acad0e2684120b99b8cff3f48c90000000000000003b290feb3045aef0d6c169e331b622f20c41d8418bc4159c14025422835e81c3573af77dbaeb07913476244ffd5b5a924275cb1749289b44e97e7a73f148ae8206afe120c143749b5992e89f42ac52903971b323f60332eb7c9e89aafc50e7806000000b17f342aab5104d18e4eb69122b42f2173184c1d0fb3287c99b645f6e80e14e5d7c95a1babcc61b61bfaf421b18b9934f0f434c49684c31fddf24ed97d13fad01f3f9df06a755e34fcc50f6fe6"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbe86dd", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:28:21 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00') getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) 10:28:21 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000100), 0x8440, 0x0) 10:28:21 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) [ 697.977288][T31890] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 10:28:21 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00') getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) [ 698.030722][T31890] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 10:28:21 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) 10:28:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x268, 0xffffffff, 0x98, 0x178, 0x178, 0xffffffff, 0xffffffff, 0x248, 0x248, 0x248, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@loopback, @private, 0x0, 0x0, 'vlan0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}, {{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth1_to_bond\x00', 'gre0\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c8) 10:28:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbe86dd", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:28:22 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00') getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) 10:28:22 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @remote}], 0x1c) 10:28:22 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) 10:28:22 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) sendmsg$tipc(r0, &(0x7f0000000800)={&(0x7f0000000000)=@id, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000040)="c5", 0x1}, {&(0x7f0000000140)="8f", 0x1}], 0x2}, 0x0) 10:28:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x2, 0x0, &(0x7f0000001300)) 10:28:22 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) 10:28:22 executing program 3: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00') getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) 10:28:22 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@nat={'nat\x00', 0x19, 0x4, 0x136, [], 0x0, 0x0, &(0x7f0000000100)=[{}, {0x0, '\x00', 0x0, 0x0, 0x1, [{0x3, 0x0, 0x0, 'veth1_virt_wifi\x00', 'geneve0\x00', 'veth0_to_batadv\x00', 'veth0_macvtap\x00', @link_local, [], @dev, [], 0x6e, 0x6e, 0xa6, [], [], @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}, {0x0, '\x00', 0x1}]}, 0x1ae) 10:28:22 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000440)="ba289b1f", 0x4) 10:28:22 executing program 4: pipe(&(0x7f000000a300)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(r0, 0x0, 0x0) 10:28:22 executing program 3: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00') getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) 10:28:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbe86dd", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:28:22 executing program 5: socketpair(0x26, 0x5, 0x400, &(0x7f0000000080)) 10:28:22 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, 0x0, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) 10:28:22 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='batadv_slave_1\x00') 10:28:22 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$XDP_TX_RING(r0, 0x29, 0x30, 0x0, 0x0) 10:28:22 executing program 3: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00') getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) 10:28:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x60, r1, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x60}}, 0x0) 10:28:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x14, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 10:28:22 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, 0x0, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) 10:28:22 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00') getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) 10:28:22 executing program 4: socketpair(0x2c, 0x3, 0x1f, &(0x7f0000000180)) 10:28:22 executing program 1: socketpair(0x1e, 0x4, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000007c80)=[{{0x0, 0x0, &(0x7f0000002700)=[{&(0x7f0000000380)='E', 0x1}], 0x1}}], 0x1, 0x0) recvfrom$unix(r0, &(0x7f0000000000)=""/82, 0x52, 0x0, 0x0, 0x0) 10:28:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbe86dd", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:28:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x60, r1, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x60}}, 0x0) 10:28:23 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00') getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) 10:28:23 executing program 4: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$restrict_keyring(0x3, r3, 0x0, 0x0) add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, r0) 10:28:23 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, 0x0, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) 10:28:23 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x300582, 0x4) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x618, 0x46c, 0x59000000, 0x294, 0x0, 0x294, 0x550, 0x378, 0x378, 0x550, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x424, 0x46c, 0x52020000, {}, [@common=@inet=@hashlimit2={{0x150}, {'batadv_slave_1\x00', {0xe2, 0x0, 0x63, 0x0, 0x0, 0x1, 0x401}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa4, 0xe4}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "4e899bcb6521be210e163fb1aa9943496247275b584f1597981189c633c9"}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x674) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 10:28:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x60, r1, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x60}}, 0x0) 10:28:23 executing program 2: r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, r0, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) 10:28:23 executing program 1: set_mempolicy(0x1, 0x0, 0x0) clone(0x4c00031c, 0x0, 0x0, 0x0, 0x0) 10:28:23 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00') getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) 10:28:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:23 executing program 2: r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, r0, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) 10:28:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbe86dd", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:28:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x60, r1, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x60}}, 0x0) 10:28:23 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00') getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) [ 700.000034][T32015] loop4: detected capacity change from 0 to 267 10:28:23 executing program 1: unshare(0x200) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/mnt\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x10) setsockopt(0xffffffffffffffff, 0x84, 0x81, &(0x7f00000002c0), 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/dev_mcast\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x22082, 0x0) sendfile(r2, r1, 0x0, 0x7ffff000) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002040)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000000400)={r3, "ff7c4e904fbb0f3fcd73cb398a8a283a"}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f00000004c0)={r3, "e52147c1d3bef57b1193bbde0cc61fcc"}) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setns(r0, 0x80) syz_usb_connect$cdc_ncm(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x880) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e23, 0xfff, @mcast2, 0x3}, 0x1c) clone(0x70224100, 0x0, 0x0, 0x0, 0x0) [ 700.066257][T32015] BTRFS: device fsid 84eb0a0b-d357-4bc1-8741-9d3223c15974 devid 1 transid 7 /dev/loop4 scanned by syz-executor.4 (32015) 10:28:23 executing program 2: r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, r0, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) 10:28:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x60, 0x0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x60}}, 0x0) 10:28:23 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00') getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) [ 700.167845][T32015] BTRFS info (device loop4): allowing degraded mounts [ 700.195918][T32015] BTRFS info (device loop4): enabling auto defrag [ 700.224872][T32015] BTRFS info (device loop4): disk space caching is enabled 10:28:23 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(0x0, r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) [ 700.268951][T32015] BTRFS info (device loop4): has skinny extents 10:28:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x60, 0x0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x60}}, 0x0) 10:28:23 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00') getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) [ 700.509801][T32015] attempt to access beyond end of device [ 700.509801][T32015] loop4: rw=4096, want=2064, limit=267 [ 700.546006][T32015] BTRFS error (device loop4): failed to read chunk root [ 700.620574][T32015] BTRFS error (device loop4): open_ctree failed [ 700.797640][T32015] loop4: detected capacity change from 0 to 267 [ 700.833955][T32015] BTRFS info (device loop4): allowing degraded mounts [ 700.840943][T32015] BTRFS info (device loop4): enabling auto defrag [ 700.857442][T32015] BTRFS info (device loop4): disk space caching is enabled [ 700.868153][T32015] BTRFS info (device loop4): has skinny extents [ 700.946386][T32015] BTRFS error (device loop4): open_ctree failed 10:28:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:24 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(0x0, r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) 10:28:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbe86dd", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:28:24 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) 10:28:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x60, 0x0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x60}}, 0x0) [ 701.188705][T32148] loop4: detected capacity change from 0 to 267 10:28:24 executing program 5: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x60, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x60}}, 0x0) 10:28:24 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) 10:28:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0xa, &(0x7f0000000000), 0x4) 10:28:24 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(0x0, r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) [ 701.275324][T32148] BTRFS info (device loop4): allowing degraded mounts [ 701.284760][T32148] BTRFS info (device loop4): enabling auto defrag [ 701.309499][T32148] BTRFS info (device loop4): disk space caching is enabled [ 701.338347][T32148] BTRFS info (device loop4): has skinny extents 10:28:24 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) 10:28:24 executing program 5: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x60, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x60}}, 0x0) 10:28:24 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8992, &(0x7f0000000000)={'wg1\x00'}) [ 701.625211][T32148] attempt to access beyond end of device [ 701.625211][T32148] loop4: rw=4096, want=2064, limit=267 [ 701.664073][T32148] BTRFS error (device loop4): failed to read chunk root [ 701.881705][T32148] BTRFS error (device loop4): open_ctree failed 10:28:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:25 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, r0, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) 10:28:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000680)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="200000001e001306000000000000000007000000", @ANYBLOB='\x00'], 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 10:28:25 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00') getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x1000) 10:28:25 executing program 5: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x60, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x60}}, 0x0) 10:28:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbe86dd", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:28:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x60, r1, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x60}}, 0x0) 10:28:25 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00') getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x1000) 10:28:25 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, r0, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) [ 702.161145][T32205] loop4: detected capacity change from 0 to 267 [ 702.216501][T32205] BTRFS info (device loop4): allowing degraded mounts [ 702.234937][T32205] BTRFS info (device loop4): enabling auto defrag 10:28:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x60, r1, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x60}}, 0x0) 10:28:25 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00') getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x1000) [ 702.262282][T32205] BTRFS info (device loop4): disk space caching is enabled [ 702.297815][T32205] BTRFS info (device loop4): has skinny extents 10:28:25 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, r0, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) [ 702.566963][T32205] attempt to access beyond end of device [ 702.566963][T32205] loop4: rw=4096, want=2064, limit=267 [ 702.597555][T32205] BTRFS error (device loop4): failed to read chunk root [ 702.760972][T32205] BTRFS error (device loop4): open_ctree failed 10:28:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:26 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00') getdents64(r0, 0x0, 0x0) 10:28:26 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)) 10:28:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x60, r1, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x60}}, 0x0) 10:28:26 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) 10:28:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbe86dd", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:28:26 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00') getdents64(r0, 0x0, 0x0) [ 702.999590][T32252] loop4: detected capacity change from 0 to 267 [ 703.018620][T32252] BTRFS info (device loop4): allowing degraded mounts [ 703.058487][T32252] BTRFS info (device loop4): enabling auto defrag [ 703.079564][T32252] BTRFS info (device loop4): disk space caching is enabled [ 703.094622][T32252] BTRFS info (device loop4): has skinny extents 10:28:26 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x60, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x60}}, 0x0) 10:28:26 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x60, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x60}}, 0x0) 10:28:26 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) 10:28:26 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00') getdents64(r0, 0x0, 0x0) 10:28:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000140)={'tunl0\x00', &(0x7f00000000c0)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x4, 0x0, @local}}}}) [ 703.400152][T32252] attempt to access beyond end of device [ 703.400152][T32252] loop4: rw=4096, want=2064, limit=267 [ 703.457075][T32252] BTRFS error (device loop4): failed to read chunk root [ 703.684253][T32252] BTRFS error (device loop4): open_ctree failed 10:28:27 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:27 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) 10:28:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbe86dd", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:28:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/56, 0x38}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2400000022000143a31b06e21a05eca990"], 0x24}}, 0x0) 10:28:27 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x60, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x60}}, 0x0) 10:28:27 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_PROG_GET_FD_BY_ID(0x3, 0x0, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000100)={0x0, "221e135dde272a1bb010fd224dbe1da921dcb92612ec92072e7489054dd111a4e0aee121192823dd507c2b6c819adfed3548c81ede6e7899eed79cd6c699bac5"}, 0x48, r0) keyctl$link(0x8, r1, r0) 10:28:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, 0x0, 0x0) 10:28:27 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r1, 0x0, 0x0) [ 703.902400][T32311] loop4: detected capacity change from 0 to 267 10:28:27 executing program 1: socketpair(0x3f, 0x0, 0x0, &(0x7f0000000000)) 10:28:27 executing program 3: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f00000012c0)='rxrpc_s\x00', &(0x7f0000001300)={'syz', 0x0}, &(0x7f0000001340)='\x00', 0x0) 10:28:27 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, 0x0, 0x0) 10:28:27 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x26a602, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) 10:28:27 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r1, 0x0, 0x0) 10:28:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000028000000bfa30000000000000703000000fe3f007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000001404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095000000000000006623848adf1dd9a764ab51ae64e0ff0ca327ab62931d861531fddf01220b0071ff31f1622271d5518193e09483c5a020ff34f8c76334d8ce8205b01ddaa54d8756ad0f50f2568836077b8471b6b69819782748b376358c33c9753bfd989b1ca58949a54d5827df14feecea46a5c53e9c37251709f1061b973ef07bf7f53ce129a9ecd3b4dd15100f2b452f98526a0d8cacfb6379b4c5008652a7b4c0974486a8d203bddc62bb2d555a363adbc33b49e13fbd1757b2701acad0e2684120b99b8cff3f48c90000000000000003b290feb3045aef0d6c169e331b622f20c41d8418bc4159c14025422835e81c3573af77dbaeb07913476244ffd5b5a924275cb1749289b44e97e7a73f148ae8206afe120c143749b5992e89f42ac52903971b323f60332eb7c9e89aafc50e7806000000b17f342aab5104d18e4eb69122b42f2173184c1d0fb3287c99b645f6e80e14e5d7c95a1babcc61b61bfaf421b18b9934f0f434c49684c31fddf24ed97d13fad01f3f9df06a755e34fcc50f6fe615"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbe86dd", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:28:27 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000d40)='ns/uts\x00') 10:28:27 executing program 1: openat$ttynull(0xffffffffffffff9c, &(0x7f0000001640), 0x3, 0x0) 10:28:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, 0x0, 0x0) [ 704.231111][T32336] loop4: detected capacity change from 0 to 267 10:28:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_REGISTER_BEACONS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x6e}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) 10:28:27 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:27 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r1, 0x0, 0x0) 10:28:27 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x10) 10:28:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 10:28:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000740)={0x20, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) [ 704.488991][T32359] loop4: detected capacity change from 0 to 267 10:28:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 10:28:28 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mq_timedreceive(r0, 0x0, 0x0, 0x0, 0x0) 10:28:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000028000000bfa30000000000000703000000fe3f007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000001404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095000000000000006623848adf1dd9a764ab51ae64e0ff0ca327ab62931d861531fddf01220b0071ff31f1622271d5518193e09483c5a020ff34f8c76334d8ce8205b01ddaa54d8756ad0f50f2568836077b8471b6b69819782748b376358c33c9753bfd989b1ca58949a54d5827df14feecea46a5c53e9c37251709f1061b973ef07bf7f53ce129a9ecd3b4dd15100f2b452f98526a0d8cacfb6379b4c5008652a7b4c0974486a8d203bddc62bb2d555a363adbc33b49e13fbd1757b2701acad0e2684120b99b8cff3f48c90000000000000003b290feb3045aef0d6c169e331b622f20c41d8418bc4159c14025422835e81c3573af77dbaeb07913476244ffd5b5a924275cb1749289b44e97e7a73f148ae8206afe120c143749b5992e89f42ac52903971b323f60332eb7c9e89aafc50e7806000000b17f342aab5104d18e4eb69122b42f2173184c1d0fb3287c99b645f6e80e14e5d7c95a1babcc61b61bfaf421b18b9934f0f434c49684c31fddf24ed97d13fad01f3f9df06a755e34fcc50f6fe615"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbe86dd", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:28:28 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 10:28:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:28 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001200)={0xffffffffffffffff}) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000000), &(0x7f0000000040)=0x4) 10:28:28 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000001440), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)) r1 = syz_open_dev$sndpcmp(&(0x7f00000001c0), 0x0, 0xa2c65) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r1, 0xc1004111, &(0x7f0000000080)={0x0, [0xffff], [{}, {}, {}, {}, {0x2}, {}, {0xffffffff, 0x0, 0x0, 0x0, 0x1, 0x1}, {}, {}, {0x0, 0x0, 0x1}]}) 10:28:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 10:28:28 executing program 1: socketpair(0x10, 0x3, 0x0, &(0x7f0000001b80)) [ 704.756677][T32383] loop4: detected capacity change from 0 to 267 10:28:28 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 10:28:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 10:28:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:28 executing program 3: socketpair(0xf, 0x0, 0x0, &(0x7f0000000140)) 10:28:28 executing program 1: pipe2(0x0, 0x3000) [ 704.998892][T32403] loop4: detected capacity change from 0 to 267 10:28:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000028000000bfa30000000000000703000000fe3f007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000001404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095000000000000006623848adf1dd9a764ab51ae64e0ff0ca327ab62931d861531fddf01220b0071ff31f1622271d5518193e09483c5a020ff34f8c76334d8ce8205b01ddaa54d8756ad0f50f2568836077b8471b6b69819782748b376358c33c9753bfd989b1ca58949a54d5827df14feecea46a5c53e9c37251709f1061b973ef07bf7f53ce129a9ecd3b4dd15100f2b452f98526a0d8cacfb6379b4c5008652a7b4c0974486a8d203bddc62bb2d555a363adbc33b49e13fbd1757b2701acad0e2684120b99b8cff3f48c90000000000000003b290feb3045aef0d6c169e331b622f20c41d8418bc4159c14025422835e81c3573af77dbaeb07913476244ffd5b5a924275cb1749289b44e97e7a73f148ae8206afe120c143749b5992e89f42ac52903971b323f60332eb7c9e89aafc50e7806000000b17f342aab5104d18e4eb69122b42f2173184c1d0fb3287c99b645f6e80e14e5d7c95a1babcc61b61bfaf421b18b9934f0f434c49684c31fddf24ed97d13fad01f3f9df06a755e34fcc50f6fe615"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 10:28:28 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 10:28:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 10:28:28 executing program 3: recvmsg(0xffffffffffffffff, 0x0, 0xc0012021) 10:28:28 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000180)="bf79524b8611355de1a85ed4ada86b773ba6d10d8e48befa3958612f5f4583063c2faea2c2ab6a90911577b5f2b664299958da2a07d0c4ac5fb17e1193bd617302e2f8523dc441c6429a7b881236647f87ca56f4e61a476d853e349cd460ea4645fafa603eb001c3d6974fdc598d9cec628053537238c3146c0aae5d386d4552e54ef7f934c972590a7877566d20", 0x8e, 0xfffffffffffffffc) 10:28:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 10:28:28 executing program 3: socketpair(0x11, 0x2, 0x9, &(0x7f0000000000)) [ 705.228563][T32419] trusted_key: encrypted_key: master key parameter '' is invalid [ 705.250913][T32422] loop4: detected capacity change from 0 to 267 [ 705.262164][T32419] trusted_key: encrypted_key: master key parameter '' is invalid 10:28:28 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 10:28:28 executing program 1: syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FIONREAD(r0, 0x541b, &(0x7f00000000c0)) 10:28:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x60, 0x0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x60}}, 0x0) 10:28:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 10:28:29 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0x10, 0x0, 0x0) 10:28:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 10:28:29 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 10:28:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x60, 0x0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x60}}, 0x0) 10:28:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x60, 0x0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x60}}, 0x0) 10:28:29 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 10:28:29 executing program 1: pipe2(0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000080)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) 10:28:29 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0x4, 0x0, 0x0) 10:28:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x60, r1, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x60}}, 0x0) 10:28:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 10:28:29 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, 0x0, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) 10:28:29 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) pipe2(0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x6f002, 0x0) 10:28:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x60, r1, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x60}}, 0x0) 10:28:29 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, 0x0, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) 10:28:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x60, r1, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x60}}, 0x0) [ 706.121844][T13476] usb 2-1: new high-speed USB device number 13 using dummy_hcd [ 706.126629][T32482] loop4: detected capacity change from 0 to 259 10:28:29 executing program 3: syz_open_dev$binderN(&(0x7f0000000000), 0x0, 0x0) [ 706.223754][T32482] BTRFS error (device loop4): superblock checksum mismatch [ 706.284282][T32482] BTRFS error (device loop4): open_ctree failed [ 706.702202][T13476] usb 2-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 706.718285][T13476] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 706.727673][T13476] usb 2-1: Product: syz [ 706.739304][T13476] usb 2-1: Manufacturer: syz [ 706.744669][T13476] usb 2-1: SerialNumber: syz [ 706.812764][T13476] usb 2-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 707.501659][T13476] usb 2-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 707.704699][T13473] usb 2-1: USB disconnect, device number 13 10:28:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x38, r1, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}]}, 0x38}}, 0x0) 10:28:31 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, 0x0, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) 10:28:31 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000001440), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)) openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000001c0), 0x0, 0xa2c65) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x4148, &(0x7f0000000000)) 10:28:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbe86dd", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:28:31 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5393, &(0x7f0000000300)=ANY=[@ANYBLOB='S']) 10:28:31 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, r1, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) [ 708.285355][T32514] loop4: detected capacity change from 0 to 259 10:28:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x38, r1, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}]}, 0x38}}, 0x0) 10:28:31 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, 0x0) [ 708.353814][T32514] BTRFS error (device loop4): superblock checksum mismatch [ 708.382010][T32514] BTRFS error (device loop4): open_ctree failed 10:28:31 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d6163766c616e00040002800a000500140000000000220008000a00", @ANYRES32], 0x48}, 0x1, 0xb}, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000100)={0x1c, r1, 0x7, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x2404c010) pipe(&(0x7f0000000540)) 10:28:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x38, r1, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}]}, 0x38}}, 0x0) 10:28:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:32 executing program 3: msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000000)=""/245) 10:28:32 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, r1, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) [ 708.521827][T13476] ath9k_htc 2-1:1.0: ath9k_htc: Target is unresponsive [ 708.524472][T32534] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 708.528984][T13476] ath9k_htc: Failed to initialize the device [ 708.549728][T32534] bridge1: port 1(macvlan2) entered blocking state [ 708.564626][T32534] bridge1: port 1(macvlan2) entered disabled state [ 708.610440][T13473] usb 2-1: ath9k_htc: USB layer deinitialized [ 708.636688][T32548] loop4: detected capacity change from 0 to 259 [ 708.638125][T32534] device macvlan2 entered promiscuous mode 10:28:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x3c}}, 0x0) 10:28:32 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x9) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) [ 708.671929][T32535] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 708.715813][T32548] BTRFS error (device loop4): superblock checksum mismatch [ 708.727446][T32535] bridge1: port 2(macvlan3) entered blocking state [ 708.743017][T32548] BTRFS error (device loop4): open_ctree failed [ 708.768459][T32535] bridge1: port 2(macvlan3) entered disabled state [ 708.804317][T32535] device macvlan3 entered promiscuous mode 10:28:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbe86dd", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:28:32 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, r1, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x40}}, 0x0) 10:28:32 executing program 3: request_key(&(0x7f0000000480)='id_legacy\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000500)='raw', 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) 10:28:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {0x0, 0x0, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x3c}}, 0x0) 10:28:32 executing program 1: syz_emit_ethernet(0x42, &(0x7f0000000080)={@random="e7e62a3d0a06", @local, @val={@void}, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @empty, @local}, @dest_unreach={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfff7, 0x0, 0x0, 0x0, @loopback}}}}}}, 0x0) 10:28:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x3c}}, 0x0) 10:28:32 executing program 3: r0 = creat(&(0x7f00000009c0)='./file0\x00', 0x0) r1 = socket(0x1, 0x5, 0x0) dup3(r1, r0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, 0x0, 0x0) [ 709.026245][T32581] loop4: detected capacity change from 0 to 267 10:28:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', @ifru_flags}) 10:28:32 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x34, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}]}, 0x34}}, 0x0) [ 709.094992][T32581] BTRFS error (device loop4): superblock checksum mismatch [ 709.106894][T32581] BTRFS error (device loop4): open_ctree failed 10:28:32 executing program 5: add_key$user(&(0x7f0000000140), 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$assume_authority(0x10, 0x0) [ 709.146155][T32592] nbd: must specify a size in bytes for the device 10:28:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {0x0, 0x0, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) [ 709.298986][T32603] loop4: detected capacity change from 0 to 267 [ 709.319947][T32603] BTRFS error (device loop4): superblock checksum mismatch [ 709.331528][T32603] BTRFS error (device loop4): open_ctree failed 10:28:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbe86dd", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:28:32 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x34, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}]}, 0x34}}, 0x0) 10:28:32 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000700)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) 10:28:32 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000029c0), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 10:28:32 executing program 5: r0 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x6, 0x3f, 0x43, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x0, 0x200}, 0x10402, 0x10001, 0x7, 0x7, 0x40, 0xf4700000, 0x3, 0x0, 0x40ac}, 0x0, 0x7, 0xffffffffffffffff, 0xe) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) ptrace$setregs(0xd, r0, 0x2, &(0x7f0000000280)="825ffd87f807c7b08082bf1c34690cf22a70d1dba30fad7ce0c7e7d5dd76f90666ec6427d8d90258477615915f448347b2113f627c54457726034520d778862a2e4ece8d5f0554a41ea8445d0efae6c6") perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xff, 0x0, 0x7, 0x0, 0x0, 0xad8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x0, 0x6}, 0x8, 0x5, 0x9, 0x6, 0x5, 0xf48, 0x1, 0x0, 0x1, 0x0, 0x8}, 0x0, 0x0, r1, 0x1) creat(&(0x7f0000000300)='./bus\x00', 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$TIPC_NL_NET_GET(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[], 0x20000114}}, 0x0) recvfrom(r3, &(0x7f0000000180)=""/111, 0xffffffffffffffdc, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r4, 0x0) 10:28:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {0x0, 0x0, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:32 executing program 3: add_key$user(&(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) [ 709.500580][T32619] nbd: must specify a size in bytes for the device [ 709.504984][T32623] loop4: detected capacity change from 0 to 267 10:28:33 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) 10:28:33 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x34, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}]}, 0x34}}, 0x0) 10:28:33 executing program 3: r0 = gettid() read$FUSE(0xffffffffffffffff, &(0x7f0000000680)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x6, 0x3f, 0x43, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0xe16, 0x200}, 0x10402, 0x10001, 0x7, 0x7, 0x40, 0xf4700000, 0x3, 0x0, 0x40ac}, r1, 0x7, 0xffffffffffffffff, 0xe) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) ptrace$setregs(0xd, r0, 0x2, &(0x7f0000000280)="825ffd87f807c7b08082bf1c34690cf22a70d1dba30fad7ce0c7e7d5dd76f90666ec6427d8d90258477615915f448347b2113f627c54457726034520d778862a2e4ece8d5f0554a41ea8445d0efae6c6") creat(&(0x7f0000000300)='./bus\x00', 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$TIPC_NL_NET_GET(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[], 0x20000114}}, 0x0) recvfrom(r3, &(0x7f0000000180)=""/111, 0xffffffffffffffdc, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r4, 0x0) [ 709.549370][T32623] BTRFS error (device loop4): superblock checksum mismatch [ 709.574222][T32623] BTRFS error (device loop4): open_ctree failed 10:28:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400), 0x0, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:33 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000380), 0x8) fchmod(r0, 0x0) [ 709.683915][T32639] nbd: must specify a size in bytes for the device [ 709.781452][T32643] loop4: detected capacity change from 0 to 267 10:28:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000028000000bfa30000000000000703000000fe3f007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000001404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095000000000000006623848adf1dd9a764ab51ae64e0ff0ca327ab62931d861531fddf01220b0071ff31f1622271d5518193e09483c5a020ff34f8c76334d8ce8205b01ddaa54d8756ad0f50f2568836077b8471b6b69819782748b376358c33c9753bfd989b1ca58949a54d5827df14feecea46a5c53e9c37251709f1061b973ef07bf7f53ce129a9ecd3b4dd15100f2b452f98526a0d8cacfb6379b4c5008652a7b4c0974486a8d203bddc62bb2d555a363adbc33b49e13fbd1757b2701acad0e2684120b99b8cff3f48c90000000000000003b290feb3045aef0d6c169e331b622f20c41d8418bc4159c14025422835e81c3573af77dbaeb07913476244ffd5b5a924275cb1749289b44e97e7a73f148ae8206afe120c143749b5992e89f42ac52903971b323f60332eb7c9e89aafc50e7806000000b17f342aab5104d18e4eb69122b42f2173184c1d0fb3287c99b645f6e80e14e5d7c95a1babcc61b61bfaf421b18b9934f0f434c49684c31fddf24ed97d13fad01f3f9df06a755e34fcc50f6fe615"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 10:28:33 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x40}}, 0x0) 10:28:33 executing program 1: r0 = add_key(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="a0", 0x1, 0xfffffffffffffffb) keyctl$clear(0x7, r0) [ 709.851529][T32643] BTRFS error (device loop4): superblock checksum mismatch [ 709.872117][T32653] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 709.882033][T32643] BTRFS error (device loop4): open_ctree failed [ 709.882268][T32653] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 10:28:33 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x40}}, 0x0) [ 710.007691][T32661] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 710.031237][T32661] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 10:28:33 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 10:28:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400), 0x0, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:33 executing program 1: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000480), 0x4100, 0x0) 10:28:33 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5afc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x40}}, 0x0) 10:28:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 710.467152][T32684] loop4: detected capacity change from 0 to 267 [ 710.476306][T32683] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 710.503272][T32683] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 710.524136][T32684] BTRFS error (device loop4): superblock checksum mismatch [ 710.557947][T32684] BTRFS error (device loop4): open_ctree failed 10:28:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 10:28:34 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) 10:28:34 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='T'], 0x0) 10:28:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000028000000bfa30000000000000703000000fe3f007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000001404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095000000000000006623848adf1dd9a764ab51ae64e0ff0ca327ab62931d861531fddf01220b0071ff31f1622271d5518193e09483c5a020ff34f8c76334d8ce8205b01ddaa54d8756ad0f50f2568836077b8471b6b69819782748b376358c33c9753bfd989b1ca58949a54d5827df14feecea46a5c53e9c37251709f1061b973ef07bf7f53ce129a9ecd3b4dd15100f2b452f98526a0d8cacfb6379b4c5008652a7b4c0974486a8d203bddc62bb2d555a363adbc33b49e13fbd1757b2701acad0e2684120b99b8cff3f48c90000000000000003b290feb3045aef0d6c169e331b622f20c41d8418bc4159c14025422835e81c3573af77dbaeb07913476244ffd5b5a924275cb1749289b44e97e7a73f148ae8206afe120c143749b5992e89f42ac52903971b323f60332eb7c9e89aafc50e7806000000b17f342aab5104d18e4eb69122b42f2173184c1d0fb3287c99b645f6e80e14e5d7c95a1babcc61b61bfaf421b18b9934f0f434c49684c31fddf24ed97d13fad01f3f9df06a755e34fcc50f6fe615"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 10:28:34 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x34, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x34}}, 0x0) 10:28:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400), 0x0, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:34 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0x34) 10:28:34 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x34, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x34}}, 0x0) 10:28:34 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000080)={0x0, {{0x2, 0x0, @multicast2}}}, 0x90) 10:28:34 executing program 5: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000000)={0x0, @dev, 0x0, 0x0, 'lc\x00'}, 0xfffffe6f) [ 710.833532][T32708] loop4: detected capacity change from 0 to 267 [ 710.877772][T32708] BTRFS error (device loop4): superblock checksum mismatch [ 710.895427][T32719] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 710.916448][T32719] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 10:28:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x7}, {0x6}]}) 10:28:34 executing program 3: select(0xfffffffffffffc38, 0x0, 0x0, 0x0, &(0x7f00000001c0)) 10:28:34 executing program 5: ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) syz_open_procfs(0x0, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(0xffffffffffffffff, 0xc0286687, 0x0) r0 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) [ 710.931982][T32708] BTRFS error (device loop4): open_ctree failed 10:28:34 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x34, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x34}}, 0x0) [ 711.049130][ T26] audit: type=1326 audit(1633256914.513:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=32721 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9d7b3268d9 code=0x0 10:28:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d00000000000000100"/314, 0x13a, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) [ 711.093367][T32733] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 711.103060][T32733] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 10:28:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000028000000bfa30000000000000703000000fe3f007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000001404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095000000000000006623848adf1dd9a764ab51ae64e0ff0ca327ab62931d861531fddf01220b0071ff31f1622271d5518193e09483c5a020ff34f8c76334d8ce8205b01ddaa54d8756ad0f50f2568836077b8471b6b69819782748b376358c33c9753bfd989b1ca58949a54d5827df14feecea46a5c53e9c37251709f1061b973ef07bf7f53ce129a9ecd3b4dd15100f2b452f98526a0d8cacfb6379b4c5008652a7b4c0974486a8d203bddc62bb2d555a363adbc33b49e13fbd1757b2701acad0e2684120b99b8cff3f48c90000000000000003b290feb3045aef0d6c169e331b622f20c41d8418bc4159c14025422835e81c3573af77dbaeb07913476244ffd5b5a924275cb1749289b44e97e7a73f148ae8206afe120c143749b5992e89f42ac52903971b323f60332eb7c9e89aafc50e7806000000b17f342aab5104d18e4eb69122b42f2173184c1d0fb3287c99b645f6e80e14e5d7c95a1babcc61b61bfaf421b18b9934f0f434c49684c31fddf24ed97d13fad01f3f9df06a755e34fcc50f6fe615"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 10:28:34 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 10:28:34 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x34, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x34}}, 0x0) 10:28:34 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000240)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @broadcast}}}, 0x108) [ 711.198943][T32736] loop4: detected capacity change from 0 to 267 [ 711.214851][T32736] BTRFS error (device loop4): superblock checksum mismatch [ 711.223915][T32736] BTRFS error (device loop4): open_ctree failed 10:28:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d00000000000000100"/314, 0x13a, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:34 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r0, &(0x7f0000001740)={&(0x7f0000000000)=@in={0x2, 0x0, @empty}, 0x80, &(0x7f0000000400)=[{&(0x7f00000000c0)='h', 0x1}, {&(0x7f00000001c0)="e4", 0x1}], 0x2}, 0x0) 10:28:34 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000002080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) select(0x40, &(0x7f0000000000)={0x1f}, 0x0, 0x0, 0x0) 10:28:34 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x34, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x34}}, 0x0) 10:28:34 executing program 5: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000004540), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(r0, 0xc01064c2, &(0x7f0000000040)) [ 711.429529][T32755] loop4: detected capacity change from 0 to 267 10:28:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2544, &(0x7f0000001780)) 10:28:35 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x20}}, 0x0) [ 711.496824][T32755] BTRFS error (device loop4): superblock checksum mismatch [ 711.528537][T32755] BTRFS error (device loop4): open_ctree failed 10:28:35 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="73697a653d67306c08539ecac03d24b78d3a4ff1a2ed87cce3771e3e6d2f460c6cb6603a98a07d7b022522a48a4d11af24464d6d79e805344e94b53c28ab2a429baa1e6ab95de4966a4824155eab4d732f3576b141bc103e23cae33878b10a"]) [ 