8623f6525efe5950aeb7ebdc67b0bbcd014bf5415b86bdf7babb68a8ea775d9cd8e3336e54a95d9dc07f5f40c34e961361c0190af9203e2a4f7bb62bed155ff443cbab5a157687ad9efb11fc6bf19e63335ba235284ef348394a7b49ace2729f533ca5140a5f7ab9139afe594ed34f4d62bb500941e7dc5fd3e9fa16c277b2190c18c41a4ed4707a507f4618851c420644d2e7ce4", 0xbf, 0x10001}], 0x1000000, 0x0) 00:30:43 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edecc6040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f000a000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:43 executing program 5: syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000008880)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000240)=""/62, 0x3e}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='d\xb8\xddBz\x85V') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0xfffffffffffffed3) 00:30:44 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x593b0400}) 00:30:44 executing program 4: socket$unix(0x1, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x9, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000012c00000000009500000000000000"], &(0x7f0000000240)='GPL\x00', 0x7fffffff, 0xfb, &(0x7f0000000380)=""/251, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x6}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 00:30:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f000c000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x1, @random="7684cb9c221f", 'veth0_to_bridge\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000200)) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x69, 0x0) [ 1842.799924] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1842.853196] BTRFS error (device loop2): superblock checksum mismatch [ 1842.903468] BTRFS error (device loop2): open_ctree failed [ 1843.079555] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f000e000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:44 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x5a3b0400}) 00:30:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:44 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x100, 0x4) sendto$inet(r0, &(0x7f0000000640)="96", 0x1, 0x3fff, 0x0, 0x0) sendmsg$unix(r1, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000006c0)="89", 0x1}], 0x1}, 0x4048800) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000440), 0x164) write$binfmt_aout(r0, &(0x7f0000000c40), 0x20) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffea3, &(0x7f0000000180)={&(0x7f00000000c0)=@gettclass={0x24}, 0xfffffc3f}}, 0x1) 00:30:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x40000080806, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000200)=0x4) bind$inet6(r1, &(0x7f0000000240)={0xa, 0x4e20, 0xffffffffffffffff, @mcast2}, 0x1c) listen(r1, 0x80000000000000bd) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) wait4(r3, 0x0, 0x80000002, &(0x7f0000000100)) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, &(0x7f00000000c0)="14", 0x1, 0x0, 0x0, 0x0) close(r4) accept4(r1, 0x0, 0x0, 0x0) close(r4) 00:30:44 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ededc6040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f000f000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:44 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0xdfffffffffffffff, 0x100000000010000) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000400)={{0x7, 0x0, 0x0, 0x0, 'syz0\x00'}}) 00:30:45 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x5b3b0400}) [ 1843.573345] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1843.600426] BTRFS error (device loop2): superblock checksum mismatch 00:30:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_iW\xa2\xf4\x81s\x00\v}\xff\x17\xbap\xaf@V\xceJ\xfc\xd3p\xd0\x1aL\xa6\xa6\xf3\xed\x16O\x9c\x12V\xa2\xc9E\x89\x97#0Z\xf7.\xd7\x19Q`E\xecR\xbb\x9dC\xa2\f\x87C\xe5\xceOrqmh\x19\xfe\xaa\x82\xda\x03\xfd+2\b\a\xa3\x13\xb40P\x1b\xf6\xc1\n\x8e\xfc\x93\x8f!\xfe\xc6\xdcQI\xb7\xbab\xbf:\x99\xea\xad\xf10$\x15\xc2t\x8fO\xe7_\xeeI\"M\xf4\xd54\xd7\xea\xf1\xd9vw\x92z\xf2%\xbc\x9f#0iW\x9c\xba\x9c\xa3\xf3g\x84\xcf\xc4R\xd8/\x980,F35.', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r0, 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f00000000c0)=""/78) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000280)={0xb, 0x10, 0xfa00, {&(0x7f0000000140), r1, 0xe3}}, 0x18) [ 1843.648713] BTRFS error (device loop2): open_ctree failed 00:30:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0010000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:45 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x5c3b0400}) 00:30:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0011000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000300)={0x1, 0x4, 0x4, 'queue1\x00', 0x1f}) fcntl$getownex(r0, 0x10, &(0x7f0000000480)={0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f00000004c0)={0x0, 0x0}) r3 = getpid() sendmsg$nl_generic(r0, &(0x7f0000000580)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000500)={&(0x7f0000001e40)={0x1654, 0x15, 0x400, 0x70bd25, 0x25dfdbff, {0x1d}, [@generic="5a15b5812b3f7c05a4b7a41f305e1a590670466c3e938b4f851abbfd58ec964ca80444f09e3fda0a6ef1c3441d16c7c70820bb1e7f4d50a3337b95280cff22ffce8ff4419ef6ec2e30e6b592169fb50c8a798939834e128eab3a7bb347e9c6a359323cc0e748be7234475613875222c8e717dda43ec0ee99ed71e6812ec8f3", @nested={0x14, 0x39, [@typed={0x4, 0x52}, @typed={0xc, 0x77, @u64=0x1000}]}, @typed={0x20, 0x56, @binary="183f170326759066597e4c00cff830717ced46e0d3e90a6a29e8"}, @nested={0x1040, 0x20, [@typed={0x1004, 0x69, @binary="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"}, @typed={0x4, 0x4e}, @typed={0x8, 0x63, @pid=r1}, @generic="282c5dd63a963694", @typed={0x8, 0x23, @u32=0x1}, @typed={0x8, 0x0, @ipv4=@broadcast}, @typed={0x14, 0x64, @ipv6=@local}]}, @nested={0x414, 0x79, [@typed={0x8, 0xd, @pid=r2}, @generic="5fed7636cd9f1da05d1be5f97d16fa10de92988cf0579ad78338ab65493445a5e766c4f335c1e11124e5512b502d566c8418f978d8410407855a10a72aca4959cd78f4", @generic="7c62c5168967f8c8792e41e4b437c54f7854773deb5fb21cedcbc9ce6293b015c46008f55c53363b881ed784ebd1ced2422a97139e3f78b29886ffec3dc111b807751e90", @generic="72b49ff949388aef468dfa9ab90185dc8c998949f86ff13b306893bc920a0b7772216be1869eee49126bb57b5c8c433ed5d2e08529750d19bc6c0ef7cdc29ef293ace7fedbda59df638c08a23361b7fe8a0d8ffede96b28eb4e0d7f5b0d323bc56461c97577985732f041c164f08f0a9252804c490c130ce02e7cfab3cabc8607f79968f3d27258dd9151194b69e93c120395b79da4335d6150806fb555c02e18625b04b6f4c83eff61df9746e32d8eb645fc5451b08d76b934df12923c61415cbbaca5ca5eb4e2bd0dcc0a3069d5dca23", @generic="dcaa50d64564d4343470576b0401a491dfb6eb75b82a63a985f91050985718ee3b973fb5c983654e8deda2194e87df2660b146a8d4176300e838975dbbf1237d715dfd573dd028dbb7a1bbe33bdd160cdade43246616af73e127ad5915a19a10ae81c021f4f1734043c2cf954e4ea7afffafef3ad7e0452308409cb4640829b1f286c2088c799048668ea1c6d593fa45f8e231acc81653477dd7106189ea80103d84c2ee8be52455481b3b8cfe66ddcd6699ea5c2cd92165e1d088e3d08104e44bcd4a10bc27fa835da3d18c9dde552e04f04027d40d7c471c93969cddfe6691dc3239a8f9b7b862ec91", @generic="a9c712eabaf9a2f7920fa7fb144fee550f1ab8d3dcb8ed49713adc89001b74c433d6d782699ba8711ce70cdf9ab98cb0aae90a55d3ecad57ca4e48fbb1493da605db31e7b37081b9d109bf5f34176c62a754581b453a8b2437dc798a4f305fd6ea320732a9224dd0914765c71753d7d006a7e56f6e8e58e9c71ea4d0355de9e234791ffb80", @typed={0xd8, 0x7f, @binary="4d94ecc1c1a7414cffd5805e120f69040272ea7d76089586144a4aeb6a2e605fdcf2b4e91d62145cd2e551884f8382f4cc06af2cced459406081e18c5a105edeeb064374b2a6c93ad0ee2780c31c8fb780e0bea4acae9cc4c92ee415a15b9a2ddd33c5b77ef408ab022c1a404fece2fa96bd0b61a568ad15ce086bdc3bcca78a6d58d31a88fb89c63d4b52c374cf68ec9f58dff86991025a06f17a1cc13bae20acb11bb83fb0b178173d69e27b3fb261f65956d9c2e3cb503ebd7bd39dad9c6c4af739bf1f04ceaafb2d867349e3272c03fa4369"}, @generic="e5dbe216e71a54571bd40fb2828068b1a5c57bd61f8258d97497879b5be347824c70a49ee085f640fa22b4b73b361916c96e1674809b89080dfaad45336996bfa54de70e17bbcd008c8273d0e7d5b3d8be62cceb05cea60c776bb7d1f80e8478c4d0b40dffe264"]}, @nested={0xa0, 0x7f, [@typed={0x8, 0x16, @fd=r0}, @generic="0e5ed92fc4352825b868736680ac39272c0c2fbd86db77ef9472d516f663470a5bf27f042aa1d9d6620bd342cd50314dd26a1623a76839328458d4f1bd76b4d4ab2c1e1cdba744516cd0ea25290825b9fddd63944ca95e1a034fb1a25cdf14bd2dbf34d1ff7e593e18f3d28b8f82bc9b83b32a4f22512256647e35b132611696dd52f741d661", @typed={0x4, 0x3e}, @typed={0x8, 0x40, @pid=r3}]}, @generic="b2a4168fac3202c27eed5a88083a12d1956b55e71d2cfb1c2b0a6727bcefeb2089cd4b8cedfe305d6516f280be8ece9b1fd7373f7691b73394b41cf335a64420242ae33edc9eacb35cdb256050f74b9769a0e96ae8c4999e3c00fcd702b2e350545f277e334e7dac9a7aac78daf0d686e4de3742d39e2c272b52f0dc8942bf3c76561b28b43cd6cb8727bf335878a3dd41440853ae23cda369"]}, 0x1654}, 0x1, 0x0, 0x0, 0x4000840}, 0x44000) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f00000000c0)) fchdir(r0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="a6bf14"], 0x3) r5 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000080)=0x4) personality(0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0xd200000000000000, 0x5}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000400)={r6, 0x1f}, 0xc) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000001c0), &(0x7f0000000240)=0x8) sendfile(r5, r0, &(0x7f0000000180), 0x5) [ 1843.801154] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:45 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edeec6040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000009000/0x1000)=nil) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000340)=0x0) sendmsg$nl_netfilter(r2, &(0x7f00000008c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000880)={&(0x7f0000000380)={0x4fc, 0x1, 0xf, 0x200, 0x70bd29, 0x25dfdbfd, {0xd, 0x0, 0x9}, [@typed={0xd4, 0x8, @binary="408d591482923c81a46d090034e00f0fb8fedc699cd61b8791cf5e93f81bd5c71d6bd38b508f103ef295ba99461365c9862c8a9ae64d10409570152a3457a97f638b2573a97e36bf5293cead8c4346379c5be64b099cfa496597b513443af83608a8d344bc3c07806e6129bebc52f43b32f1197c5167c9e0c3073c5c7859e0ae160e9996236df2f5f310d42baf9afc3ac58f62012208625beacec0b34282581fcdb8d13c73914e44eab8d340d11ef12a4dd56876f35296fec42617cea60941cff72deb4e4e7fca18d4071def6445b3"}, @typed={0x4, 0x60}, @generic="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", @typed={0xc, 0x84, @u64=0x200}, @generic="8d8065440c3885f747b2b33ac7652d1aa72a6d2dd5f35689222e7e37dc3f09a1e1517307dea9", @nested={0x168, 0x6f, [@generic="92c67c50c982b55f5e306e8f", @generic="4ea3bcd78b7b650345c806673ee24d85ffd85d7aac70e45d8268218ac2b0db69cbfec6157996929298448c6dc1f5f0d3da6f322f32895a719005d523314eddb1f2749240f87c5619354459542c929467f9b3ec12ce0b34ea6684835834a3594f91404882bd", @generic="5f47c6e2ec6cf16a0dafec921886b3ebbaf7c43a33", @generic="9b544b57b7dd", @typed={0x8, 0x25, @uid=r3}, @generic="3c1c6d6e1b1d4acfccc8437e27df2522aa1cc09de4e017f1fb20fb80ed45aaa9b7dfbf44c7e5b8455b39368180c9d43b316b", @generic="831e44f500d6a4c845ec88e654950683494b70d87e5e552c29fa75652d9788590f38fa499dc64e477b6bffb40cc7468d4e90721a0c171b3ebbc5085cc2c92b9d8a6650833ba37de9ef9423f32c4208c749897992edcaab8288d813fa3d84a41d72b0c1b2d57986246f81fabb085e3082345f1ce1404e4b214dfd343b2e67cbb35d3bcd448df36a0d86121df79a6f774c1f1ee7bbdd0aebaaa0", @generic='}*']}, @nested={0x170, 0x58, [@typed={0x8, 0x2b, @u32}, @generic="2bd7b58bd1a98cead1652df1458893f41ce9e3e7369c3285789c57d67d8d056e96808128d2ec00fe540730a969ab3c70a579332284578e30e4c85c4898076267f47ea539324be1405a3454e58d71b6203d9f2794448e68e0bdf7f96b9ee772f4b88f701bbf01b9f9f8586fa5ff041ac082d08959e00661d762dca31044c893c869039694487cfe46912aa6b4db11d75f194fa0350277bb96892e59b73291beb11096d37312c2a12b098211682adaed99cb74dbde19fe8c93324e29087e42872f264208dacedf2a2a97de73e78203d8b8ccc9b12593c63aa26d4918385c142bbe3963", @generic="7b3e815c2053b6eb1c", @generic="a07e3c385a88703e1f2acf518e4213fe7db4be251a29f85a2e15852a7b2c3fdba82dcec01502e01663fa95eaf875a6c3271dcd4ebb208ab91cf5a667bed5882b590897881ab2e3eac0f89bb71898ce892b2d1fdd7b1bc9", @typed={0x8, 0x78, @u32=0x4}, @typed={0x8, 0x10, @u32}, @typed={0x8, 0x52, @uid=r4}, @typed={0x8, 0x51, @ipv4=@remote}]}, @generic, @typed={0x8, 0x38, @pid=r5}]}, 0x4fc}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) setrlimit(0x8, &(0x7f0000000040)) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) 00:30:45 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x5d3b0400}) 00:30:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0012000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect(r0, &(0x7f0000000080)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x80) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:']) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) [ 1844.267387] overlayfs: empty lowerdir [ 1844.288375] overlayfs: empty lowerdir 00:30:45 executing program 5: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x6009, 0x1) r0 = accept$ax25(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @default}, [@remote, @bcast, @rose, @bcast, @bcast, @rose, @remote, @rose]}, &(0x7f0000000000)=0x48) fcntl$addseals(r0, 0x409, 0x4) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="8a99c6f7340d35c9ab0000000000"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) ioctl$BLKFLSBUF(r1, 0x1261, 0x0) 00:30:45 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x5e3b0400}) 00:30:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0018000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:45 executing program 4: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000240)=0xd) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000000)) ioctl$TCFLSH(r1, 0x540b, 0x2) [ 1844.323899] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1844.347845] BTRFS error (device loop2): superblock checksum mismatch [ 1844.404052] BTRFS error (device loop2): open_ctree failed 00:30:45 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x6, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0585604, &(0x7f0000000080)={0x0, 0x2, "f2e4b0fd4fbf3cae228ec202205525c79845748cf55aef0b7433551812d0272d", 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, [0x0, 0x40000000000000]}) r1 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x40) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x4) 00:30:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f001a000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:46 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x5f3b0400}) 00:30:46 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x400000009, 0x3, 0x6, 0x9, 0x0, 0xffffffffffffffff, 0x2, [], 0x0, 0xffffffffffffffff, 0x0, 0x7fff}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0xfe98) 00:30:46 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x80) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r0, 0x1, 0x800000, 0xfff3) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x0, 0x3, 0x56, 0xe15}}, 0x30) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000140)=""/153) fallocate(r0, 0x20, 0x0, 0x100000000) ioctl$TIOCSTI(r0, 0x5412, 0x1) 00:30:46 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edefc6040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0028000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1845.178756] nla_parse: 11 callbacks suppressed [ 1845.178767] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x10000000003) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000003c0)={@remote}, 0x14) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) getpgrp(r1) dup2(r0, r0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) accept4$alg(r2, 0x0, 0x0, 0x80000) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaafcaed4b9aa96b1aaaa0086dd6050a09c00080000fe80000000081fb6d53b9696e70000bbfe80fabe0000000000000000000000aa0000000000089078"], 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x8, 0x0) ioctl$TIOCGSOFTCAR(r3, 0x5419, &(0x7f0000000040)) 00:30:46 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x603b0400}) 00:30:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0048000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:46 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087705, &(0x7f0000000000)='\x00\x00\x04\x00\x00\x00\xfd\xfd\xff\xff\xa5,\xd0\xfdOp\x95\x00\xd7\xf4\xda\xa6\x1f\x8c\x82\x81\xbf\xb1\xe2G\xc3\x00\x80\x00\x00[Pu \xa8\x8b\x911\f\x8a\x15\xbb\xc7)\x06\tN\x19\xder?\xc4%\xbbS\xe8\x91\x134~\x9f=/a\x04\x01\xe8*s\x0eV\xf2B\xa9t:\x9f7\xaf\xc2\x02\\\x19:5V\x19\x9b\xa1\x05\xf9D\xff2\xf0m): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:17487635432702809553 old:/dev/loop2 new:/dev/loop5 00:30:47 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x643b0400}) [ 1846.324244] BTRFS error (device loop2): unsupported checksum algorithm 22813 00:30:47 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$unix(0x1, 0x3, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x80000001, 0x2080) getsockopt$inet6_buf(r3, 0x29, 0x0, &(0x7f0000000180)=""/142, &(0x7f0000000240)=0x8e) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f00000000c0)={0x0, 0x0, [], {0x0, @bt={0x80000000, 0x4, 0x1, 0x3, 0x1000, 0x6, 0x100000001, 0x5, 0x0, 0x4, 0xe8, 0x6, 0x2, 0x8, 0x4, 0x1}}}) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) 00:30:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0068000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1846.370489] BTRFS error (device loop2): superblock checksum mismatch [ 1846.425438] BTRFS error (device loop2): open_ctree failed [ 1846.470290] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1846.506798] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:48 executing program 5: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x2, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0x5) syz_execute_func(&(0x7f0000000000)="0f9f8a62320000dfebc441f8530bf0438021008f2808864e8479c463197915e4780000328fe9989950008f2878c38e3f37000003c4c121de0409c4e33d490623") sendmmsg(r0, &(0x7f0000000a40), 0x400000000000030, 0xeffdffff00000000) 00:30:48 executing program 4: syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2000000080003, 0xc) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x2, 0x1cb, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"/633]}, 0x2f1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00\x00\x00\xff`\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x138, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x2, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 'veth0_to_bond\x00', 'vcan0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xa8}}, @common=@dnat={'dnat\x00', 0x10, {{@link_local, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1b0) 00:30:48 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edf1c6040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:48 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x653b0400}) 00:30:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f006c000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1846.966328] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:48 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x663b0400}) 00:30:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0074000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:48 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x200000001, {0xb, @pix={0x0, 0xffffffff00000001}}}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) poll(&(0x7f0000000040)=[{r0, 0x200}, {r0, 0x80}, {r0, 0x80}, {r0, 0x10}, {r0, 0x8000}, {r0, 0x100}, {r1}, {r0, 0x221}], 0x8, 0x3f) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000540)={0x0, 0xa8, 0x1, {0xb, @sliced={0x0, [0x0, 0x1f]}}}) [ 1847.133689] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:48 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x673b0400}) [ 1847.274007] BTRFS error (device loop2): unsupported checksum algorithm 22813 00:30:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f007a000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1847.317864] BTRFS error (device loop2): superblock checksum mismatch 00:30:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x8000) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000080)='vmnet1\xab\x00') r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/528]}, 0x288) [ 1847.377880] BTRFS error (device loop2): open_ctree failed [ 1847.479512] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1847.559967] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1847.575759] xt_connbytes: cannot load conntrack support for proto=7 [ 1847.610741] xt_connbytes: Forcing CT accounting to be enabled [ 1847.658151] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1847.707391] BTRFS error (device loop2): superblock checksum mismatch 00:30:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:49 executing program 4: getuid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000100)=""/86) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000000c0)="66b8ea000f00d8eadd5484f88a00f0833600660f71d50066ba4100edb8010000000f01d90f0866b8bd008ee0b94d0200000f32360f07", 0x36}], 0xaaaaaaaaaaaabce, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:30:49 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x68000000}) 00:30:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f00f0000000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:49 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0xffffffffffffffff, 0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x40000, 0x0) setsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000040)=0x1, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") listen(r1, 0x5eb857) r4 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r5, &(0x7f0000000c00), 0x4000000000001e6, 0x0) setxattr$security_smack_entry(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f0000000180)='/dev/autofs\x00', 0xc, 0x0) 00:30:49 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edf2c6040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) [ 1847.803196] BTRFS error (device loop2): open_ctree failed [ 1847.866112] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:49 executing program 4: unshare(0x8000400) 00:30:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000030000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:49 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x683b0400}) [ 1848.121768] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1848.169492] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1848.169520] BTRFS error (device loop2): superblock checksum mismatch 00:30:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000050000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = shmget(0x3, 0x2000, 0x54000002, &(0x7f0000ffb000/0x2000)=nil) r2 = shmat(r1, &(0x7f00009ff000/0x600000)=nil, 0xffe) shmdt(r2) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x4000000000002, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 00:30:49 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x693b0400}) [ 1848.301855] BTRFS error (device loop2): open_ctree failed [ 1848.479884] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1848.551228] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1848.573804] BTRFS error (device loop2): superblock checksum mismatch [ 1848.633005] BTRFS error (device loop2): open_ctree failed 00:30:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb12001b40067d0020e2000000180000000000", 0x2e}], 0x1}, 0x0) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0x0) 00:30:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000060000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:50 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x6a3b0400}) 00:30:50 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edf3c6040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x1000}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x91Z\xaf\x14\x90\x00', 0x0) ftruncate(r3, 0x2d5d) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x8) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r4) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f00000000c0)=0x4, 0xfd88) socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r2, &(0x7f0000000080)={0x2, 0x8000000000, @local}, 0xffffff07) sendfile(r2, r3, 0x0, 0xffe4) [ 1848.713987] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 1848.734645] netlink: 'syz-executor.5': attribute type 27 has an invalid length. 00:30:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000070000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1848.776023] bridge0: port 1(bridge_slave_0) entered disabled state 00:30:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x1, 0x4) 00:30:50 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x6b3b0400}) [ 1848.883380] protocol 88fb is buggy, dev hsr_slave_0 [ 1848.889154] protocol 88fb is buggy, dev hsr_slave_1 [ 1848.894977] protocol 88fb is buggy, dev hsr_slave_0 [ 1848.900717] protocol 88fb is buggy, dev hsr_slave_1 00:30:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x8, 0x7fff, 0x400008000000001}, 0x25) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/3\x00\to\xf66\xafY\x1dc\xeb\xeaFf\aI\xd7b%\xed\x00\x00\x00\x00\xd2\x8f\x17\xdb\xd2\xa9\xfe\xd9\xd7\xceF\x8d\x01\x00\x00\x00\x00\x00\x00\x009\x00!\b\x1b\xf5`eH\xa3V>\xb4\xe9\xb9{,,\x18!\x90\xba<_)\x13\x01\x02&\x8f\xf0\xd3}\x81\xf2F\xb0\xff\xda\b(\xde$\x8f2\xaec\x99\a\xcfY\x14=/Tt\x10\xb2\xcc\xd7\xea\xf8-e\x18\x13\xbc\xa4\xd4\xf70\x02\x10J\xb1\xe7\xd9\xb1\x81)\xee\xb2}\xcc\xfd\b\x1d\x00\x00\x00\x00\x01\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000040)={r0, 0xffffffff}) sendfile(r0, r1, 0x0, 0xe6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) 00:30:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f00000a0000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1848.995544] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1849.043046] BTRFS error (device loop2): superblock checksum mismatch [ 1849.087366] BTRFS error (device loop2): open_ctree failed 00:30:50 executing program 4: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x2) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x9, &(0x7f0000000280)=[{0x200, 0x3f, 0x800, 0x7}, {0x0, 0x1, 0x1, 0xd3}, {0x20, 0x647d, 0x4, 0x5}, {0x1, 0x7, 0x0, 0x8}, {0x9e1, 0x7, 0x1}, {0x3, 0x2, 0x7ff, 0x7}, {0x8, 0x2, 0x400000000, 0xff}, {0x5f, 0xff, 0x4, 0x7}, {0x4, 0x401, 0x1, 0x81}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000400)={{0x2, 0x4e22, @broadcast}, {0x7, @random="6800ddf22b09"}, 0x8, {0x2, 0x4e24, @remote}, 'veth1\x00'}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000380), &(0x7f00000003c0)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffad}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffff26}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r2, 0x50}, 0x10) [ 1849.204605] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:51 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x6c000000}) 00:30:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000280)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x33a, 0xfffffffffffffff7, 0xd17, 0xe50}]}) write$P9_ROPEN(r1, &(0x7f0000000240)={0x46, 0x12}, 0x18) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x4) 00:30:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f000e0a0000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:51 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edf4c6040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:51 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000180)={0x0, @reserved}) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000240)={0xc, @vbi={0x7, 0x3dcd, 0x19cbfa39, 0x4f424752, [0x6, 0x4], [0x6, 0xffff], 0x1}}) 00:30:51 executing program 4: r0 = socket(0x1000000000000010, 0x80802, 0x0) write(r0, &(0x7f0000000040)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) socket$inet6_udp(0xa, 0x2, 0x0) 00:30:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f00000c0000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000280)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x33a, 0xfffffffffffffff7, 0xd17, 0xe50}]}) write$P9_ROPEN(r1, &(0x7f0000000240)={0x46, 0x12}, 0x18) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x4) 00:30:51 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x6c3b0400}) 00:30:51 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) creat(&(0x7f0000000080)='./file0\x00', 0x104) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000040)='y\x00', 0x2, 0x1) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 00:30:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f00000e0000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1849.864647] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1849.879468] BTRFS error (device loop2): superblock checksum mismatch [ 1849.891107] BTRFS error (device loop2): open_ctree failed 00:30:51 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x6d3b0400}) [ 1850.006933] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1850.101788] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1850.159679] BTRFS error (device loop2): superblock checksum mismatch [ 1850.213595] BTRFS error (device loop2): open_ctree failed 00:30:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:51 executing program 5: syz_emit_ethernet(0x371, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x0, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x202001, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e24, @empty}}}, &(0x7f0000000180)=0x84) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000001c0)={r1, 0x2, 0x6, [0xfffffffffffffff9, 0x6, 0x9, 0x5, 0x6, 0x6]}, 0x14) 00:30:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f000a0e0000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:51 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x6e3b0400}) 00:30:51 executing program 4: socket$isdn(0x22, 0x3, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0xaa002, 0x2) ioctl$TIOCNOTTY(r0, 0x5422) r1 = socket$isdn_base(0x22, 0x3, 0x0) close(r1) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) 00:30:51 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edf5c6040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:52 executing program 