711.684496][ T309] tmpfs: Bad value for 'size' [ 711.689190][ T307] nbd: must specify at least one socket [ 711.703140][ T309] tmpfs: Bad value for 'size' 10:28:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 10:28:35 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:28:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d00000000000000100"/314, 0x13a, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:35 executing program 1: getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000003b80)) 10:28:35 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000080)={0x4, {{0x2, 0x0, @multicast2}}, 0x1, 0x1, [{{0x2, 0x0, @remote}}]}, 0x110) 10:28:35 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x20}}, 0x0) 10:28:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 10:28:35 executing program 5: syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x105002) [ 712.342824][ T332] loop4: detected capacity change from 0 to 267 10:28:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netlink\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/113, 0x71}], 0x1, 0x7fffefff, 0x0) clone3(&(0x7f0000000480)={0x4004000, &(0x7f0000000180), 0x0, 0x0, {0xa}, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x6, {r0}}, 0x58) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x887, 0x41, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x40402, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8de}, 0x0, 0xb, 0xffffffffffffffff, 0x0) 10:28:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0xa, 0xa, 0x201}, 0x14}}, 0x0) 10:28:35 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x20}}, 0x0) [ 712.455013][ T332] BTRFS error (device loop4): superblock checksum mismatch 10:28:36 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/97, 0x61) [ 712.532685][ T332] BTRFS error (device loop4): open_ctree failed 10:28:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d00000000000000100"/471, 0x1d7, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) [ 712.614419][ T352] nbd: must specify at least one socket 10:28:36 executing program 5: r0 = semget$private(0x0, 0x4, 0x0) semctl$GETVAL(r0, 0x0, 0xc, 0x0) 10:28:36 executing program 3: mq_unlink(&(0x7f0000000040)=',\x00') 10:28:36 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x2c}}, 0x0) [ 712.772070][ T359] loop4: detected capacity change from 0 to 267 10:28:36 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$sock_timeval(r0, 0x1, 0x2f, &(0x7f00000000c0), 0x10) 10:28:36 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x4}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x24}}, 0x0) [ 712.829756][ T359] BTRFS error (device loop4): superblock checksum mismatch [ 712.869314][ T359] BTRFS error (device loop4): open_ctree failed 10:28:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x7, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 10:28:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netlink\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/113, 0x71}], 0x1, 0x7fffefff, 0x0) clone3(&(0x7f0000000480)={0x4004000, &(0x7f0000000180), 0x0, 0x0, {0xa}, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x6, {r0}}, 0x58) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x887, 0x41, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x40402, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8de}, 0x0, 0xb, 0xffffffffffffffff, 0x0) 10:28:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 10:28:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d00000000000000100"/471, 0x1d7, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:36 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x2, 0x12, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@mcast2, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x68}}, 0x0) 10:28:36 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$sock_timeval(r0, 0x1, 0xd, &(0x7f00000000c0), 0x10) 10:28:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_NLBUFSIZ={0x8}]}, 0x24}}, 0x0) [ 713.110179][ T392] loop4: detected capacity change from 0 to 267 10:28:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELOBJ={0x34, 0x14, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_OBJ_TYPE={0x8}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc}]}], {0x14}}, 0x5c}}, 0x0) 10:28:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000002580)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x10000, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002240)={&(0x7f0000002840)={0x14, 0x1, 0x4, 0x101}, 0x14}}, 0x0) [ 713.173301][ T392] BTRFS error (device loop4): superblock checksum mismatch [ 713.196535][ T392] BTRFS error (device loop4): open_ctree failed 10:28:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_NLBUFSIZ={0x8}]}, 0x24}}, 0x0) 10:28:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d00000000000000100"/471, 0x1d7, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:36 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)={0x2, 0x6, 0x80, 0x0, 0x2, 0x0, 0x70bd2a}, 0x10}}, 0x0) [ 713.387736][ T422] loop4: detected capacity change from 0 to 267 [ 713.416357][ T422] BTRFS error (device loop4): superblock checksum mismatch [ 713.439502][ T422] BTRFS error (device loop4): open_ctree failed 10:28:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x7, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 10:28:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000b80)={0x20, 0x7, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 10:28:37 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000000100)="85eaae4f6d473db9797b43ef9df6aa8c", 0x10) 10:28:37 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x7, 0x29, 0x0, 0x0) 10:28:37 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100), r0) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0x1}, 0x14}}, 0x0) 10:28:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050", 0x226, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:37 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$sock_timeval(r0, 0x1, 0x24, &(0x7f00000000c0), 0x10) [ 713.801607][ T463] loop4: detected capacity change from 0 to 267 [ 713.829434][ T463] BTRFS error (device loop4): superblock checksum mismatch [ 713.845460][ T470] nbd: must specify a device to reconfigure 10:28:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000007000)={0x0, 0x0, &(0x7f0000006fc0)={&(0x7f0000006ec0)={0x14, r1, 0x1}, 0x14}}, 0x0) 10:28:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000540)={{0x14}, [@NFT_MSG_NEWSET={0x11c, 0x9, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_SET_USERDATA={0x105, 0xd, 0x1, 0x0, "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"}]}, @NFT_MSG_NEWCHAIN={0x20, 0x3, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x164}}, 0x0) 10:28:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELOBJ={0x34, 0x14, 0xa, 0x101, 0x0, 0x0, {0xa}, [@NFTA_OBJ_TYPE={0x8}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc}]}, @NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x301, 0x0, 0x0, {0x1}}], {0x14}}, 0x70}}, 0x0) [ 713.855569][ T463] BTRFS error (device loop4): open_ctree failed [ 713.885849][ T472] nbd: must specify a device to reconfigure 10:28:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x2, 0x2, 0x3}, 0x14}}, 0x0) 10:28:37 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x20000000260) 10:28:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x7, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 10:28:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000540)={{0x14}, [@NFT_MSG_NEWSET={0x11c, 0x9, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_SET_USERDATA={0x105, 0xd, 0x1, 0x0, "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"}]}, @NFT_MSG_NEWCHAIN={0x20, 0x3, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x164}}, 0x0) 10:28:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050", 0x226, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}, 0x62d8d56b}], 0x1, 0x484c) 10:28:37 executing program 2: sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, 0x0, 0x0) getuid() syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 10:28:37 executing program 1: syz_open_dev$dri(&(0x7f0000000740), 0x9, 0x0) 10:28:37 executing program 5: syz_genetlink_get_family_id$mptcp(&(0x7f0000000140), 0xffffffffffffffff) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000280), 0x440, 0x0) [ 714.166918][ T498] loop4: detected capacity change from 0 to 267 10:28:37 executing program 3: syz_genetlink_get_family_id$batadv(&(0x7f0000000100), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000900)='/sys/class/ata_port', 0x0, 0x40) [ 714.224504][ T498] BTRFS error (device loop4): superblock checksum mismatch 10:28:37 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect(r0, &(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) getsockname(r0, 0x0, &(0x7f0000000100)) 10:28:37 executing program 1: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @remote}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) pipe(&(0x7f0000000440)) [ 714.266674][ T498] BTRFS error (device loop4): open_ctree failed 10:28:37 executing program 3: ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000000)) io_setup(0x67f0, &(0x7f0000001100)) 10:28:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000004c40)={&(0x7f0000004b40)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000004c00)={&(0x7f0000004bc0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 10:28:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xb, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9b", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 10:28:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050", 0x226, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:37 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0) utimes(&(0x7f0000000200)='./file0\x00', 0x0) 10:28:37 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f0000000bc0), 0x121001, 0x0) 10:28:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat$null(r0, &(0x7f0000000140)='./file0\x00', 0x40, 0x103) 10:28:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, &(0x7f0000000000)) io_setup(0x67f0, &(0x7f0000001100)) 10:28:38 executing program 2: syz_mount_image$fuse(&(0x7f0000004600), &(0x7f0000004640)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@blksize}]}}) [ 714.552285][ T532] loop4: detected capacity change from 0 to 267 10:28:38 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f00000036c0)) 10:28:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) poll(0x0, 0x0, 0x0) ppoll(&(0x7f0000000180)=[{}, {}, {r2, 0x1}], 0x3, &(0x7f00000001c0)={0x9}, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r2, 0x0) readv(r0, &(0x7f0000002940)=[{&(0x7f0000000240)=""/101, 0x65}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8) shutdown(r3, 0x0) [ 714.624863][ T532] BTRFS error (device loop4): superblock checksum mismatch [ 714.649816][ T532] BTRFS error (device loop4): open_ctree failed [ 714.709113][ T546] fuse: Bad value for 'fd' 10:28:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400", 0x24d, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) [ 714.756321][ T546] fuse: Bad value for 'fd' 10:28:38 executing program 3: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0xfffffffc, {{0xa, 0x4e21, 0x0, @remote, 0x4}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000c40), 0xffffffffffffffff) 10:28:38 executing program 1: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x40000400000002c2, 0x0) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) listen(r1, 0x0) close(r0) accept(r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x0) [ 714.867824][ T557] loop4: detected capacity change from 0 to 267 [ 714.906538][ T557] BTRFS error (device loop4): superblock checksum mismatch [ 714.928657][ T557] BTRFS error (device loop4): open_ctree failed 10:28:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xb, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9b", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 10:28:38 executing program 2: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @remote}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) pipe(&(0x7f0000000440)) syz_genetlink_get_family_id$nbd(&(0x7f0000000c40), 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:28:38 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)=@xdp, 0x80) 10:28:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000040)=@ipx={0x4, 0x0, 0x0, "9d6c5a1ec451"}, 0x80) 10:28:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400", 0x24d, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000004200)={0x0, 0x0, &(0x7f0000004040)=[{&(0x7f0000003b80)=""/248, 0xf8}], 0x1}, 0x0) [ 715.139751][ T587] loop4: detected capacity change from 0 to 267 [ 715.171010][ T587] BTRFS error (device loop4): superblock checksum mismatch [ 715.179437][ T587] BTRFS error (device loop4): open_ctree failed 10:28:38 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname(r0, 0x0, &(0x7f0000000100)) 10:28:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f0000000000)) 10:28:39 executing program 5: pipe(&(0x7f0000000280)={0xffffffffffffffff}) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) 10:28:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400", 0x24d, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:39 executing program 2: socket(0x10, 0x2, 0x30) 10:28:39 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) recvmmsg$unix(r0, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000140, 0x0) 10:28:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xb, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9b", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 10:28:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:28:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x8041, 0x0, 0x0) [ 715.815508][ T620] loop4: detected capacity change from 0 to 267 10:28:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000004200)={0x0, 0x0, &(0x7f0000004040)=[{&(0x7f0000003b80)=""/248, 0xf8}], 0x1}, 0x40) [ 715.865944][ T620] BTRFS error (device loop4): superblock checksum mismatch [ 715.901465][ T620] BTRFS error (device loop4): open_ctree failed 10:28:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000", 0x261, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:39 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x22000, 0x0) 10:28:39 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/devices/system', 0x0, 0x0) ioctl$TIOCEXCL(r0, 0x540c) 10:28:39 executing program 5: r0 = msgget(0x3, 0x0) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) 10:28:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000", 0x261, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:39 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000001040), 0x80000, 0x0) 10:28:39 executing program 1: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) [ 