5: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edf4c6040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) [ 1850.569555] nla_parse: 7 callbacks suppressed [ 1850.569563] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f00006151", 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x4) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x81, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000180)={r3, @in={{0x2, 0x4e20, @multicast1}}, [0x7, 0xa1, 0x7, 0x4, 0x5, 0x3, 0x7fffffff, 0x7f, 0xff, 0x3, 0x5, 0x9, 0x81, 0x6, 0x5]}, &(0x7f0000000280)=0x100) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f00000000c0)={0x3, r2}) 00:30:52 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x6f3b0400}) 00:30:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f00000f0000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x4000000003, 0x6) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000140)={0x0, 0x6e, "514b8461a723a23922dc9c36457772bf53767c0890c0294a1872f2f89a2c73558e06a3c5de1e06585f531aa1c07e4b63c227bdd14aa269ffd5bf02226fc3581a58202caeb716703c8ba87eebe677222803fb943d448c685c03b8ff7f2c12c11e5353fe37bde0d17ea8cd5a0b78da"}, &(0x7f0000000080)=0x76) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000001c0)={r2, 0x8}, 0x8) r3 = dup(r0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r3, 0xc0045520, &(0x7f0000000040)=0x4) getsockopt$inet6_int(r1, 0x29, 0x4e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 1850.809719] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:17487635432702809553 old:/dev/loop2 new:/dev/loop5 [ 1850.835123] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1850.846512] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1850.876853] BTRFS error (device loop2): superblock checksum mismatch 00:30:52 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x703b0400}) [ 1850.948855] BTRFS error (device loop2): open_ctree failed [ 1851.085968] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1851.160788] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1851.184157] BTRFS error (device loop2): superblock checksum mismatch [ 1851.209031] BTRFS error (device loop2): open_ctree failed 00:30:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000110000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@ng={0x4, 0x0, "0dfae4b1c3d7729e389da7a662eb5a8d2574"}, 0x14, 0x2) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) read(r0, 0x0, 0x0) 00:30:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc12123c123ff89bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter6\x00') ioctl$UI_DEV_DESTROY(r1, 0x5502) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x4000, 0x0) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000000040)=0x1000) 00:30:52 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x713b0400}) 00:30:52 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edf6c6040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") [ 1851.440489] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:52 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x723b0400}) 00:30:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x10b040, 0x0) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f00000000c0)={0x2, 0x4f}) r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f00000003c0)={0x0, 0x1}) 00:30:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000120000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001240)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb0100180000000000000040000000580000008b00002010dd86c4fb35649ddabcc50f2ea5959e90b908c94584d9150dc74115379f72017d1e3a01a1da2e646cae8d841f94cf6b29c9a93efac3ec7280ca4973cb2b793fb45bdee6830d07c2000000002f83f50d8cae998ea20d6df48104d69450c366f30e124f184593559c84d7087c399c0de01a00"], 0x0, 0x8a}, 0x20) lchown(0x0, 0x0, 0x0) stat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) r1 = memfd_create(&(0x7f0000000140)='proc}GPLeth0^wlan0#:\x00', 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000380)) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffd000/0x3000)=nil) socket$netlink(0x10, 0x3, 0xe) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), &(0x7f0000001500)=0x4) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) fsetxattr$security_evm(r1, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000240)=@sha1={0x1, "d5dcfac3fc08ef5c0fded1064001631d5e442d7f"}, 0x15, 0x3) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) pwritev(r0, 0x0, 0x0, 0x0) tkill(r2, 0x20) 00:30:53 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x733b0400}) [ 1851.669532] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1851.681666] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1851.695053] BTRFS error (device loop2): superblock checksum mismatch [ 1851.745669] BTRFS error (device loop2): open_ctree failed [ 1851.893083] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:53 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x74000000}) 00:30:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000180000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:53 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edf7c6040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:53 executing program 5: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edf6c6040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") [ 1852.551997] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1852.559415] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:54 executing program 5: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x723b0400}) [ 1852.595710] BTRFS error (device loop2): superblock checksum mismatch [ 1852.631999] BTRFS error (device loop2): open_ctree failed 00:30:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f00001a0000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:54 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x743b0400}) [ 1852.789740] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1852.816120] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:54 executing program 5: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000200)='/dev/md0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) getsockname(0xffffffffffffff9c, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000000)=0x80) connect$bt_rfcomm(r1, &(0x7f0000000140)={0x1f, {0x20, 0x5, 0x3, 0x4, 0x7fff, 0x100400000000}, 0xffffffffffff7fff}, 0xa) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)=0x2) 00:30:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f00001f0000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:54 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x753b0400}) 00:30:54 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000100000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) [ 1853.075359] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:54 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x763b0400}) 00:30:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000200000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1853.460515] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1853.502129] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1853.514375] BTRFS error (device loop2): superblock checksum mismatch [ 1853.576934] BTRFS error (device loop2): open_ctree failed 00:30:55 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x773b0400}) 00:30:55 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x5, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x9208, 0xffffffffffffffff) 00:30:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000280000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:55 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x400281) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x18) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f00000000c0)={0x7b, 0x0, [0x800, 0xff, 0x1f, 0x2fb4]}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000140)={'HL\x00'}, &(0x7f0000000180)=0x1e) uselib(&(0x7f00000001c0)='./file0\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0x1, 0x7, 0x8205, 0x1, 0x9, 0x3f, 0xfffffffffffffffe, 0x3, 0x0}, &(0x7f0000000240)=0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000280)={r1, 0xb, "d0f6923c91afd29257680a"}, &(0x7f00000002c0)=0x13) userfaultfd(0x80000) sendmsg$kcm(r0, &(0x7f0000000940)={&(0x7f0000000300)=@sco={0x1f, {0x7f, 0x4, 0x3, 0xdcb, 0x80000001, 0x9}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000380)="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", 0xfa}, {&(0x7f0000000480)="488b11161d8bdca25c0226f1e5beaf83fdc1f7e8b88c544d4af747986bc923c9d8d1324e5b1fce6ed40abebce5dbc66a95cf211ffe4a1e77bec944dfeeef1623f2b815ca44220551cca02b7643aba8", 0x4f}, {&(0x7f0000000500)="5bf2e33bad45a0e34ea7eff187b50dafdeed73b64593b77ab6eb22a611ab63a8f6183d7a7ff0bd3efbf3cfa1fa031babad07693461eb2388def931e66a762f6febafe0a9e2", 0x45}, {&(0x7f0000000580)="c7ee9f654c64bf317b9d87e64cd8ffc7d3299174db81acca1ce0d9bf1900cb870909107964bfdd5ae9acbc63731f6c7abd31c7f2471300a2b4a1f5a8f28c4f5ac9bcd9ce57733b6fe37f83bfbfa574515b3620df01416e487d5dcbe5f67c4da6318bdb7754c8cf0b3a4e7ce9e633dc7bf3f80c6d64a9ab233a4636548c779191ec37d9c4bd688eceb889254a3c26dfa16051a00381de92871659479a580eceddd2808b38ecba3f9d6bd215fa1efe", 0xae}, {&(0x7f0000000640)="230356f63c717dbc900868b940a6a6ae8d73eae193fbd7f667571a35fce8305f9835e402e5ad1c1287abc8076cd4434e5088874b9e781239ca497c51f1e52daa86be714ac7375a325f31713d619baf183cf597771294eafd0ea4a239d7a55420c236f314ffb95801eaad5d576f34b1d4f8fccc778434c01336b45c682e3b554423e9cb75c14a13b65e5c63a95660b24d1d37675b3e1ff55e8b", 0x99}, {&(0x7f0000000700)="ff0671922852c3e4aaf6dbba174faa4ec59c81c9990ab407637ed577c7b44352bf8f16", 0x23}], 0x6, &(0x7f00000007c0)=[{0x108, 0x113, 0xfffffffffffff35f, "effacf3eb3db16f653d5e54f9c6b113da33b90a4411ae3aa2b44b8f4a3cbd942b60995fda081c64a445664f29c69c1cd1f37eb02eee808a2cc7ba36974d7bd4dfeb9b2dfa53ec88393d91ce40a1542cc98944b236ddf55f2c0aef3ab677ff42fc8ca6258addab7e06b6ea67937db769200342b4ff1e16d9932381568f30fba2a0c9875d5953d804c25778237c20a01c7255ce89e1e5557f0dde04951e7d9bbf3fc10b3bea822af984674a1f2f00ee9ea9df69e0e77db2d2bd850b0334c266c374814c5e3cf916df71a2092be4ecddf3fac7f04a1dd8bae0ba43e34887f14aece60328e9e27a4dc727942fe9b834e8c6faa5a0de5"}, {0x58, 0x117, 0x9, "981fffcf3350b5d9e6f36658c1885af0dc26b6ec1751b47dca98497dd8dbebc6daf97d0ae8177d89c62aae04779a171d3478d6e9963f0fc943a7103c5b6ee90ff258fbae3fca"}], 0x160}, 0x4080) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000980)={0x119770bc, 0x4, 0x7, 0x6}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000a00)={0xa7, &(0x7f00000009c0)="4062cd39b308ff8706b948138b6d170a317fd86c47323466ee58544d0fee6b1107ba3cdd2edf3b7768b1b0549946c9311a2c4e5834fb7e"}) getsockopt$nfc_llcp(r0, 0x118, 0x3, &(0x7f0000000a40), 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000a80)={0xedc}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/video35\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000b00)) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000002e80)={&(0x7f0000000b40)=@nl=@unspec, 0x80, &(0x7f0000002d00)=[{&(0x7f0000000bc0)="fddd5d26a0550bb7006168a727856a6b7440d16aadf0fb7f738bbc08ca45f59bc88f454fca0118e90c3efa5d1d485670a9db563e6ca1d8e25d58034b41ee930d5944de7959523c3699e6cd838af0f9bde4400b5b548e1afdfffe48288c86bec7059d383fb053ffbc4541ab1649daf19f47b6d7af19ca146dd84b6a94159a236ea6d85234da9bfbab89d75e17676f64fd8aa7249da5a46849d3d97ffe8e5bff13d34b540fb1a60b243c560effef93aad98a4e16f912e950ba3449449fbcb3a8870cedfc4ce063fe4200d2e5ee89a1915b36aa2fc66a7585d458526c66756fcb1989", 0xe1}, {&(0x7f0000000cc0)="8ac011e05c60af33db1b4d", 0xb}, {&(0x7f0000000d00)="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", 0x1000}, {&(0x7f0000001d00)="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", 0x1000}], 0x4, &(0x7f0000002d40)=[{0x50, 0x19d, 0x9, "c1aaeacaed93ce6651efc477d3d53d73d2f155a5509a9435b5e6279084a4d9279297c2f70bd86ee01d1788a307366d3b4f020efca705d398386f9be86208"}, {0xe0, 0x10a, 0x7, "8750a2fd6e6b77205903b78a6e23724b965bb7832532898382352e312c95849aa2bdf35ce2ab66d9a9ba691ec76a0e45f1a822cf0633d88f5f1eada609453603e4d817f911fc0c27d94a87f1f75319b3270cd1a97914625ac2f19a30c29adb6662af8db7d25e875bda95bb6300072f1b5ce6a2f2f788080eed73326b3d56940322242f5022fd0275789fd37e415f91c48fdef4c26fae8829abe906a189f0d9d7eeed9c974b8d48183d8d52126a841d5838408c86af5dbfa7b7399b12de21ede4ea4221e3b841ed10a5d7b2"}], 0x130}, 0x4000840) ioctl$KDENABIO(r0, 0x4b36) r2 = open(&(0x7f0000002ec0)='./file0\x00', 0x123000, 0x16a) bind$inet(r0, &(0x7f0000002f00)={0x2, 0x4e24, @multicast1}, 0x10) getresuid(&(0x7f0000002f40), &(0x7f0000002f80), &(0x7f0000002fc0)=0x0) r4 = getuid() setreuid(r3, r4) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) setsockopt$inet6_dccp_int(r0, 0x21, 0x4, &(0x7f0000003000)=0x6, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000003040)={'ifb0\x00', {0x2, 0x4e21, @broadcast}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000003080)={0x21, 0x3, 0x0, {0x2}}, 0x21) bind$pptp(r0, &(0x7f00000030c0)={0x18, 0x2, {0x3, @rand_addr=0x8001}}, 0x1e) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000003140)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000003280)={&(0x7f0000003100)={0x10, 0x0, 0x0, 0x1840090}, 0xc, &(0x7f0000003240)={&(0x7f0000003180)={0x94, r5, 0x710, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x64, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x10}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x1}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x3, 0x22}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x48c}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1060}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x40000}, 0x4) [ 1853.732365] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1853.830598] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:55 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x80) connect$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e24, @broadcast}}, 0x24) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f309bd070") r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vxcan1\x00', 0xf) r3 = dup2(r2, r2) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000000c0)='vegas\x00', 0x6) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0xf7) [ 1853.876219] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1853.885576] BTRFS error (device loop2): superblock checksum mismatch 00:30:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f005d350000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:55 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x783b0400}) [ 1853.943124] BTRFS error (device loop2): open_ctree failed 00:30:55 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edffff1f0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:55 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x400001, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x20001, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e00)={{{@in6=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000002f00)=0xe8) r2 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x14, 0x4, 0x4, 