716.250917][ T645] loop4: detected capacity change from 0 to 267 10:28:39 executing program 3: shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffd000/0x3000)=nil) [ 716.297115][ T645] BTRFS error (device loop4): superblock checksum mismatch [ 716.356278][ T645] BTRFS error (device loop4): open_ctree failed 10:28:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000028000000bfa30000000000000703000000fe3f007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000001404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095000000000000006623848adf1dd9a764ab51ae64e0ff0ca327ab62931d861531fddf01220b0071ff31f1622271d5518193e09483c5a020ff34f8c76334d8ce8205b01ddaa54d8756ad0f50f2568836077b8471b6b69819782748b376358c33c9753bfd989b1ca58949a54d5827df14feecea46a5c53e9c37251709f1061b973ef07bf7f53ce129a9ecd3b4dd15100f2b452f98526a0d8cacfb6379b4c5008652a7b4c0974486a8d203bddc62bb2d555a363adbc33b49e13fbd1757b2701acad0e2684120b99b8cff3f48c90000000000000003b290feb3045aef0d6c169e331b622f20c41d8418bc4159c14025422835e81c3573af77dbaeb07913476244ffd5b5a924275cb1749289b44e97e7a73f148ae8206afe120c143749b5992e89f42ac52903971b323f60332eb7c9e89aafc50e7806000000b17f342aab5104d18e4eb69122b42f2173184c1d0fb3287c99b645f6e80e14e5d7c95a1babcc61b61bfaf421b18b9934f0f434c49684c31fddf24ed97d13fad01f3f9df06a755e34fcc50f6fe615"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xd, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbe86", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 10:28:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000", 0x261, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80901b00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x25, 0xfd8b}, 0x35) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x3}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x2a) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x40, &(0x7f0000000040)) 10:28:40 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) bind(r0, 0x0, 0x0) 10:28:40 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCEXCL(r0, 0x5450) 10:28:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r1, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4800000024000705000000000000100000001f00", @ANYRES32=r2, @ANYBLOB="00000400f1ffffff"], 0x48}}, 0x0) 10:28:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xd, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbe86", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 716.918612][ T677] __nla_validate_parse: 5 callbacks suppressed [ 716.918628][ T677] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. [ 716.945503][ T678] loop4: detected capacity change from 0 to 267 10:28:40 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) inotify_init() socket$inet6_udp(0xa, 0x2, 0x0) select(0x40, &(0x7f0000000040)={0xc0}, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x2710}) 10:28:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20004091, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmmsg$sock(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000740)="fa", 0x1}], 0x1}}], 0x1, 0x0) r1 = dup2(r0, r0) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=@getneigh={0x14, 0x1e, 0xe93822cd98103cf2, 0x70bd2c, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x20004804}, 0x1) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000010540)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000340)}, {0x0}, {&(0x7f00000008c0)}, {&(0x7f00000009c0)="c6ae5df88130a5b3c3ed79ccf2f92dd9267b9848926a016971abec7b6f205bd513b4b14399dc07618924f98b7abc5f0de13ff09c9876a333578f078ace252c6f073338b8b49efce50359aa9b02ba23a4f6906e07e2e0de8c3222a97cc79f253a2119673a3dd1bdaff03a1ff0382a2148304bc9d3de8ed30d9f1b0b0726b588eba20c91e31c", 0x85}, {&(0x7f0000000100)="c9852a8a636b81b04b00cecc", 0xc}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f0000000240)="9b17e6284febffd7c37947f7989de4ef6750102e7f97bc692aac2de98ab72207366766a546ffd2960d3729c35ba4f72395a998d9229ff7244d5499cbe99c886a1d9723af264c715778a50ebd6f23a4790934848ef1e71b7d099832d0ee996ca772ad1cc4421a26a28ffe65c752dff5d2286bdf4f25080018e77d1a565a443115241a83fced147ceb252a0c3ec8708db199ae95088edd807531f2c51e0620c5e668bf5f1f6b48f09a9d67900e1b02f21b31d03eb3888aafe704875ecdb0be5cfe85c37837cc0661613266394a071492785b37da3a227b10946e954acdee9fabacef1eda819380310eaf8f85a20d4417c36e3c", 0xffffffffffffffc8, 0xfecc, 0x0, 0x0) 10:28:40 executing program 5: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x7, &(0x7f00000001c0), 0x0) eventfd2(0x0, 0x0) [ 717.001030][ T678] BTRFS error (device loop4): superblock checksum mismatch [ 717.014958][ T686] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. [ 717.036473][ T678] BTRFS error (device loop4): open_ctree failed 10:28:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r1, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4800000024000705000000000000100000001f00", @ANYRES32=r2, @ANYBLOB="00000400f1ffffff"], 0x48}}, 0x0) 10:28:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000", 0x26b, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:40 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000000c0)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @local}, 'sit0\x00'}) 10:28:40 executing program 1: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) bind$phonet(r0, &(0x7f0000000080), 0x10) 10:28:40 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x20}) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) bpf$ENABLE_STATS(0x20, 0x0, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x9) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0xd8}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) 10:28:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @dev}, @in6={0xa, 0x0, 0x0, @private1}, @in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, @in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x70) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="48040000", @ANYRES16=r3, @ANYBLOB="010000000000000004003b1c210008000300", @ANYRES32=r2, @ANYBLOB="2c0433005000de295b3acba512e4080211000001505050505050"], 0x448}}, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x28011, r0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) bind$alg(0xffffffffffffffff, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(morus1280-avx2)\x00'}, 0x58) sendfile(r5, r4, 0x0, 0x10000a006) [ 717.261191][ T701] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. [ 717.265481][ T704] loop4: detected capacity change from 0 to 267 [ 717.340554][ T704] BTRFS error (device loop4): superblock checksum mismatch [ 717.349732][ T704] BTRFS error (device loop4): open_ctree failed 10:28:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r1, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4800000024000705000000000000100000001f00", @ANYRES32=r2, @ANYBLOB="00000400f1ffffff"], 0x48}}, 0x0) 10:28:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000", 0x26b, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) [ 717.506342][ T724] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. 10:28:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xd, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbe86", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 10:28:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000003bc0)={0x0, 0x0, &(0x7f0000003b40)=[{&(0x7f0000000100)={0x8c, 0x0, 0x0, 0x0, 0x25dfdbfc, "", [@generic="feb2de992b5dea5355272255edf461c841933fd551070afaad1c2f846337eebf3e534852356bd9873bfcbbaeb67a99048fc6a4e041d5ed49af6c642068886db6a9fc0e5eaf300af9afdee7e12f057db246aad02355f15e4b9bf62bf263afe5883dec82a657e04b6f0f6c941187e67f7b81eb015985ecd5aaa6"]}, 0x8c}, {&(0x7f0000003c00)={0x590, 0x0, 0x0, 0x0, 0x0, "", [@generic="2ec5bdde1bfc736752074322fc731b5a7bdbcf32a0def839c57a42f41e3390845080d51e1991bf7671b953e22a4512a91c4f6c81c3a5ff71bcd2f9870eace1c07c452ed242eb22f66f3618019cac3042d74d74dea4a020f72d72ebbbd2780766cb68cff56010780f788059cac0396adf3058428d84e740f83a711359df664f8441cd0d33b7c99fed28a562ff600a046fe4ac8a652a6f23813883e38dc0e6f82e87f8209fcb01dd63852df5afcb93624e82c07ff87b67dddc16c674a3fc7e208830833d359c9c11c96512857d7c33800084ef014db6ab21cd6be37b9f1dad87ce50298931192953ae8e7e8db59eb5029cd8eb", @nested={0x265, 0x0, 0x0, 0x1, [@typed={0x46, 0x0, 0x0, 0x0, @binary="cf5180149b9566d0c119a956bef547e2bc7b18222c970ba68312914e2f830cb8337e10b56eee6442dff71c71be321105b69b8e7539c9cea0c491d6f03ec0a5eff14f"}, @generic="14065f5e4d7ef0269daad925f75adb42ddacf7db5ee5436ebb8c90ee9659d856b42e92738153fb6f2e32e621e68f57b57dab71a9b7eeef987d5e13b932a773fba235afe56bcd2ae2f4a4f21f668f49fc38b1f278515b58a19eb69773b2cc3c9f7ad177f444376a7bd6e4cc98ebc450214942d2f11fef54b7911b5a472c3a548ae153377888b27b2ceb6fb2c9", @typed={0x91, 0x0, 0x0, 0x0, @binary="dc0bb4fff9be148a3aaf915bdac0993cb6533b507ed5845d16de814111350dd4e07574d82acd732c667838888778b71875748117173f6ba3c07ca2a404661157ea4c66f9e0e732c988d3488fa8236d53deaf664edbacfac8f83530ea10791ebf81fe4583e9bfe81dd36130511ca93f795ada9919b0772193e7c75dd0074914220c93e55e39ac66a133363f992e"}, @typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="71b70f203400e87591a312c307a785d8acaefdeece857835b0b3b4427fb6d4891fd7663c2eb2a32c684d7d60de65c0c3a5df2fe0a62716d96365cedb013ff2747dfb653580c79021c0842cba207836533c00faa6b4c7dc9b70b1189f8ca7afb65a5af881d8a7e46c8d9f06ec3c13a2b67234495aa17b41470ead3562b6b06f0e6720a81929ac0c265c8e88a76959f888873ba1365610b7e31e46deda093a92244099a8b6eb846a732041066a72328e1662fb64848dce160e0ff8cd0207f740e203d097ebd1", @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x4}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@empty}]}, @generic="3d49e92d19f7be0995847cc83d2202d56b2446a233d406573af5f96b420c5239b6f77f62085a2e590938260aa16f99125d4035101417164e8a3b669fe3841a632d88254aea901460c1f08d322d20b31b75311a4f3171b231dc1b80", @nested={0xc5, 0x0, 0x0, 0x1, [@generic="41635363ab101bbcedfbfab790447f896ffc4e7c3279e71eabbcea5a7f8c9ebe17c0701c17b7691fb7a470600155d56f7c49fbd8afe6d2822dba7e6bb54948763b0d8d3913690b0ffc2f64d9cb6320c81008e621936e5b084063cccb732b2d68786a5ea161d1dea0b36965cb1f9358b056746573bc3dfa8fa0e403ddc165eb513b7a4d5af9301aa315db8ac5044868c99a08336f6d3d9e1c9c90c3d7d9afc47f36da1cd22b9d9507e3356989f91ad5218f", @typed={0x8, 0x0, 0x0, 0x0, @uid=0xee00}, @typed={0x8, 0x0, 0x0, 0x0, @fd}]}, @generic="4d4283c6bf39e3b96db606bc900be9b35711566414e4c3ef3f7e43d0e22350f360bbf2472bfc76204eadaea840626c3babb18cbfd216c9790169ccd1cc0aac0c75d3254b3777d9a4a0cf6602842088c47a25906d86c8a3769f473b1dd062abd8916d0d5f42811183339e692dc7eefc0ef2084cc4e4f3282533086572de28414bd5a4ace4ed8014d26a3eeced579e3c2368427a71f87d73", @generic="e27afc39023af55129e0189fe8584dfa0633954d65a28ad6a827c6e425e5ed7f098448b004d91c6402c3d6ea3a97ba00f59a34a7b4748a5f4ee449fabcf21c6a75a96485959eb9f5ec6999f9c92d37be7dbb43401012a86821ea769cbb1c6f1a33", @typed={0x8, 0x0, 0x0, 0x0, @uid}]}, 0x590}, {&(0x7f0000000600)={0xf8, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid}]}, @generic="3c6ade68ec4185e73c", @nested={0x18, 0x0, 0x0, 0x1, [@typed={0x4}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}]}, @typed={0xc, 0x0, 0x0, 0x0, @u64}, @nested={0xa9, 0x0, 0x0, 0x1, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @generic="d07f9c277d452444ad3dc2989b8ce92310bb1979208a7930f237d5b621b1e6d5e35398700d5f52e6ea3cc04494e02c0375b62ec44ca776453f70ca11fb43f6069ba5224129240544d6c91247a2578021df3998e627cb7b8894abdab21ac8a7133a959c771377c5111037f54568807f3aa78c106bd76c683d1c90e087e9f6865d3bc31d9e3048cfb32d357b41d94afc90f48215b8b59500c70a4fcfbd52"]}]}, 0xf8}, {&(0x7f0000000700)={0x7b0, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x79d, 0x0, 0x0, 0x0, @binary="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"}]}, 0x7b0}], 0x4, 0x0, 0x0, 0x11}, 0x10) 10:28:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r1, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4800000024000705000000000000100000001f00", @ANYRES32=r2, @ANYBLOB="00000400f1ffffff"], 0x48}}, 0x0) [ 717.555334][ T726] loop4: detected capacity change from 0 to 267 [ 717.557868][ T26] audit: type=1804 audit(1633256921.023:120): pid=718 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir427199982/syzkaller.xm0IhX/849/cgroup.controllers" dev="sda1" ino=14850 res=1 errno=0 [ 717.625509][ T726] BTRFS error (device loop4): superblock checksum mismatch [ 717.665613][ T726] BTRFS error (device loop4): open_ctree failed 10:28:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @dev}, @in6={0xa, 0x0, 0x0, @private1}, @in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}], 0x54) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="48040000", @ANYRES16=r3, @ANYBLOB="010000000000000004003b1c210008000300", @ANYRES32=r2, @ANYBLOB="2c0433005000de295b3acba512e4080211000001505050505050"], 0x448}}, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x28011, r0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r5, r4, 0x0, 0x10000a006) [ 717.716374][ T734] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. 