0x400, 0x132, r0, 0x0, [], r1, r2, 0xfffffffffffffffe, 0x7}, 0x3c) socket$kcm(0x29, 0x5, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) r3 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1ac, 0x2500) ioctl$PIO_CMAP(r3, 0x4b71, &(0x7f0000000080)={0x9, 0xff, 0x800, 0xffffffffffffffe1, 0x3, 0x3}) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1854.021796] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1854.218538] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1854.230105] BTRFS error (device loop2): superblock checksum mismatch [ 1854.251952] BTRFS error (device loop2): open_ctree failed 00:30:55 executing program 5: r0 = socket(0x40000011, 0x80007, 0x400) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x8002) ioctl$KDADDIO(r1, 0x4b34, 0x2) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@setlink={0x44, 0x13, 0x711, 0x0, 0x0, {}, [@IFLA_ADDRESS={0xc, 0x1, @remote}, @IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_PORT_SELF={0x4}]}, 0x44}}, 0x0) 00:30:55 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3, &(0x7f0000000080)=0x6, 0x8, 0x4) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000040)) 00:30:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f00003f0000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:55 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x793b0400}) 00:30:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000200)={'filter\x00', 0x7, 0x4, 0x4a8, 0x280, 0x0, 0x140, 0x3c0, 0x3c0, 0x3c0, 0x4, &(0x7f0000000040), {[{{@arp={@remote, @rand_addr=0x4, 0xffffffff, 0xff, @empty, {[0x0, 0x0, 0xff, 0xff, 0xff, 0xeac2d5626570151a]}, @mac, {[0x0, 0xff, 0xff, 0xff, 0xff]}, 0x1, 0x4, 0x1, 0x9, 0x3, 0x800, 'veth1_to_bond\x00', 'syz_tun\x00', {}, {0xff}, 0x0, 0x8}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0xf}}}, {{@arp={@loopback, @loopback, 0x0, 0xffffff00, @empty, {[0x0, 0xff, 0x0, 0xff, 0x0, 0xff]}, @empty, {[0xff, 0xff, 0x0, 0xff, 0xff]}, 0xb1e, 0x7f, 0xfffffffffffffff7, 0x7f, 0x0, 0x7, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0xff}, {0xff}, 0x0, 0x52}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, 0x3}}}, {{@arp={@remote, @empty, 0xff0000ff, 0xffffff00, @mac=@dev={[], 0x1b}, {[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, @mac=@broadcast, {[0x0, 0x0, 0xff, 0xff, 0x0, 0xff]}, 0x1f, 0xffffffffffffff81, 0x2, 0xfffffffffffffeff, 0x3, 0x8, 'batadv0\x00', 'ip6_vti0\x00', {}, {0xff}, 0x0, 0x20}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @rand_addr=0x3, @multicast1, 0x0, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f8) socket(0x11, 0x802, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0xfffffffffffffffc, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@dont_measure='dont_measure'}, {@hash='hash'}]}}) [ 1854.357870] BTRFS error (device loop2): unsupported checksum algorithm 22813 00:30:55 executing program 5: r0 = socket(0x2000000000000021, 0x2, 0x2) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000000c0)={@initdev, 0x0}, &(0x7f0000000100)=0x14) sendmmsg(r0, &(0x7f0000003580)=[{{&(0x7f0000000140)=@can={0x1d, r1}, 0x0, &(0x7f0000001200)=[{&(0x7f00000001c0)="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"}, {&(0x7f00000011c0)="ec7fe725"}], 0x0, &(0x7f0000001240)}, 0x3}], 0x40000000000023c, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x4bfc2bd7, 0x100002) 00:30:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000400000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1854.401376] BTRFS error (device loop2): superblock checksum mismatch 00:30:55 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x7a000000}) [ 1854.467742] BTRFS error (device loop2): open_ctree failed 00:30:55 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000200000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000480000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) rt_tgsigqueueinfo(0x0, 0x0, 0x8, &(0x7f0000000200)={0x2c, 0x9, 0x7}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1737, 0x0) ioctl(r0, 0xffffffffffffff00, &(0x7f0000000180)="dfbe9bae57f77eccaf978ac82ac5a4d0da") ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x1ff) ioctl$FITRIM(r1, 0xc0184908, &(0x7f00000001c0)={0xfff, 0x70c020, 0x4}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @broadcast, @multicast1}, &(0x7f0000000140)=0xfffffffffffffc47) 00:30:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) close(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000040)={0x7f, 0x4, 0x3, 0x4, 0xffff, 0x1}) [ 1854.750952] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1854.767797] BTRFS error (device loop2): superblock checksum mismatch [ 1854.826154] BTRFS error (device loop2): open_ctree failed [ 1854.969940] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1855.022676] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1855.036846] BTRFS error (device loop2): superblock checksum mismatch [ 1855.093416] BTRFS error (device loop2): open_ctree failed 00:30:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:56 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x7a3b0400}) 00:30:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f00004c0000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:56 executing program 4: syz_init_net_socket$ax25(0x3, 0x5, 0x1) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c00000009000000010000000200000000000000000a0000000000000e00000016", 0x31, 0x1400}], 0x0, 0x0) 00:30:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000001c0)={0x0, 0x201}, 0x10) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000340)="86", 0x1}], 0x1}, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x9, 0x0) setsockopt$inet6_int(r2, 0x29, 0x13, &(0x7f0000000100)=0x6, 0x4) sendmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000000c0)='U', 0x1}], 0x1}}], 0x1, 0x0) 00:30:56 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000600000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0065580000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:56 executing program 4: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000200000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:56 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x7b3b0400}) 00:30:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000100)=[{0x4000000087}, {0x80000006}]}, 0x10) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x2, 0x181002) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) recvfrom$unix(r2, &(0x7f0000000080), 0x0, 0x100, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) 00:30:56 executing program 4: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) geteuid() ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x6) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)=0x6) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000000)={0xffffffffffffff1b, 0x14, 0x100000000004002, {0x5, 0x6000000}}, 0xfffffefd) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x6, 0xcfc8, 0x6f, 0x4, 0x1b, 0x7f, 0x80, 0xf9, 0x8, 0x7, 0x0, 0xbb}) dup2(r0, r1) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$SIOCAX25OPTRT(0xffffffffffffffff, 0x89e7, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f00000001c0), &(0x7f0000000200)=0x4) [ 1855.406801] BTRFS error (device loop2): unsupported checksum algorithm 22813 00:30:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f00355d0000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1855.475234] BTRFS error (device loop2): superblock checksum mismatch [ 1855.532704] BTRFS error (device loop2): open_ctree failed [ 1855.575315] nla_parse: 6 callbacks suppressed [ 1855.575324] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1855.642717] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1855.712687] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1855.725931] BTRFS error (device loop2): superblock checksum mismatch [ 1855.769236] BTRFS error (device loop2): open_ctree failed 00:30:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:57 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x7c3b0400}) 00:30:57 executing program 4: r0 = memfd_create(&(0x7f0000000000)='+\x8b\x8a\x16\x11O\xdda\xac\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xfffffe43) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) r2 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x40000) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000140)=0xc) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x6, 0x0) getpgrp(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) openat$random(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") lseek(r0, 0x0, 0x4) fdatasync(r0) 00:30:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adcba123c123f319bd070") syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x7, 0x0, "daf2c82ef0a4a7fc37bd440c2ea6593f9e24d66405bb48bcfa18288ee8607032d55e3c40da1ab81fef5b37f7d17e608c345d496f6975ffe9d2166bb2e38910798fc7454ae92070dbaa7e5e92da221017"}, 0xd8) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80, 0x40000) openat$vsock(0xffffffffffffff9c, 0x0, 0x8fffe, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) bind$inet6(r1, &(0x7f00000002c0)={0xa, 0x40004e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0200"], 0x2) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000300)={0x1, 0x8001}, 0x8) close(r1) 00:30:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000600000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:57 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed6b6b6b0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) [ 1856.154038] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0058650000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:57 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x7d3b0400}) 00:30:57 executing program 5: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffd000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/109) clone(0x802a4502, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 00:30:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000480)='/dev/vcs#\x00', 0x100000000000000, 0x800) ioctl$VIDIOC_DBG_G_CHIP_INFO(r2, 0xc0c85666, &(0x7f00000004c0)={{0x1, @name="59c8b820110f58267a3475edec55dc6938d1dd947ef8691c7b758bcef6853799"}, "2034db8eb21d0cd51256c1ca64b9f6ac6cfabe1c9efba5b1224d3f0580b8c1c9", 0x1}) ioctl$UFFDIO_API(r1, 0xc018aa3f, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000012000/0x4000)=nil, 0x4000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cachefiles\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, r5, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9c}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffffe}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) r6 = msgget$private(0x0, 0x200) msgrcv(r6, &(0x7f0000000180)={0x0, ""/214}, 0xde, 0x0, 0x2000) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x7, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)=@ethtool_sset_info={0x4a}}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x2}) r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCGDEV(r7, 0x80045432, &(0x7f0000000440)) setns(r7, 0x2000000) close(r0) close(r1) [ 1856.315851] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1856.327696] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1856.337914] BTRFS error (device loop2): superblock checksum mismatch [ 1856.400979] BTRFS error (device loop2): open_ctree failed 00:30:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000680000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:57 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x7e3b0400}) [ 1856.492620] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1856.638861] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:30:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x19, &(0x7f0000000100)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @initdev}}}, 0x108) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000500)='/dev/hwrng\x00', 0x8800, 0x0) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000540)=0x5) r2 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x9, 0x400000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000700)=ANY=[@ANYBLOB="c500002fb5bdead8ba9ad6c94977ea2fa20b7ba5866ada73bc1fa79e422139e853773d22f210c58180ad138886391658ec24213bbe93cc61bc917e0d235e0ed51faa439cf3af59f41c069c71d9c6dd1bfa0b233de230861272632aeecac209bc46df518a", @ANYRES16=r3, @ANYBLOB="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"], 0xbc}, 0x1, 0x0, 0x0, 0x10}, 0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) quotactl(0x2, &(0x7f0000000000)='./file0\x00', r4, &(0x7f0000000080)="c544b36ae5edb3aff2c8a0d7071fbbb4fc3678113b1f97d48698e01f34bef462732ab8fdcf87908e") 00:30:58 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x7f3b0400}) 00:30:58 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edffffc00000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f00006c0000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:58 executing program 5: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed6b6b6b0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:58 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x803b0400}) [ 1857.040666] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000740000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:58 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x813b0400}) 00:30:58 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x37ed7aeebb80c464, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000340)={0x6, 0x4, 0x100000000}, 0xc) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x80, 0x7, 0x40, &(0x7f0000ffd000/0x1000)=nil, 0x8000}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)={'mangle\x00', 0x3, [{}, {}, {}]}, 0x58) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000100)={@ipv4={[], [], @broadcast}, 0x0}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x15, 0x4, 0x1, 0x9, 0x10, r0, 0x9, [], r2, r1, 0x7fffffff, 0x7fff}, 0x3c) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x3, 0x4, 0x100000001, 0x0, r0}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000eedfe8)={r3, &(0x7f0000000080), 0x0}, 0x18) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000001c0)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r4, @in6={{0xa, 0x4e23, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xd09}}, 0x20, 0x3, 0x3, 0x2}, &(0x7f0000000300)=0x98) [ 1857.268837] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1857.296367] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1857.333218] BTRFS error (device loop2): superblock checksum mismatch [ 1857.339422] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:17487635432702809553 old:/dev/loop2 new:/dev/loop5 00:30:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f00007a0000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1857.421672] BTRFS error (device loop2): open_ctree failed 00:30:58 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7, 0x74082) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x44) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x2000000000004000, 