10:28:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000", 0x26b, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x12040) 10:28:41 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000004680), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'lo\x00'}) [ 717.889026][ T26] audit: type=1804 audit(1633256921.353:121): pid=741 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir261096696/syzkaller.bgvypt/799/cgroup.controllers" dev="sda1" ino=14835 res=1 errno=0 [ 717.924832][ T745] loop4: detected capacity change from 0 to 267 [ 717.968195][ T745] BTRFS error (device loop4): superblock checksum mismatch [ 718.001676][ T745] BTRFS error (device loop4): open_ctree failed 10:28:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) 10:28:41 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00'}) [ 718.017803][ T26] audit: type=1804 audit(1633256921.463:122): pid=741 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir261096696/syzkaller.bgvypt/799/cgroup.controllers" dev="sda1" ino=14835 res=1 errno=0 10:28:41 executing program 2: bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x7) 10:28:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000", 0x270, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:41 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004b00)={0x11, 0x3, &(0x7f0000004800)=@framed, &(0x7f0000004880)='syzkaller\x00', 0x0, 0x0, &(0x7f00000048c0), 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 718.273772][ T769] loop4: detected capacity change from 0 to 267 [ 718.315291][ T769] BTRFS error (device loop4): superblock checksum mismatch [ 718.328924][ T769] BTRFS error (device loop4): open_ctree failed 10:28:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbe86dd", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 10:28:41 executing program 3: r0 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000001540), &(0x7f0000001580)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$search(0xa, r0, &(0x7f00000014c0)='keyring\x00', &(0x7f0000001500)={'syz', 0x0}, 0x0) 10:28:41 executing program 2: syz_mount_image$udf(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000010100)='\x00NSR03', 0x6, 0x8800}, {&(0x7f0000011200)="020003002300010076b5f00100010000002000006000000000200000e007", 0x1e, 0x20000}, {&(0x7f0000012800)="01000300990001005666f001e00700000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0xfc000}, {&(0x7f0000012900)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c165c1419002a4c696e757820554446465300000000000000000000000405", 0xde, 0xfc0c0}, {&(0x7f0000012a00)="000000000000000001000000000000000000000000000000000000000000000006000300ce0001004fa4e801e107000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x7d, 0xfc1e0}, {&(0x7f0000012b00)="000000000000000000000000000000000000000900020000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000200001000000000000000000000004000000001000000002a4c696e757820554446465300000000000000000000000405", 0x6a, 0xfc2c0}, {&(0x7f0000012c00)="00000000000000000000000000000000002000008000000002400000002a554446205370617261626c6520506172746974696f6e010204050000000001000000100002003802000070000000f007", 0x4e, 0xfc3a0}], 0x0, &(0x7f0000013600)) 10:28:41 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo\x00') mkdirat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x1ff) 10:28:41 executing program 5: socket$key(0xf, 0x3, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000440)={0x2, 0x12, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x9}]}, 0x18}}, 0x0) 10:28:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)=@ipv6_delroute={0x1c, 0x19, 0xc09, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200}}, 0x1c}}, 0x0) 10:28:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000", 0x270, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) [ 718.453687][ T786] loop2: detected capacity change from 0 to 4035 10:28:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)=@ipv6_delroute={0x1c, 0x19, 0xc09}, 0x1c}}, 0x0) 10:28:42 executing program 1: request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) [ 718.498188][ T786] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 718.552689][ T786] UDF-fs: error (device loop2): udf_load_sparable_map: error loading logical volume descriptor: Too big sparing table size (568) [ 718.589913][ T798] loop4: detected capacity change from 0 to 267 10:28:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$link(0x8, r1, r0) [ 718.616527][ T786] UDF-fs: Scanning with blocksize 512 failed [ 718.640080][ T798] BTRFS error (device loop4): superblock checksum mismatch [ 718.657338][ T798] BTRFS error (device loop4): open_ctree failed 10:28:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_ABORT_SCAN(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 10:28:42 executing program 1: r0 = fork() syz_open_procfs(r0, &(0x7f0000000000)='net/llc/core\x00') [ 718.668845][ T786] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 718.708124][ T786] UDF-fs: Scanning with blocksize 1024 failed [ 718.776680][ T786] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 718.799281][ T786] UDF-fs: Scanning with blocksize 2048 failed [ 718.849251][ T786] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 718.889528][ T786] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 718.897441][ T786] UDF-fs: Scanning with blocksize 4096 failed [ 718.904769][ T786] UDF-fs: warning (device loop2): udf_fill_super: No partition found (1) 10:28:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc) 10:28:42 executing program 0: shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x4000)=nil, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="f9124f267c2d6d934b9578ae601bf02c711844f1901aa627610567cddf178ff5f167b4111cacb9725ee118eee57032ce5d170409", 0x34, 0xffffffffffffffff) [ 718.957815][ T786] loop2: detected capacity change from 0 to 4035 [ 718.975620][ T786] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 719.004110][ T786] UDF-fs: error (device loop2): udf_load_sparable_map: error loading logical volume descriptor: Too big sparing table size (568) [ 719.040614][ T786] UDF-fs: Scanning with blocksize 512 failed [ 719.088370][ T786] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 719.111280][ T786] UDF-fs: Scanning with blocksize 1024 failed [ 719.129450][ T830] trusted_key: encrypted_key: master key parameter '' is invalid [ 719.144633][ T832] trusted_key: encrypted_key: master key parameter '' is invalid [ 719.153717][ T786] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 719.180584][ T786] UDF-fs: Scanning with blocksize 2048 failed [ 719.205060][ T786] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 719.223092][ T786] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 719.231559][ T786] UDF-fs: Scanning with blocksize 4096 failed [ 719.238041][ T786] UDF-fs: warning (device loop2): udf_fill_super: No partition found (1) 10:28:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) 10:28:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f0000000300)=""/9, &(0x7f0000000340)=0x9) 10:28:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000", 0x270, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:42 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xd}, 0x40) 10:28:42 executing program 1: r0 = fork() rt_sigqueueinfo(r0, 0x1e, &(0x7f0000000000)={0x0, 0x0, 0x80000001}) 10:28:42 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x17, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_x_nat_t_type={0x1}]}, 0x20}}, 0x0) [ 719.390619][ T840] loop4: detected capacity change from 0 to 267 10:28:42 executing program 3: r0 = socket(0x11, 0xa, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200), r0) 10:28:42 executing program 5: r0 = socket$inet6(0x18, 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 10:28:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 719.440114][ T840] BTRFS error (device loop4): superblock checksum mismatch [ 719.479618][ T840] BTRFS error (device loop4): open_ctree failed 10:28:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)=@getqdisc={0x24, 0x26, 0x1}, 0x24}}, 0x0) 10:28:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20068145) 10:28:43 executing program 2: r0 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0x0, r1) request_key(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffb) 10:28:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d00000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000005050000000000004000000000000000010100000000000040000000000000000605000000000000400000000000000000050000000000004000000000000000070500000000000040000000000000000805000000000000400000000000000000000010000000000800000000000", 0x272, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) [ 719.706222][ T872] loop4: detected capacity change from 0 to 267 [ 719.736303][ T872] BTRFS error (device loop4): superblock checksum mismatch 10:28:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@ipv6_deladdr={0x48, 0x15, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @mcast1}, @IFA_FLAGS={0x8}, @IFA_ADDRESS={0x14, 0x1, @mcast2}]}, 0x48}}, 0x0) 10:28:43 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000000)=0x5) [ 719.755689][ T872] BTRFS error (device loop4): open_ctree failed 10:28:43 executing program 2: open$dir(&(0x7f0000000100)='./file0\x00', 0x200, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x8) 10:28:43 executing program 3: getgroups(0x4000000000000105, &(0x7f0000000100)) 10:28:43 executing program 0: r0 = syz_io_uring_setup(0x2e4b, &(0x7f0000000500), &(0x7f0000702000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180), &(0x7f0000000440)) r1 = fcntl$dupfd(r0, 0x0, r0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x13, 0x0, 0x0) 10:28:43 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_linger(r0, 0xffff, 0x80, 0x0, 0x0) 10:28:43 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, &(0x7f0000000100)='*', 0x1, 0x0, &(0x7f0000000240)=@abs, 0x8) 10:28:43 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 10:28:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d00000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000005050000000000004000000000000000010100000000000040000000000000000605000000000000400000000000000000050000000000004000000000000000070500000000000040000000000000000805000000000000400000000000000000000010000000000800000000000", 0x272, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:43 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0) [ 720.077790][ T900] loop4: detected capacity change from 0 to 267 [ 720.115609][ T900] BTRFS error (device loop4): superblock checksum mismatch [ 720.134561][ T900] BTRFS error (device loop4): open_ctree failed 10:28:43 executing program 1: syz_io_uring_setup(0x2e4b, &(0x7f0000000500), &(0x7f0000702000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180), 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_io_uring_setup(0x17b0, &(0x7f0000000200), &(0x7f0000008000/0x4000)=nil, &(0x7f000000a000/0xf000)=nil, &(0x7f0000000280), 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r0, 0x0) 10:28:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(r0, &(0x7f00000003c0)=[{&(0x7f0000000040)=""/236, 0xec}], 0x1, 0x0, 0x0) 10:28:43 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/252, 0xfc}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x2, 0x400, 0x0) 10:28:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d00000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000005050000000000004000000000000000010100000000000040000000000000000605000000000000400000000000000000050000000000004000000000000000070500000000000040000000000000000805000000000000400000000000000000000010000000000800000000000", 0x272, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:43 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) flistxattr(r0, &(0x7f0000000100)=""/255, 0xff) 10:28:43 executing program 2: madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3003, 0x11) [ 720.355272][ T927] loop4: detected capacity change from 0 to 267 [ 720.407626][ T927] BTRFS error (device loop4): superblock checksum mismatch [ 720.435520][ T927] BTRFS error (device loop4): open_ctree failed 10:28:44 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000540)={0x0, "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"}) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000440)) 10:28:44 executing program 5: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) read(r1, &(0x7f0000000500)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x5}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000080)={{0x0, 0x6}}) r2 = dup(r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{}, 'port1\x00'}) tkill(r0, 0x7) 10:28:44 executing program 3: creat(&(0x7f0000000100)='./bus\x00', 0x0) setxattr(&(0x7f0000000000)='./bus\x00', &(0x7f0000000300)=@random={'trusted.', '\b\x00\x00\x00\x00\x00\x92.\x1e\x0fV;\xad\xa5\xa9\xda\x0f\xf0\xe2\x9a\xb9\xabD\xffH\x0e\xe8\x157x`\"\xa7c\'\xec\x8d\x04\xa3a\xc9\x90\xdd0qZ;\x04_u\x03n\x7f\x81\xa5\xd1\xb8\x1a\x89\xef\xcf\xc0\xa7\x8e\x02\xb6\x97\xcdy\xb8\xd5\xff\x02,\xeb\xb8\xba\xb2\xdc\x97\xab7\xb9\x1d\xf5\xd7W\xf7\xa8@A\xc7\x94@\x15\xec\xe1\x891\x16\x9fU\x86\xb3\'a\xd3\xad\"\xe5\xbc\x9f\x96^=\xa7\xe3\xf0\xa2y\x06r\x9dS\xaa\b?\x03Q\x8dS\xa9\xd9)nA{\xbe$\xabNC>Y\xff\x0f6\x8f\x12@;o\xdc= \xd5pP5\xfd\xdax\x16\xd1\xb3\xc1\x9a\x86\x8d\x90\x90\x94/\x9c\x9fC\xfe\x90\xf1=\xb2j\xd28\xbd\x1f\x84\x84F\x81\a\xc9\x16\xe6\xc2\xc8\x91T\xac\xfa\x9e\xd1\xe9\a\x1cm+\xea-\x9c/\xd7\xcdo\x84\b\xc6L]\xf38\xff\xe2\xe1\x80\x8d\xee}*@\x9a/\xa6\xdek*x\xf3s\xdf\xab\x83\x92\x87\x1a]e\x17\xc8\xe8\xf5\xc9\xd7:[\xe7\xf6M\xe7\x15\x93\xc4\xbd=$\xe7'}, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) 10:28:44 executing program 1: mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/105) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 10:28:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) flistxattr(r0, &(0x7f00000018c0)=""/92, 0x5c) 10:28:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000", 0x273, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) [ 720.623478][ T948] loop4: detected capacity change from 0 to 267 [ 720.650331][ T948] BTRFS error (device loop4): superblock checksum mismatch [ 720.666559][ T948] BTRFS error (device loop4): open_ctree failed 10:28:44 executing program 2: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f00000000c0)={'fscrypt:', @auto=[0x0, 0x0, 0x61, 0x31, 0x0, 0x65, 0x0, 0x9, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66]}, &(0x7f0000000100)={0x0, "346e893df21370109c27a2858ece3e80f8a2807712c9c038b50fa654a5d524416657cfb9a55cea9717c7464662e81df74037e09690342fded1d2f1e775742180"}, 0x48, 0xfffffffffffffffb) 10:28:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) 10:28:44 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x4b66, &(0x7f00000000c0)={0x10}) 10:28:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000", 0x273, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:44 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0}) 10:28:44 executing program 3: r0 = gettid() kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 720.946084][ T976] loop4: detected capacity change from 0 to 267 [ 720.986600][ T976] BTRFS error (device loop4): superblock checksum mismatch [ 721.007653][ T976] BTRFS error (device loop4): open_ctree failed 10:28:44 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4e, &(0x7f0000000140)="8d31e183156939000000e28c0b1dd2a357b265c8745b78376e18cd3d3dfcb946cf885a21539a0c4a081ceeb24ac13830c1beaa1b4dc69190f8d2802fab69347b9a915308c4829b4b433519485f8b"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x20, r0, 0x0, 0x7) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) fork() r1 = gettid() tkill(r1, 0x3a) 10:28:44 executing program 5: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) read(r1, &(0x7f0000000500)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x5}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000080)={{0x0, 0x6}}) r2 = dup(r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{}, 'port1\x00'}) tkill(r0, 0x7) 10:28:44 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fremovexattr(r0, &(0x7f0000000000)=@known='trusted.overlay.redirect\x00') 10:28:44 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000140)) 10:28:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000", 0x273, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:44 executing program 2: r0 = syz_io_uring_setup(0x2e4b, &(0x7f0000000080), &(0x7f0000702000/0x2000)=nil, &(0x7f000031b000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000100)=0xffffb943, 0x0, 0x4) r3 = socket$nl_route(0x10, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r4 = fcntl$dupfd(r0, 0x0, r0) io_uring_register$IORING_UNREGISTER_BUFFERS(r4, 0x2, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) [ 721.199556][ T1000] loop4: detected capacity change from 0 to 267 [ 