0x0) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000400)=""/4096, 0x7ffff000}], 0xa8eae47594baefb3, 0x0) [ 1857.533758] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1857.556055] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:30:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="656425a74a2ae92ca842980f05bf0f000000c4a37bf0c50241e2e9b5c422ebaabb3c00ba000003c7a4ea70db003f00000f383a9e020000002e420ff841169a8f698099005ba265aa104b26660f38091e2fdee5bebec421045f46eec421dd584243c4e10bf8d426d8f045f6196cef620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2ab440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53ffd2c4c40f9f3c6436b2aa42664d0f31c46500000ff7d29978c104c441c05983f9070bb3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") 00:30:59 executing program 4: ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f0000000040)={0x5, 0x0}) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000080)={0x3, 0x2, {0x3, 0x2, 0x9, 0x1, 0x7}}) 00:30:59 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x823b0400}) 00:30:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000810000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:59 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000100000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:30:59 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0xa, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x45}, {0x80000006}]}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0xac, "f58f032ad70ae0c981340877ab6144c31db40adf905a1939e78164c69f51c639167080e0158b485e207b07a1ff8466f3cb03a278a0a6d4967248a061aa226e19150516450076ebfcbff62fb45f403c0944195a92c00d535501d7e05055f1b859886597dde1c7ea3561fb0fe69bf0d128afc445c04f049b74e5b7208ba2ff51680885239436744d697550fe637d32d37e04d2dbb0d60c95b4a1eef8865d71830280731c998ba3b0ccc7a89045"}, &(0x7f0000000140)=0xb4) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000180)={r3, 0x9, 0x1, [0xff]}, 0xa) [ 1857.904482] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:30:59 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x833b0400}) 00:30:59 executing program 4: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000000c0)=0x800, 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x2b) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x3f, 0x0) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x81) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000001840)}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="8502706b4c220000270000000000000095000000407c60e2acafd600000000"], &(0x7f0000000080)='GPL\x00\x83\xff\x13\x0f_\xb0\x0e][dC/\xa6\xbb)p\xc5\xa6$\x1e\x8d\xef\xd6S>*\xe1\x06\xbee\\lRcI!l0\xbb\x1f\x80\xfbE\x0e\xc0\xd5\xbe', 0x3, 0x99, &(0x7f0000000100)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 00:30:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000f00000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:59 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x843b0400}) [ 1858.113883] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1858.159309] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1858.173236] BTRFS error (device loop2): superblock checksum mismatch [ 1858.215243] BTRFS error (device loop2): open_ctree failed 00:30:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000400300080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:30:59 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, 0x0, &(0x7f0000000040)) [ 1858.334860] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1858.386072] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1858.485848] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1858.507393] BTRFS error (device loop2): superblock checksum mismatch [ 1858.528681] BTRFS error (device loop2): open_ctree failed 00:31:00 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x200, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000800)={'lo\x00', 0x8}) syz_mount_image$nfs4(&(0x7f0000000140)='nfs4\x00', &(0x7f0000000180)='./file0\x00', 0x1, 0x9, &(0x7f0000000700)=[{&(0x7f00000001c0)="17cdbc8f9ded95d4ffb79b47394abdebc2030971c1ee1b0d65529f4b7f893783b2303e033674e7b8f8525b32770a83868f667f0da2114399391c95c26097bfce177c98c7ed2ccb21574b69fda2882b7012836731c5a91d1bb685de120b10033b83e2411560f665643313283968c1f4aa44d0f4081aca32e17c70a190e153237c1f4dc9bbeea9bef595f73638611e7b7e3fd76dd437de390cba33b9cbac9f5d6ae2266be3354adfbacacd27264d94226890b85eced9412d6e7e17fc", 0xbb}, {&(0x7f0000000280)="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", 0xfc, 0xcc}, {&(0x7f0000000380)="91ecb0ea7ac8bafe6e3ff0916cee1ec2e45039462415ab2f5ca9b78913b8ef00000000d3fcff94e9484dd7e0dbe800"/58, 0x3a, 0x1}, {&(0x7f00000003c0)="3125bc8c818bb47118e196bb7ebc21bf3e2ab7f1cecee9384bf37f7e5cb049fffd7e698556e4700d011c48d27377330a31fd4b07731b246160c211b34235973025d7a2842925e3f289723629617b99d0b96c1b0233bf454291485cf04bedd0fecb0f900e8db46d4e1611ba876b5b159166ac1b2dec4c6f618f1a6b88fa4dd2f468a02ac75d020baa3203d77f0e4294c9c532d5f48e4b88e7e15bb4845217eb37c7dcc839864c534ea4a586bd10f27ead69fffbfc22d72e529d7e85038851237dfc88", 0xc2, 0x3}, {&(0x7f00000004c0)="018e40ccceeb371ebc09ab8016ac1357dc8757a7d6e4a355829c30a50458f037208ab8ef5775899bdef5f6ee39a96caeb4fa8aa8290cb1de8f406260210957df55644e7228f8d0a62dde08bc4be9a81fda977f6c77cec578fc840f2dbb76cc1debc6801283cb9b80963c49371c19b0bb474aa62d13d411c2e1ed56eddf9307c5a3312bdeccdbdc581b3ddd73503bd13c13d455d1cfaddf5b7efe0be50f1685a0a4012d4e8f1ebbfdb055c124bb95f8179012c9209609be4edd9606", 0xbb, 0x9}, {&(0x7f0000000580)="73af015b7f5202e77356331cc6efcd65306023e4342838c8a6a3fcdc1aa88a6c57976420f7bd65a88e8bc7fd1269e091599b1fa6f98993b6d384ca6ef561f400c752f62a5e28b743", 0x48, 0x8}, {&(0x7f0000000600)="af3915c77ba1744a5c2869469fbc5ede8c16186e8c3d045c434066d8f17998e2266c34603c924382a0d6bfdba414c878d38aba7be1c350e39508a68a609a438f40de162d27671096bf4bf6da0ecef83f204fe8918d7af4d46aa92e1138639e0a2d7d98303b8224934f2b13e90000831fa1de907561abf256", 0x78, 0x7fff}, {&(0x7f0000000000)="3765448e0d0215a8bf6827c253b3d3ce5212f28feb0a1370ccdace47627820235ede978f1c396736aca594c89614", 0x2e, 0x1}, {&(0x7f00000006c0)="bc9ae50a2146b16fe10b4c8aa947318057f48610993a26a63926f6c6acf9f49da1443afb66e83f6d62047ab8456863eb074d743543f81513242467", 0x3b, 0x8}], 0x2004000, &(0x7f0000000880)='/dev/snd/midiC#D#\x00') inotify_init() socket$nl_crypto(0x10, 0x3, 0x15) r1 = socket$tipc(0x1e, 0x2, 0x0) fcntl$getown(r1, 0x9) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x41}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndmidi(&(0x7f0000000840)='/dev/snd/midiC#D#\x00', 0xe440, 0x1200000003) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0385720, &(0x7f0000000040)={0x0, {0x0, 0x1c9c380}}) timer_create(0x0, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000008c0)={0x7, 0x6d, 0x2}, 0x7) membarrier(0x0, 0x0) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x24) write$cgroup_int(r4, &(0x7f0000000100), 0x12) 00:31:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:31:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000400080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:00 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x853b0400}) 00:31:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000028912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x1, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f00000000c0)={0x3, 0x0, [{0xc0000001, 0x9, 0x5, 0x6, 0x1f, 0x5f, 0x9}, {0x54487acd3a38b810, 0x7fff, 0x0, 0xd79, 0x72c5, 0xe6, 0x9}, {0x80000008, 0xfffffffffffffffd, 0x2, 0x4, 0x2, 0x200000000000000, 0x101}]}) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000140), &(0x7f0000000340)=0x4) ioctl$SCSI_IOCTL_SYNC(r2, 0x4) chroot(&(0x7f0000000380)='./file0\x00') ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0100001000030200000000000000003422c7ceefeae4a30000000000000000e000000100000004000000000000000000000000000000000000000000000400035d7b1734cba23c5f83388e882e17108ff2b146135be5a125fc99f8bfc56decd2af04d728709f8e537706f40906475b1d14b4", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000010000000033000000ac14ffbb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e5f5000000000000000000000000000000000000000000002100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000000000004c001400636d616328616573290000000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/244], 0xfffffe30}}, 0x800000000004000) setsockopt$RDS_RECVERR(r2, 0x114, 0x5, &(0x7f0000000080)=0x1, 0x4) setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000200)=0x4, 0x2) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000040)={0x1e46, 0xf000}) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, &(0x7f0000000000)=0x1f, 0x2e, 0x5) 00:31:00 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000200000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:31:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x7) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') r3 = dup2(r2, r2) ioctl$PPPOEIOCSFWD(r3, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x0, @dev={[], 0x26}, 'rose0\x00'}}) 00:31:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000034000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:00 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x863b0400}) 00:31:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f00fffff000080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1858.932218] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1858.965871] BTRFS error (device loop2): superblock checksum mismatch 00:31:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x1c080, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r1, 0x10, &(0x7f0000000240)={&(0x7f0000000200)=""/38, 0x26}}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000c71000/0x1000)=nil, 0x1000, 0x0, 0x2013, r3, 0x500000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_CPUID2(r3, 0x4008ae90, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) [ 1859.053771] BTRFS error (device loop2): open_ctree failed 00:31:00 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x873b0400}) 00:31:00 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000300000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) [ 1859.308942] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1859.322076] BTRFS error (device loop2): superblock checksum mismatch [ 1859.330467] BTRFS error (device loop2): open_ctree failed [ 1859.396888] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:31:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:31:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000001080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:01 executing program 4: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x863b0400}) 00:31:01 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x113, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x800, 0x9, "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", 0x45, 0x7fff, 0x6, 0x37eb, 0x8001, 0x2, 0x7f, 0x1}, r1}}, 0x120) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000000c0), 0x4) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r4 = memfd_create(&(0x7f0000000140)='\x00\'\x00\fZ\x04P\xa3/\xcd\xefe\x9c\x15`\xad\xd9\xcd\xa2\x00\x00\x00\x00\x00\x00\x00i\xa9l\xd7n-\xc9``\xe4\xae\\=\xe3\v\'X<\xc1|\x86\xe1h\xf1\x8d\r\xa3\xf1\xb3>\x1d<#U\x84\xf4\'\xd2M\xa1\xa1v\x00mhP\a\xef\v\xd4P\x96\xec\xe7b\x95?w', 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x11, r4, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x2) tkill(r3, 0x1004000000013) 00:31:01 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x87400000}) 00:31:01 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000400000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:31:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000002080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:01 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000006, 0x1000000000000001) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x40086602, 0x0) bind$isdn_base(r0, &(0x7f0000000000)={0x22, 0x5, 0xffffffffffff6617, 0xbba9, 0x8}, 0x6) 00:31:01 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaa9e8faaaaaa9eaaaa0086dd60ec776700086c00fe80380000000000000000000080200000000000bc000000ffffe000000200000000000890780000"], 0x0) [ 1859.888907] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1859.921859] BTRFS error (device loop2): superblock checksum mismatch [ 1859.936909] BTRFS error (device loop2): open_ctree failed 00:31:01 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x883b0400}) 00:31:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000003080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:01 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0xd, &(0x7f0000000100)={0x0, 0xce, 0x0, 0x3}, 0x8) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) close(r1) [ 1860.105692] print_req_error: I/O error, dev loop2, sector 0 00:31:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="656425a74a2ae92ca842980f05bf0f000000c4a37bf0c50241e2e9b5c422ebaabb3c00ba000006c7a4ea70db003f00000f383a9e020000002e420ff841169a8f698099005ba265aa104b26660f38091e2fdee5bebec421045f46eec421dd584243c4e10bf8d426d8f045f6196cef620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2ab440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53ffd2c4c40f9f3c6436b2aa42664d0f31c46500000ff7d29978c104c441c05983f9070bb3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") 00:31:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@nat={'XatY\x00\x00\x00\x00\x00\x03\xe0\x01\x00', 0x19, 0x3, 0x3e0, [0x20001600, 0x0, 0x0, 0x200018d8, 0x20001908], 0x0, 0x0, &(0x7f0000001600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x1b, 0x0, 0x86dd, 'sit0\x00', 'erspan0\x00', 'b\x00', 'veth0_to_bond\x00', @remote, [], @broadcast, [], 0x128, 0x198, 0x1d0, [@statistic={'statistic\x00', 0x18}, @ip6={'ip6\x00', 0x50, {{@local, @dev}}}]}, [@snat={'snat\x00', 0x10, {{@dev}}}, @arpreply={'arpreply\x00', 0x10, {{@broadcast}}}]}, @arpreply={'arpreply\x00', 0x10}}, {{{0x3, 0x0, 0x0, 'vcan0\x00', 'nr0\x00', 'veth1_to_bridge\x00', 'ip6gretap0\x00', @remote, [], @remote, [], 0x70, 0xa8, 0xd8}, [@snat={'snat\x00', 0x10}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ifb0\x00', 'dummy0\x00', 'ip_vti0\x00', 'ip6tnl0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@dev}}}}]}]}, 0x458) write$binfmt_misc(r1, &(0x7f00000000c0)={'syz0', "7ff130603ac1e2ef1c96a96a7d7ac1196613367b05ff4db3f1eee0ff0f4589e5538a7b5e19410ca85dec6584d20bd50f32"}, 0x35) 00:31:01 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000010400000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:31:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000004080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:01 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x893b0400}) 00:31:01 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000001080)='/dev/dri/card#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$RTC_PLL_SET(r2, 0x40207012, &(0x7f0000000000)={0x7fffffff, 0x100000000, 0x20, 0x0, 0x8, 0x2, 0x400}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) pread64(r0, 0x0, 0x0, 0x0) r3 = gettid() r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/vcs\x00', 0x0, 0x0) dup2(r4, r0) tkill(r3, 0x15) 00:31:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000005080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:02 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) syz_init_net_socket$ax25(0x3, 0x5, 0x6) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600203f00000a00000000000000000500e50000070000001f000000000000250000000000000200010000000000000000020000627c05000500000000000a00000000000000ff170000000000000000000000000117000000000000000085a89f4cb0dc67c4a4ac55d8b422665edda979acf2450738fbf6aae94803cf17f7c57408bcca0c39cec9b8299f15b27e19b62f28e05ea1e3fddcc6e30a72240cccbed0edaea3cc023610d18f482d00f40bb0e3bf435d75cf7e6509f3b6cc0f69cdf7f9e05e1a3f4b9112fd1c3ec58371b25ee1"], 0x80}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 00:31:02 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x8a3b0400}) [ 1860.601190] x_tables: eb_tables: snat target: only valid in nat table, not XatY 00:31:02 executing program 5: getcwd(&(0x7f00000003c0)=""/80, 0x5a1) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000080)) r0 = socket(0x9, 0xf, 0x4) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x68, r1, 0x0, 0x70bd27, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0xa01, @media='eth\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8080}, 0x84) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00012db25f00fbdbdf25010000000000000009410000004c00180000000175647000"/98], 0x68}, 0x1, 0x0, 0x0, 0x20048090}, 0x1) lsetxattr$security_evm(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='security.evm\x00', &(0x7f00000004c0)=@v2={0x3, 0x2, 0x12, 0x40, 0xe, "f5f0bb4b7449093644ca44e6ddec"}, 0x18, 0x3) syz_genetlink_get_family_id$tipc2(0x0) [ 1860.701541] nla_parse: 7 callbacks suppressed [ 1860.701551] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:31:02 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000ac0)='/selinux/policy\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f00000011c0)=@generic, 0x11, &(0x7f0000002700)=[{&(0x7f0000001240)=""/75, 0x4b}], 0x5, &(0x7f00000027c0)=""/243, 0x500}}], 0x3aa, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000300)=0x1c) shutdown(r1, 0xfffffffffffffffd) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000e40), 0x4) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={&(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/241, 0xf1}, {&(0x7f0000000240)=""/141, 0xffffffffffffffac}, {0x0}], 0x3, 0x0, 0x1c0}, 0x1) [ 1860.802594] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1860.823699] BTRFS error (device loop2): superblock checksum mismatch [ 1860.843728] BTRFS error (device loop2): open_ctree failed 00:31:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000006080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1860.963409] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1860.975697] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:31:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="656425a74a2ae92ca842980f05bf0f000000c4a37bf0c50241e2e9b5c422ebaabb3c00ba000007c7a4ea70db003f00000f383a9e020000002e420ff841169a8f698099005ba265aa104b26660f38091e2fdee5bebec421045f46eec421dd584243c4e10bf8d426d8f045f6196cef620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2ab440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53ffd2c4c40f9f3c6436b2aa42664d0f31c46500000ff7d29978c104c441c05983f9070bb3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") 00:31:02 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x8b3b0400}) 00:31:02 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x21}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x110, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000004}, 0x1) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0)="69a1cf08618132c0af1e92f5ea62c17ee2a65a8ee0e1ff3693814c2deca436220fd28b28823dfcc330ccfa2f8b80d91da5be02171e878c1f1a5599a8dbba", 0x3e, r4}, 0x68) write(r1, &(0x7f0000000880), 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local}}) 00:31:02 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xff, 0x40000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x600088}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x408, 0x70bd27, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x800) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x14, r3, 0xfc698b8692517f15, 0x0, 0x0, {0x12}}, 0x14}}, 0x0) 00:31:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000007080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:02 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000500000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:31:02 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") close(r0) 00:31:02 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x8c3b0400}) [ 1861.479121] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1861.656117] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1861.680075] BTRFS error (device loop2): superblock checksum mismatch 00:31:03 executing program 5: lsetxattr(&(0x7f0000fc0000)='./file1\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB='user.u'], 0x0, 0x0, 0x3) 00:31:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000008080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:03 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x8d3b0400}) [ 1861.710478] BTRFS error (device loop2): open_ctree failed 00:31:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="340000001800010000000000000000001d01c9001800030000000000000000008e5ba56f1306ce1c020000000800050000100800"], 0x1}}, 0x0) [ 1861.837563] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1861.864105] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:31:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:31:03 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x8e3b0400}) 00:31:03 executing program 5: r0 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) r1 = dup(r0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x12, r1, 0x0) ftruncate(r0, 0x49) r2 = dup(r1) write(r2, &(0x7f0000000040), 0x1fff) 00:31:03 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='yeah\x00', 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 00:31:03 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000600000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:31:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f000000000a080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:03 executing program 5: eventfd(0x0) lseek(0xffffffffffffffff, 0x0, 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) ioctl$TCGETS(r0, 0x5401, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000180)) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000008c0)={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x1e}}, {0xa, 0x4e21, 0x4, @rand_addr="e955a8adbd66096b6f6cc65390b33319"}, 0x8001, [0x3f, 0x80000000, 0x0, 0x9, 0xd110, 0x0, 0x40, 0x3f]}, 0x5c) [ 1862.347184] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:31:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x200000000000002, 0x3, 0x100000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000040)="f214", 0x2, 0x20400c000, 0x0, 0x0) sendto$inet(r0, &(0x7f00000000c0), 0x30, 0x0, 0x0, 0x120) 00:31:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000e0a080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:03 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x8f3b0400}) 00:31:04 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/psched\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) [ 1862.625229] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1862.636145] BTRFS error (device loop2): unsupported checksum algorithm 22813 00:31:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x200000000000002, 0x3, 0x100000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000040)="f214", 0x2, 0x20400c000, 0x0, 0x0) sendto$inet(r0, &(0x7f00000000c0), 0x30, 0x0, 0x0, 0x120) [ 1862.672155] BTRFS error (device loop2): superblock checksum mismatch [ 1862.686142] BTRFS error (device loop2): open_ctree failed [ 1862.836511] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1862.899241] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1862.907743] BTRFS error (device loop2): superblock checksum mismatch [ 1862.915523] BTRFS error (device loop2): open_ctree failed 00:31:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:31:04 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xd, 0x401) clone(0x3ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f00000000c0)={0x4001080321}) 00:31:04 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x903b0400}) 00:31:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f000000000c080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text16={0x10, &(0x7f00000002c0)="66b8ff0000000f23d00f21f86635300000030f23f8b8d5000f00d8811500000f011866b8e06f00000f23d80f21f86635800000200f23f8dcd30f860900f081264000feff0f0158006766c7442400318d00006766c74424024a0000006766c744240600000000670f011c24", 0x6b}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) mq_getsetattr(r2, &(0x7f00000000c0)={0x3, 0xfffffffffffffff8, 0x0, 0x0, 0xffffffff, 0x7fff, 0x0, 0x40}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) ioctl$KVM_NMI(r2, 0xae9a) syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:31:04 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000700000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) [ 1863.205218] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1863.208118] usb usb3: usbfs: process 26992 (syz-executor.5) did not claim interface 0 before use 00:31:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x50, 0x12, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [], @multicast1}, @in6=@dev}}}, 0x50}}, 0x0) 00:31:04 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x913b0400}) [ 1863.245349] vhci_hcd: default hub control req: 2103 v0108 i0000 l0 [ 1863.248565] usb usb3: usbfs: process 27001 (syz-executor.5) did not claim interface 0 before use 00:31:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f000000000e080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1863.307986] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 00:31:04 executing program 4: r0 = socket$kcm(0x2, 0x2, 0x73) sendmsg(r0, &(0x7f0000000c80)={&(0x7f0000000000)=@generic={0x0, "95f74527d8d5dad361fcbe47f4686bc46ab34bf8ec349877405edf630fa0f3a878819c8224f4b1eba1cb42db48e74d173865d1af9c36b7f82dcc039687d94c542ae974ee42754457e44251ca9e71ef3bc68278c18e34247c382231897b27d514364b5235d76a2554b050904cd47b7bc31dc3655be6422fb1cb148ff7c60f"}, 0xf, 0x0}, 0x0) 00:31:04 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, [], [], [], 0x0, 0x0, 0x0, 0x0, "fdd664e1336e40065aec781054ee0169"}) 00:31:04 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x923b0400}) [ 1863.451169] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1863.469201] BTRFS error (device loop2): superblock checksum mismatch [ 1863.484810] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1863.526742] BTRFS error (device loop2): open_ctree failed [ 1863.626494] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:31:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:31:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f000000000f080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:05 executing program 5: 00:31:05 executing program 4: 00:31:05 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x933b0400}) 00:31:05 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000800000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:31:05 executing program 5: 00:31:05 executing program 4: [ 1864.164818] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:31:05 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x943b0400}) 00:31:05 executing program 4: 00:31:05 executing program 5: 00:31:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000010080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1864.438894] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1864.469042] BTRFS error (device loop2): superblock checksum mismatch [ 1864.545236] BTRFS error (device loop2): open_ctree failed [ 1864.647830] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:31:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="656425a74a2ae92ca842980f05bf0f000000c4a37bf0c50241e2e9b5c422ebaabb3c00ba00000bc7a4ea70db003f00000f383a9e020000002e420ff841169a8f698099005ba265aa104b26660f38091e2fdee5bebec421045f46eec421dd584243c4e10bf8d426d8f045f6196cef620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2ab440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53ffd2c4c40f9f3c6436b2aa42664d0f31c46500000ff7d29978c104c441c05983f9070bb3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") 00:31:06 executing program 4: 00:31:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000011080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:06 executing program 5: 00:31:06 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x953b0400}) 00:31:06 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000030800000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:31:06 executing program 4: 00:31:06 executing program 5: 00:31:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000012080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:06 executing program 4: 00:31:06 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x963b0400}) [ 1865.322691] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1865.354718] BTRFS error (device loop2): superblock checksum mismatch 00:31:06 executing program 5: [ 1865.392500] BTRFS error (device loop2): open_ctree failed [ 1865.507399] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:31:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="656425a74a2ae92ca842980f05bf0f000000c4a37bf0c50241e2e9b5c422ebaabb3c00ba00000cc7a4ea70db003f00000f383a9e020000002e420ff841169a8f698099005ba265aa104b26660f38091e2fdee5bebec421045f46eec421dd584243c4e10bf8d426d8f045f6196cef620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2ab440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53ffd2c4c40f9f3c6436b2aa42664d0f31c46500000ff7d29978c104c441c05983f9070bb3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") 00:31:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000018080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:07 executing program 4: 00:31:07 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x973b0400}) 00:31:07 executing program 5: 00:31:07 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000900000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:31:07 executing program 4: [ 1865.848765] nla_parse: 5 callbacks suppressed [ 1865.848775] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:31:07 executing program 5: 00:31:07 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x983b0400}) 00:31:07 executing program 4: 00:31:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f000000001a080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:07 executing program 4: [ 1866.088015] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1866.121025] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1866.160981] BTRFS error (device loop2): superblock checksum mismatch [ 1866.189794] BTRFS error (device loop2): open_ctree failed [ 1866.287647] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1866.341905] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1866.358453] BTRFS error (device loop2): superblock checksum mismatch [ 1866.413630] BTRFS error (device loop2): open_ctree failed 00:31:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:31:08 executing program 5: 00:31:08 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x993b0400}) 00:31:08 executing program 4: 00:31:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f000000001f080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:08 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000a00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:31:08 executing program 4: 00:31:08 executing program 5: [ 1866.784732] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:31:08 executing program 4: 00:31:08 executing program 5: 00:31:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000020080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:08 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x9a3b0400}) [ 1867.011042] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1867.021133] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1867.043030] BTRFS error (device loop2): superblock checksum mismatch [ 1867.061814] BTRFS error (device loop2): open_ctree failed [ 1867.210342] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1867.291076] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1867.315016] BTRFS error (device loop2): superblock checksum mismatch [ 1867.353427] BTRFS error (device loop2): open_ctree failed 00:31:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:31:09 executing program 5: 00:31:09 executing program 4: 00:31:09 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x9b3b0400}) 00:31:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000028080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:09 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000020a00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:31:09 executing program 5: 00:31:09 executing program 4: [ 1867.650431] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:31:09 executing program 5: 00:31:09 executing program 4: 00:31:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f000000003f080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:09 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x9c3b0400}) [ 1867.875310] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1867.879651] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1867.938285] BTRFS error (device loop2): superblock checksum mismatch [ 1867.991469] BTRFS error (device loop2): open_ctree failed [ 1868.098126] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1868.179692] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1868.194250] BTRFS error (device loop2): superblock checksum mismatch [ 1868.283113] BTRFS error (device loop2): open_ctree failed 00:31:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:31:09 executing program 4: 00:31:09 executing program 5: 00:31:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000040080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:09 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x9d3b0400}) 00:31:09 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed00000e0a00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:31:10 executing program 5: 00:31:10 executing program 4: [ 1868.529829] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:31:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000048080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:10 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x9e3b0400}) 00:31:10 executing program 4: 00:31:10 executing program 5: [ 1868.742544] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1868.792696] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1868.801493] BTRFS error (device loop2): superblock checksum mismatch [ 1868.845527] BTRFS error (device loop2): open_ctree failed [ 1868.982365] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:31:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:31:10 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x9f3b0400}) 00:31:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f000000004c080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:10 executing program 4: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000040)=0x1d9a41bb, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@file={0x20200, './file0/file0\x00'}, 0x10) sendto$inet6(r0, &(0x7f0000000400)="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", 0x58d, 0x0, 0x0, 0x0) 00:31:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='yeah\x00', 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 00:31:10 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000020c00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) [ 1869.382163] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:31:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f000000355d080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) ioctl(r1, 0x8912, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000880)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff6000/0x4000)=nil, &(0x7f0000ff5000/0x4000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000fd3000/0x2000)=nil, &(0x7f0000d79000/0x1000)=nil, &(0x7f00000003c0)="4a18acd88ce59dae555d4db629f9a2b600dc7748a8b2e5ed8249ffa8f4f03739da0269d17fab11e736b2", 0x2a, r0}, 0x68) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, &(0x7f0000000bc0)='TRUE', 0x4, 0x2) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$nfs4(&(0x7f00000001c0)='nfs4\x00', &(0x7f0000000240)='./file0\x00', 0xfffffffffffff3e8, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000980)="e76e48f6f6890e0b566eb6433034eeb101521a", 0x13}], 0x20b0, 0x0) pivot_root(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000380)=0x16, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/ptmx\x00', 0x0, 0x0) 00:31:10 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0xa03b0400}) [ 1869.497240] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:31:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000060080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:11 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0xa13b0400}) 00:31:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000f4dff4), 0x4d9, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x15c, 0x17, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [], @multicast1}, @in6=@dev}}, [@migrate={0x10c}]}, 0x15c}}, 0x0) [ 1869.658117] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1869.683215] BTRFS error (device loop2): superblock checksum mismatch [ 1869.702466] BTRFS error (device loop2): open_ctree failed [ 1869.820233] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1869.933404] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1869.959185] BTRFS error (device loop2): superblock checksum mismatch [ 1869.985901] BTRFS error (device loop2): open_ctree failed 00:31:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:31:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000005865080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:11 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0xc4030000}) 00:31:11 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000001000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:31:11 executing program 5: inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$alg(0x26, 0x5, 0x0) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x800) syz_execute_func(&(0x7f0000000340)="c462653dce0fbdc52ecd8080000cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ff0070e4c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 00:31:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000068080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:12 executing program 5: inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$alg(0x26, 0x5, 0x0) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x800) syz_execute_func(&(0x7f0000000340)="c462653dce0fbdc52ecd8080000cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ff0070e4c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") [ 1870.589952] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1870.619215] BTRFS error (device loop2): superblock checksum mismatch [ 1870.657374] BTRFS error (device loop2): open_ctree failed 00:31:12 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0xde020000}) 00:31:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f000000006c080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1870.728177] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:31:12 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0xe4ffffff}) 00:31:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000074080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1870.822662] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1870.846965] BTRFS error (device loop2): superblock checksum mismatch [ 1870.873633] BTRFS error (device loop2): open_ctree failed [ 1870.926701] nla_parse: 4 callbacks suppressed [ 1870.926710] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:31:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:31:12 executing program 5: inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$alg(0x26, 0x5, 0x0) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x800) syz_execute_func(&(0x7f0000000340)="c462653dce0fbdc52ecd8080000cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ff0070e4c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 00:31:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f000000007a080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:12 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0xf5ffffff}) 00:31:12 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000001200000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:31:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") [ 1871.410211] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:31:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0000000081080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:12 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0xfc000000}) 00:31:13 executing program 5: inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$alg(0x26, 0x5, 0x0) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x800) syz_execute_func(&(0x7f0000000340)="c462653dce0fbdc52ecd8080000cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ff0070e4c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") [ 1871.576360] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1871.592767] BTRFS error (device loop2): unsupported checksum algorithm 22813 00:31:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="656425a74a2ae92ca842980f05bf0f000000c4a37bf0c50241e2e9b5c422ebaabb3c00ba00000fc7a4ea70db083f00000f383a9e020000002e420ff841169a8f698099005ba265aa104b26660f38091e2fdee5bebec421045f46eec421dd584243c4e10bf8d426d8f045f6196cef620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2ab440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53ffd2c4c40f9f3c6436b2aa42664d0f31c46500000ff7d29978c104c441c05983f9070bb3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") [ 1871.653718] BTRFS error (device loop2): superblock checksum mismatch [ 1871.704871] BTRFS error (device loop2): open_ctree failed 00:31:13 executing program 5: inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$alg(0x26, 0x5, 0x0) syz_execute_func(&(0x7f0000000340)="c462653dce0fbdc52ecd8080000cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ff0070e4c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 00:31:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f00ffffa888080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1871.843539] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:31:13 executing program 5: inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$alg(0x26, 0x5, 0x0) syz_execute_func(&(0x7f0000000340)="c462653dce0fbdc52ecd8080000cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ff0070e4c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 00:31:13 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000001800000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:31:13 executing program 5: inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$alg(0x26, 0x5, 0x0) syz_execute_func(&(0x7f0000000340)="c462653dce0fbdc52ecd8080000cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ff0070e4c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 00:31:13 executing program 5: inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x800) syz_execute_func(&(0x7f0000000340)="c462653dce0fbdc52ecd8080000cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ff0070e4c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") [ 1872.212623] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1872.245036] BTRFS error (device loop2): superblock checksum mismatch 00:31:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="656425a74a2ae92ca842980f05bf0f000000c4a37bf0c50241e2e9b5c422ebaabb3c00ba00000fc7a4ea70db003f08000f383a9e020000002e420ff841169a8f698099005ba265aa104b26660f38091e2fdee5bebec421045f46eec421dd584243c4e10bf8d426d8f045f6196cef620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2ab440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53ffd2c4c40f9f3c6436b2aa42664d0f31c46500000ff7d29978c104c441c05983f9070bb3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") [ 1872.287046] BTRFS error (device loop2): open_ctree failed [ 1872.379843] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:31:13 executing program 5: inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x800) syz_execute_func(&(0x7f0000000340)="c462653dce0fbdc52ecd8080000cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ff0070e4c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 00:31:13 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000011c00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) [ 1872.784658] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1872.818168] BTRFS error (device loop2): superblock checksum mismatch [ 1872.844237] BTRFS error (device loop2): open_ctree failed [ 1872.936239] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:31:14 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0xfe800000}) 00:31:14 executing program 5: inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x800) syz_execute_func(&(0x7f0000000340)="c462653dce0fbdc52ecd8080000cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ff0070e4c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") [ 1873.326872] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1874.531996] IPVS: ftp: loaded support on port[0] = 21 [ 1874.627141] chnl_net:caif_netlink_parms(): no params data found [ 1874.657593] bridge0: port 1(bridge_slave_0) entered blocking state [ 1874.665676] bridge0: port 1(bridge_slave_0) entered disabled state [ 1874.672733] device bridge_slave_0 entered promiscuous mode [ 1874.679915] bridge0: port 2(bridge_slave_1) entered blocking state [ 1874.686470] bridge0: port 2(bridge_slave_1) entered disabled state [ 1874.694056] device bridge_slave_1 entered promiscuous mode [ 1874.744279] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1874.753613] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1874.771634] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1874.779333] team0: Port device team_slave_0 added [ 1874.837195] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1874.846916] team0: Port device team_slave_1 added [ 1874.852233] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1874.859934] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1874.915909] device hsr_slave_0 entered promiscuous mode [ 1874.963272] device hsr_slave_1 entered promiscuous mode [ 1875.044910] device bridge_slave_1 left promiscuous mode [ 1875.050463] bridge0: port 2(bridge_slave_1) entered disabled state [ 1875.083820] device bridge_slave_0 left promiscuous mode [ 1875.089409] bridge0: port 1(bridge_slave_0) entered disabled state [ 1878.345914] device hsr_slave_1 left promiscuous mode [ 1878.388276] device hsr_slave_0 left promiscuous mode [ 1878.437321] team0 (unregistering): Port device team_slave_1 removed [ 1878.451512] team0 (unregistering): Port device team_slave_0 removed [ 1878.462520] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1878.507324] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1878.607795] bond0 (unregistering): Released all slaves [ 1878.667542] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1878.674858] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1878.690028] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1878.721579] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1878.731764] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1878.744461] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1878.750853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1878.758508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1878.769086] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1878.775438] 8021q: adding VLAN 0 to HW filter on device team0 [ 1878.784752] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1878.792068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1878.800161] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1878.808347] bridge0: port 1(bridge_slave_0) entered blocking state [ 1878.814846] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1878.821949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1878.833652] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1878.841653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1878.850321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1878.858776] bridge0: port 2(bridge_slave_1) entered blocking state [ 1878.865498] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1878.875684] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1878.883257] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1878.894650] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1878.943700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1878.953997] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1878.964376] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1878.971693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1878.980664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1878.995033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1879.007715] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1879.020139] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1879.032530] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1879.042691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1879.057156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1879.068009] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1879.076139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1879.084354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1879.096208] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1879.102363] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1879.122542] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1879.136690] 8021q: adding VLAN 0 to HW filter on device batadv0 00:31:21 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000000)) 00:31:21 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000001f00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:31:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:31:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f00ffffff9e080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:21 executing program 5: inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$alg(0x26, 0x5, 0x0) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x800) syz_execute_func(&(0x7f0000000340)="c462653dce0fbdc52ecd8080000cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ff0070e4c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 00:31:21 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0xfec00000}) [ 1880.096576] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:31:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f00ffffffc3080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:21 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0xfeff0000}) [ 1880.312789] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:31:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x16) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x101, 0x2401) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000140)=0x3, 0x4) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xe848617af736ee96, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000200000000000000000800100005000000"], 0x30}}, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x6) 00:31:21 executing program 5: inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$alg(0x26, 0x5, 0x0) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x800) syz_execute_func(&(0x7f0000000340)="c462653dce0fbdc52ecd8080000cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ff0070e4c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") [ 1880.366066] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1880.428511] BTRFS error (device loop2): superblock checksum mismatch 00:31:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f00fffffff0080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1880.493745] BTRFS error (device loop2): open_ctree failed [ 1880.565630] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:31:22 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0xfeffffff}) 00:31:22 executing program 5: inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$alg(0x26, 0x5, 0x0) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x800) syz_execute_func(&(0x7f0000000340)="c462653dce0fbdc52ecd8080000cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ff0070e4c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") [ 1880.610285] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:31:22 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000002000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:31:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f00fffffff5080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:22 executing program 4: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0xfeff0000}) 00:31:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="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") 00:31:22 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0xff000000}) 00:31:22 executing program 5: inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$alg(0x26, 0x5, 0x0) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x800) syz_execute_func(&(0x7f0000000340)="c462653dce0fbdc52ecd8080000cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ff0070e4c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") [ 1880.965125] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1880.979862] BTRFS error (device loop2): superblock checksum mismatch [ 1880.990088] BTRFS error (device loop2): open_ctree failed [ 1881.059673] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1881.087648] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 00:31:22 executing program 2: lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x27a, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xa, 0x4) socket$kcm(0xa, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000440)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="56a6b42ead42e46628e68d48f7961cee93bdf171049cde18d27822be034e52a962a2542bcc08a932eadfe0f4ad40e9eaa7ceec4f8acc621a2fc04f4ce8a8f8d5518a794dc68bcff2aeb3fd635ea431a2c82b641d0c651bba83f5228b8e0fae7ece62dcb67d", 0x65, 0x5}], 0x20400c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000002200000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3", 0xde, 0x10000}], 0x0, 0x0) 00:31:22 executing program 5: inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$alg(0x26, 0x5, 0x0) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x800) syz_execute_func(&(0x7f0000000340)="c462653dce0fbdc52ecd8080000cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ff0070e4c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 00:31:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f00fffffffe080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:22 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0xffffff7f}) 00:31:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xfffffc73) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0, 0x56, &(0x7f0000000280)={&(0x7f00000001c0)={0xa}, 0x318}}, 0x0) recvmsg$kcm(r1, &(0x7f00000005c0)={0x0, 0x22d, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/225}]}, 0x0) accept4$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x80000) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 1881.425372] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 1881.433203] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1881.447296] BTRFS error (device loop2): superblock checksum mismatch [ 1881.485588] BTRFS error (device loop2): open_ctree failed 00:31:23 executing program 1: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = msgget(0x3, 0x202) msgsnd(r1, &(0x7f0000000040)={0x0, "583421f666460cb491606f64"}, 0x14, 0x800) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x400) recvfrom$netrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x1, &(0x7f0000000280)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x7f, 0xffff, 0x4, 0x2}) sendmsg(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x9, "97e3302e14d04b5b17dc30cadecf8dc1da7ccd66ddbc9b29fa58ffaf1e9340b6", 0x200, 0x80000000, 0xd1f}) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0xffffffe4}) 00:31:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610529800000001f0088a8ffff080008000400022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:31:23 executing program 5: inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$alg(0x26, 0x5, 0x0) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x800) syz_execute_func(&(0x7f0000000340)="c462653dce0fbdc52ecd8080000cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ff0070e4c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 00:31:23 executing program 4: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b700000000000000bd000000000000001f010000000000009500000000000000c14a1c8a60d34f9209c1eff4d30d414675e0795983857c5fb03df0cc682298f552b83aee3028b15283cd6e7470fb82f954a5bb65f9507d51a153de1220f903f12a194062"], &(0x7f0000003ff6)='OPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 1881.707798] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1881.711747] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1881.913782] WARNING: CPU: 0 PID: 7 at net/xfrm/xfrm_state.c:2391 xfrm_state_fini+0x218/0x280 [ 1881.922439] Kernel panic - not syncing: panic_on_warn set ... [ 1881.922439] [ 1881.929851] CPU: 0 PID: 7 Comm: kworker/u4:0 Not tainted 4.19.37 #5 [ 1881.936271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1881.945657] Workqueue: netns cleanup_net [ 1881.949741] Call Trace: [ 1881.952362] dump_stack+0x172/0x1f0 [ 1881.956012] panic+0x263/0x51d [ 1881.959224] ? __warn_printk+0xf3/0xf3 [ 1881.963146] ? xfrm_state_fini+0x218/0x280 [ 1881.967396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1881.968283] kobject: 'loop4' (000000004df2db70): kobject_uevent_env [ 1881.972944] ? __warn.cold+0x5/0x54 [ 1881.972959] ? __warn+0xe8/0x1d0 [ 1881.972974] ? xfrm_state_fini+0x218/0x280 [ 1881.972986] __warn.cold+0x20/0x54 [ 1881.972997] ? xfrm_state_fini+0x218/0x280 [ 1881.973013] report_bug+0x263/0x2b0 [ 1881.973030] do_error_trap+0x204/0x360 [ 1881.973042] ? math_error+0x340/0x340 [ 1881.973058] ? find_held_lock+0x35/0x130 [ 1881.973075] ? error_entry+0x76/0xd0 [ 1881.973090] ? trace_hardirqs_off_caller+0x65/0x220 [ 1881.973100] ? _raw_spin_unlock_bh+0x31/0x40 [ 1881.973119] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1881.987770] kobject: 'loop4' (000000004df2db70): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1881.990760] do_invalid_op+0x1b/0x20 [ 1881.990775] invalid_op+0x14/0x20 [ 1881.990800] RIP: 0010:xfrm_state_fini+0x218/0x280 [ 1882.053428] Code: 41 5e 5d c3 e8 a9 15 7c fb 0f 0b e9 09 ff ff ff e8 9d 15 7c fb 0f 0b e9 68 ff ff ff e8 91 15 7c fb 0f 0b eb c6 e8 88 15 7c fb <0f> 0b e9 52 fe ff ff e8 1c 77 b2 fb e9 75 fe ff ff e8 32 77 b2 fb [ 1882.072340] RSP: 0018:ffff8880aa21fbd0 EFLAGS: 00010293 [ 1882.077877] RAX: ffff8880aa2061c0 RBX: ffff88805f1d4140 RCX: ffffffff85ee2b19 [ 1882.085150] RDX: 0000000000000000 RSI: ffffffff85ef31f8 RDI: 0000000000000005 [ 1882.092421] RBP: ffff8880aa21fbf0 R08: ffff8880aa2061c0 R09: ffff8880aa206ab0 [ 1882.099678] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88805f1d5c80 [ 1882.106945] R13: ffff8880aa21fcc8 R14: ffffffff891b7078 R15: dffffc0000000000 [ 1882.114232] ? xfrm_state_flush+0x5a9/0x660 [ 1882.118601] ? xfrm_state_fini+0x218/0x280 [ 1882.122840] ? xfrm_policy_fini+0x2b0/0x2b0 [ 1882.127171] xfrm_net_exit+0x25/0x70 [ 1882.130889] ops_exit_list.isra.0+0xb0/0x160 [ 1882.135288] cleanup_net+0x3fb/0x960 [ 1882.139000] ? unregister_pernet_device+0x80/0x80 [ 1882.144070] ? __lock_is_held+0xb6/0x140 [ 1882.148155] process_one_work+0x98e/0x1760 [ 1882.152391] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1882.157050] ? lock_acquire+0x16f/0x3f0 [ 1882.161016] ? kasan_check_write+0x14/0x20 [ 1882.165253] ? do_raw_spin_lock+0xc8/0x240 [ 1882.169495] worker_thread+0x98/0xe40 [ 1882.173291] kthread+0x357/0x430 [ 1882.176646] ? process_one_work+0x1760/0x1760 [ 1882.181133] ? kthread_delayed_work_timer_fn+0x290/0x290 [ 1882.186589] ret_from_fork+0x3a/0x50 [ 1882.192009] Kernel Offset: disabled [ 1882.195952] Rebooting in 86400 seconds..