721.228411][ T1000] BTRFS error (device loop4): superblock checksum mismatch [ 721.243374][ T1000] BTRFS error (device loop4): open_ctree failed 10:28:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 721.532921][ T1023] ptrace attach of "/root/syz-executor.0 exec"[1022] was attempted by "/root/syz-executor.0 exec"[1023] 10:28:45 executing program 1: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x2) read(r1, &(0x7f0000000500)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000100)={0x0, 0x2}) write(r1, 0x0, 0x57) tkill(r0, 0x7) 10:28:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:45 executing program 3: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x40281) 10:28:45 executing program 5: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) read(r1, &(0x7f0000000500)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x5}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000080)={{0x0, 0x6}}) r2 = dup(r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{}, 'port1\x00'}) tkill(r0, 0x7) 10:28:45 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000003"]) [ 721.759576][ T1034] loop4: detected capacity change from 0 to 259 [ 721.836538][ T1034] BTRFS error (device loop4): superblock checksum mismatch [ 721.840775][ T1037] program syz-executor.0 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 721.858607][ T1034] BTRFS error (device loop4): open_ctree failed 10:28:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:45 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) unshare(0x20680) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000100)) 10:28:45 executing program 5: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) read(r1, &(0x7f0000000500)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x5}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000080)={{0x0, 0x6}}) r2 = dup(r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{}, 'port1\x00'}) tkill(r0, 0x7) [ 722.043872][ T1056] loop4: detected capacity change from 0 to 259 10:28:45 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000003"]) 10:28:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000180)="390000001800034700bb65e1c3e4ffff06000000010000004500000025000000190014c04800000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) [ 722.088594][ T1056] BTRFS error (device loop4): superblock checksum mismatch [ 722.139577][ T1056] BTRFS error (device loop4): open_ctree failed 10:28:45 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r0, 0xc0189436, 0x0) 10:28:45 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) fremovexattr(r0, &(0x7f00000000c0)=@random={'trusted.', '/dev/snd/dimer\x00'}) [ 722.193737][ T1069] program syz-executor.0 is using a deprecated SCSI ioctl, please convert it to SG_IO 10:28:45 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 10:28:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) [ 722.426608][ T1085] loop4: detected capacity change from 0 to 259 [ 722.447437][ T1085] BTRFS error (device loop4): superblock checksum mismatch [ 722.468849][ T1085] BTRFS error (device loop4): open_ctree failed 10:28:46 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x38, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0xa, 0x1, '{@)@)\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @private}]}, 0x38}, 0x1, 0xb}, 0x0) 10:28:46 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, 0x0, 0x0, 0x0) 10:28:46 executing program 1: r0 = syz_io_uring_setup(0x2e4b, &(0x7f0000000080), &(0x7f0000702000/0x2000)=nil, &(0x7f000031b000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000100)=0xffffb943, 0x0, 0x4) r3 = socket$nl_route(0x10, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r4 = fcntl$dupfd(r0, 0x0, r0) io_uring_register$IORING_UNREGISTER_BUFFERS(r4, 0x8, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 10:28:46 executing program 2: semget(0x1, 0x0, 0x0) r0 = semget(0x3, 0x1, 0xa) semctl$IPC_RMID(r0, 0x0, 0x0) 10:28:46 executing program 5: gettid() r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) read(r0, &(0x7f0000000500)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x5}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x6}}) r1 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000002c0)={{}, 'port1\x00'}) 10:28:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) [ 722.693686][ T1108] loop4: detected capacity change from 0 to 267 10:28:46 executing program 2: open(0x0, 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000380)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) [ 722.792603][ T1108] BTRFS error (device loop4): superblock checksum mismatch 10:28:46 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1000001000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:28:46 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/dev\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000300)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 722.853972][ T26] audit: type=1800 audit(1633256926.323:123): pid=1127 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15613 res=0 errno=0 [ 722.879224][ T1108] BTRFS error (device loop4): open_ctree failed [ 722.953147][ T26] audit: type=1800 audit(1633256926.413:124): pid=1135 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15613 res=0 errno=0 10:28:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:46 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000000)=""/191, 0xbf, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000003c0)=[{0x0}], 0x1, 0x0, 0x0) [ 723.090124][ T26] audit: type=1800 audit(1633256926.523:125): pid=1127 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15613 res=0 errno=0 10:28:46 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) write(r0, &(0x7f00000000c0)="397bcdd075b8c7d1bba7cf533d3d150a", 0x10) [ 723.176078][ T1149] loop4: detected capacity change from 0 to 267 [ 723.228189][ T26] audit: type=1800 audit(1633256926.553:126): pid=1135 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15613 res=0 errno=0 10:28:46 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000200)) [ 723.306367][ T1149] BTRFS error (device loop4): superblock checksum mismatch [ 723.336770][ T1149] BTRFS error (device loop4): open_ctree failed 10:28:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:47 executing program 1: r0 = syz_io_uring_setup(0x2e4b, &(0x7f0000000500), &(0x7f0000702000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180), &(0x7f0000000440)) r1 = fcntl$dupfd(r0, 0x0, r0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x2, &(0x7f0000000140)=[{0x0}], 0x500) 10:28:47 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) fchown(r0, 0xee00, 0x0) 10:28:47 executing program 5: gettid() r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) read(r0, &(0x7f0000000500)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x5}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x6}}) r1 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000002c0)={{}, 'port1\x00'}) 10:28:47 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000080)=ANY=[@ANYBLOB='commit=0']) [ 723.824064][ T1175] loop4: detected capacity change from 0 to 267 10:28:47 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_UNIMAP(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0}) [ 723.885066][ T1175] BTRFS error (device loop4): superblock checksum mismatch [ 723.921816][ T1175] BTRFS error (device loop4): open_ctree failed 10:28:47 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) fchmod(r0, 0x0) 10:28:47 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x6) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) 10:28:47 executing program 2: ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) sendto$inet(r0, &(0x7f0000000240)="f8645a497b97be12107b9c2aa06f1ce7b57750db663742141a800121e8ccc7659bb1da94a5787301a15c3324c5923c2794d3e43709d70b90e6bc5677f9963ae86bd58fcaf3b6cf1bc941", 0x4a, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000062080)={0x0, 0x0, "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", "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"}) r2 = syz_open_dev$sg(&(0x7f0000001880), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000018c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000063080)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x0, "47f7f60c19bb80"}) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/252, 0xfc}], 0x1, 0xfffffffb, 0x0) 10:28:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {0x0, 0x0, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) [ 724.121029][ T1184] EXT4-fs (sda1): re-mounted. Opts: commit=0,errors=continue. Quota mode: none. [ 724.164234][ C0] sd 0:0:1:0: tag#211 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 724.174149][ C0] sd 0:0:1:0: tag#211 CDB: opcode=0xe5 (vendor) [ 724.180472][ C0] sd 0:0:1:0: tag#211 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 724.189413][ C0] sd 0:0:1:0: tag#211 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 724.198387][ C0] sd 0:0:1:0: tag#211 CDB[20]: ba [ 724.215354][ T1201] loop4: detected capacity change from 0 to 267 [ 724.242900][ T1206] EXT4-fs (sda1): re-mounted. Opts: commit=0,errors=continue. Quota mode: none. 10:28:47 executing program 3: r0 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) writev(r0, &(0x7f00000014c0)=[{&(0x7f0000000140)="c7", 0x1}], 0x1) r1 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0xed442}, 0x18) writev(r1, &(0x7f00000014c0)=[{&(0x7f0000002fc0)='R', 0x1}], 0x1) [ 724.268692][ C1] sd 0:0:1:0: tag#214 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 724.278599][ C1] sd 0:0:1:0: tag#214 CDB: opcode=0xe5 (vendor) [ 724.284924][ C1] sd 0:0:1:0: tag#214 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 724.294016][ C1] sd 0:0:1:0: tag#214 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 724.303023][ C1] sd 0:0:1:0: tag#214 CDB[20]: ba 10:28:47 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x3124, &(0x7f0000000100)=0x0) io_submit(r0, 0x0, 0x0) 10:28:47 executing program 2: ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) sendto$inet(r0, &(0x7f0000000240)="f8645a497b97be12107b9c2aa06f1ce7b57750db663742141a800121e8ccc7659bb1da94a5787301a15c3324c5923c2794d3e43709d70b90e6bc5677f9963ae86bd58fcaf3b6cf1bc941", 0x4a, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000062080)={0x0, 0x0, "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", "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"}) r2 = syz_open_dev$sg(&(0x7f0000001880), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000018c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000063080)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x0, "47f7f60c19bb80"}) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/252, 0xfc}], 0x1, 0xfffffffb, 0x0) [ 724.422742][ T1201] BTRFS error (device loop4): superblock checksum mismatch [ 724.437045][ T1201] BTRFS error (device loop4): open_ctree failed [ 724.484604][ C1] sd 0:0:1:0: tag#222 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 724.494508][ C1] sd 0:0:1:0: tag#222 CDB: opcode=0xe5 (vendor) [ 724.500819][ C1] sd 0:0:1:0: tag#222 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 724.509773][ C1] sd 0:0:1:0: tag#222 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 724.519203][ C1] sd 0:0:1:0: tag#222 CDB[20]: ba 10:28:48 executing program 3: r0 = syz_io_uring_setup(0x2e4b, &(0x7f0000000500), &(0x7f0000702000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000100)=0xffffb943, 0x0, 0x4) r3 = socket$nl_route(0x10, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) r4 = fcntl$dupfd(r0, 0x0, r0) io_uring_register$IORING_REGISTER_BUFFERS(r4, 0x12, &(0x7f0000000140), 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 10:28:48 executing program 0: r0 = socket$packet(0x11, 0x4000000000002, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000017c0)={0x11, 0x8035, r2, 0x1, 0x0, 0x6, @random="989b05b279e1"}, 0x14) 10:28:48 executing program 5: gettid() r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) read(r0, &(0x7f0000000500)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x5}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x6}}) r1 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000002c0)={{}, 'port1\x00'}) 10:28:48 executing program 2: ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) sendto$inet(r0, &(0x7f0000000240)="f8645a497b97be12107b9c2aa06f1ce7b57750db663742141a800121e8ccc7659bb1da94a5787301a15c3324c5923c2794d3e43709d70b90e6bc5677f9963ae86bd58fcaf3b6cf1bc941", 0x4a, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000062080)={0x0, 0x0, "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", "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"}) r2 = syz_open_dev$sg(&(0x7f0000001880), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000018c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000063080)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x0, "47f7f60c19bb80"}) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/252, 0xfc}], 0x1, 0xfffffffb, 0x0) 10:28:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {0x0, 0x0, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:48 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b41, &(0x7f0000000000)={0x0, 0x0}) [ 724.822932][ C1] sd 0:0:1:0: tag#223 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 724.832876][ C1] sd 0:0:1:0: tag#223 CDB: opcode=0xe5 (vendor) [ 724.839625][ C1] sd 0:0:1:0: tag#223 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 724.848757][ C1] sd 0:0:1:0: tag#223 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 724.857767][ C1] sd 0:0:1:0: tag#223 CDB[20]: ba [ 724.888903][ T1235] loop4: detected capacity change from 0 to 267 10:28:48 executing program 2: ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) sendto$inet(r0, &(0x7f0000000240)="f8645a497b97be12107b9c2aa06f1ce7b57750db663742141a800121e8ccc7659bb1da94a5787301a15c3324c5923c2794d3e43709d70b90e6bc5677f9963ae86bd58fcaf3b6cf1bc941", 0x4a, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000062080)={0x0, 0x0, "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", "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"}) r2 = syz_open_dev$sg(&(0x7f0000001880), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000018c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000063080)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x0, "47f7f60c19bb80"}) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/252, 0xfc}], 0x1, 0xfffffffb, 0x0) 10:28:48 executing program 1: openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)={0x1e98c2}, 0x18) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@random={'security.', ' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, &(0x7f0000000280)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x10, 0x0) [ 724.992664][ T1235] BTRFS error (device loop4): superblock checksum mismatch [ 725.047236][ T1235] BTRFS error (device loop4): open_ctree failed [ 725.048234][ C1] sd 0:0:1:0: tag#224 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 725.063559][ C1] sd 0:0:1:0: tag#224 CDB: opcode=0xe5 (vendor) [ 725.069810][ C1] sd 0:0:1:0: tag#224 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 725.078827][ C1] sd 0:0:1:0: tag#224 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 725.087954][ C1] sd 0:0:1:0: tag#224 CDB[20]: ba 10:28:48 executing program 2: unshare(0x4040600) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) getpeername(r0, &(0x7f0000000140)=@alg, &(0x7f00000001c0)=0x80) 10:28:48 executing program 1: r0 = socket$inet6(0x1c, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 10:28:48 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0x5) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000080)={0xfffffffffffffd9e, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000200)="04", 0x1}], 0x1}, 0x0) sendto$inet(r1, &(0x7f00000000c0)="e9", 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000040)={0x0, 0x5600}, 0x10) sendmsg(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0) 10:28:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {0x0, 0x0, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) [ 725.409978][ T1266] loop4: detected capacity change from 0 to 267 [ 725.449560][ T1266] BTRFS error (device loop4): superblock checksum mismatch [ 725.457875][ T1266] BTRFS error (device loop4): open_ctree failed 10:28:49 executing program 3: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f00000000c0), 0xc) 10:28:49 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0x101, &(0x7f0000000000), &(0x7f0000000140)=0x98) 10:28:49 executing program 5: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) read(r1, &(0x7f0000000500)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x5}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000080)={{0x0, 0x6}}) dup(r1) tkill(r0, 0x7) 10:28:49 executing program 2: r0 = socket$inet6(0x1c, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) 10:28:49 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x13, &(0x7f0000000280)=ANY=[], 0x6b) 10:28:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300), 0x0, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:49 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0xf, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 725.766513][ T1288] loop4: detected capacity change from 0 to 267 10:28:49 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000180), &(0x7f00000001c0)=0x10) [ 725.817781][ T1288] BTRFS error (device loop4): superblock checksum mismatch [ 725.832314][ T1288] BTRFS error (device loop4): open_ctree failed 10:28:49 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x3, &(0x7f00000000c0)={0x0, 0x0, 0xffe0}, 0x8) 10:28:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300), 0x0, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:49 executing program 5: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) read(r1, &(0x7f0000000500)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x5}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000080)={{0x0, 0x6}}) tkill(r0, 0x7) 10:28:49 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c}, 0x1c) 10:28:49 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000080), 0x88) [ 726.041129][ T1321] loop4: detected capacity change from 0 to 267 [ 726.123179][ T1321] BTRFS error (device loop4): superblock checksum mismatch [ 726.189581][ T1321] BTRFS error (device loop4): open_ctree failed 10:28:49 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) recvmsg(r0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=""/203, 0xcb}, 0x181) 10:28:49 executing program 2: r0 = socket$inet6(0x1c, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 10:28:49 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet(0x2, 0x5, 0x0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r2, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) r3 = dup2(r2, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000040)=ANY=[@ANYBLOB="01", @ANYRES32=0x0], &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, r4}, 0x10) 10:28:49 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000240)=@in={0x10, 0x2}, 0x10) 10:28:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300), 0x0, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:49 executing program 5: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) read(r1, &(0x7f0000000500)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000080)={{0x0, 0x6}}) tkill(r0, 0x7) 10:28:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000240)='htcp\x00', 0x5) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000000)='cubic\x00', 0x4) [ 726.548730][ T1366] loop4: detected capacity change from 0 to 267 10:28:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x9, &(0x7f0000000240), 0x4) 10:28:50 executing program 5: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000080)={{0x0, 0x6}}) tkill(r0, 0x7) 10:28:50 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x16, &(0x7f0000000280)={0x0, 0xba9}, 0x8) [ 726.618135][ T1366] BTRFS error (device loop4): superblock checksum mismatch [ 726.643921][ T1366] BTRFS error (device loop4): open_ctree failed 10:28:50 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 10:28:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e400001000000000000000400000000000020000000000000000000100000000000200", 0x36, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:50 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x1}, 0x1c) 10:28:50 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000080)={0x0, 0x2, "0308"}, &(0x7f0000000140)=0xa) 10:28:50 executing program 5: r0 = gettid() ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000080)={{0x0, 0x6}}) tkill(r0, 0x7) 10:28:50 executing program 3: r0 = socket$inet(0x2, 0x5, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) recvfrom$unix(r2, 0x0, 0x0, 0x40041, 0x0, 0x0) 10:28:50 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000016c0), &(0x7f0000001700)=0x4) [ 726.954672][ T1400] loop4: detected capacity change from 0 to 267 10:28:50 executing program 5: r0 = gettid() ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000080)={{0x0, 0x6}}) tkill(r0, 0x7) [ 727.004459][ T1400] BTRFS error (device loop4): superblock checksum mismatch [ 727.029418][ T1400] BTRFS error (device loop4): open_ctree failed 10:28:50 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000180)=0x88) 10:28:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e400001000000000000000400000000000020000000000000000000100000000000200", 0x36, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000040), 0x90) 10:28:50 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x5, &(0x7f0000000040)=0x80000000, 0x4) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x5, &(0x7f0000000000), &(0x7f0000000080)=0x4) 10:28:50 executing program 5: r0 = gettid() ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000080)={{0x0, 0x6}}) tkill(r0, 0x7) [ 727.272320][ T1437] loop4: detected capacity change from 0 to 267 10:28:50 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000240)=@in={0x0, 0x2}, 0x9) [ 727.318490][ T1437] BTRFS error (device loop4): superblock checksum mismatch [ 727.357746][ T1437] BTRFS error (device loop4): open_ctree failed 10:28:51 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x18, &(0x7f0000000000), 0x4) 10:28:51 executing program 1: r0 = socket(0x1c, 0x10000001, 0x84) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 10:28:51 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x6}}) tkill(0x0, 0x7) 10:28:51 executing program 2: r0 = socket(0x1c, 0x10000001, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0x20) 10:28:51 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x16, &(0x7f0000000280), 0x8) 10:28:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e400001000000000000000400000000000020000000000000000000100000000000200", 0x36, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:51 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x6}}) tkill(0x0, 0x7) 10:28:51 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000000), 0x10) [ 727.646686][ T1471] loop4: detected capacity change from 0 to 267 [ 727.683667][ T1471] BTRFS error (device loop4): superblock checksum mismatch 10:28:51 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 10:28:51 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000400), 0x88) [ 727.742833][ T1471] BTRFS error (device loop4): open_ctree failed 10:28:51 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x6}}) tkill(0x0, 0x7) 10:28:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e400001000000000000000400000000000020000000000000000000100000000000200000000000000001000000010000000100000010000000100000000", 0x51, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) [ 727.987461][ T1501] loop4: detected capacity change from 0 to 267 [ 728.018544][ T1501] BTRFS error (device loop4): superblock checksum mismatch [ 728.051280][ T1501] BTRFS error (device loop4): open_ctree failed 10:28:51 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) recvmsg(r0, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=""/215, 0xd7}, 0x1) 10:28:51 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f00000000c0)=ANY=[], 0x14) 10:28:51 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x2}, 0x1c) bind(r0, &(0x7f0000000240)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 10:28:51 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x103, &(0x7f0000000300), &(0x7f0000000180)=0x8) 10:28:51 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x6}}) tkill(0x0, 0x7) 10:28:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e400001000000000000000400000000000020000000000000000000100000000000200000000000000001000000010000000100000010000000100000000", 0x51, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:51 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0}, 0x0) sendmsg(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000000)="bd", 0x1}], 0x1, &(0x7f00000016c0)=ANY=[@ANYBLOB="0cde"], 0x18}, 0x0) 10:28:51 executing program 5: openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000080)={{0x0, 0x6}}) tkill(0x0, 0x7) [ 728.276296][ T1525] loop4: detected capacity change from 0 to 267 10:28:51 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000980)={&(0x7f00000004c0)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000000700)=[{0x10}, {0x10}], 0x20}, 0x0) 10:28:51 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000080), 0x90) [ 728.352191][ T1525] BTRFS error (device loop4): superblock checksum mismatch [ 728.387176][ T1525] BTRFS error (device loop4): open_ctree failed 10:28:51 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x3, 0x0, 0x0) 10:28:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e400001000000000000000400000000000020000000000000000000100000000000200000000000000001000000010000000100000010000000100000000", 0x51, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:52 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0xf, &(0x7f0000000100), 0xc) 10:28:52 executing program 5: openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000080)={{0x0, 0x6}}) tkill(0x0, 0x7) 10:28:52 executing program 3: r0 = socket(0x1c, 0x10000001, 0x84) sendmsg(r0, &(0x7f0000000640)={&(0x7f0000000280)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f00000005c0)=[{&(0x7f0000000300)="99", 0x1}], 0x1, &(0x7f0000000880)=[{0x10}], 0x10}, 0x81) 10:28:52 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r1, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) r2 = dup2(r1, r1) dup2(r0, r2) 10:28:52 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) r2 = socket(0x1c, 0x10000001, 0x84) dup2(r2, r1) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x32, &(0x7f00000000c0), 0x8) [ 728.656549][ T1560] loop4: detected capacity change from 0 to 267 [ 728.687454][ T1560] BTRFS error (device loop4): superblock checksum mismatch [ 728.696332][ T1560] BTRFS error (device loop4): open_ctree failed 10:28:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d0", 0x5f, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:52 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x901, &(0x7f0000000040), &(0x7f0000000080)=0x8) 10:28:52 executing program 5: openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000080)={{0x0, 0x6}}) tkill(0x0, 0x7) 10:28:52 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x0, 0x1c, 0x3}, 0x2f) 10:28:52 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty, @val, {@ipv4}}, 0x0) [ 728.978233][ T1594] loop4: detected capacity change from 0 to 267 10:28:52 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, 0x0) tkill(0x0, 0x7) 10:28:52 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x32, &(0x7f00000000c0), 0x8) [ 729.022883][ T1594] BTRFS error (device loop4): superblock checksum mismatch [ 729.036002][ T1594] BTRFS error (device loop4): open_ctree failed 10:28:52 executing program 0: r0 = socket$inet6(0x1c, 0x5, 0x0) bind(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 10:28:52 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x25, &(0x7f0000000100)=ANY=[], &(0x7f00000000c0)=0x8) 10:28:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d0", 0x5f, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:52 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, 0x0) tkill(0x0, 0x7) 10:28:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000100), &(0x7f00000001c0)=0x88) 10:28:52 executing program 3: r0 = socket(0x1c, 0x10000001, 0x84) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x9, &(0x7f0000000000), &(0x7f0000000040)=0x4) 10:28:52 executing program 3: r0 = socket$inet6(0x1c, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) 10:28:52 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, 0x0) tkill(0x0, 0x7) 10:28:52 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket(0x1c, 0x1, 0x0) dup2(r1, r0) 10:28:52 executing program 1: r0 = socket$inet6(0x1c, 0x5, 0x0) sendto$inet6(r0, &(0x7f0000000000)="f4", 0x1, 0x20180, &(0x7f0000000080)={0x1c, 0x1c}, 0x1c) [ 729.414153][ T1634] loop4: detected capacity change from 0 to 267 10:28:53 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)) tkill(0x0, 0x7) [ 729.477113][ T1634] BTRFS error (device loop4): superblock checksum mismatch [ 729.502330][ T1634] BTRFS error (device loop4): open_ctree failed 10:28:53 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000b40)={0x1c, 0x1c}, 0x1c) 10:28:53 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x14) 10:28:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d0", 0x5f, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000300)={0x0, @in, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x98) 10:28:53 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)) tkill(0x0, 0x7) 10:28:53 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x3001, &(0x7f0000000040), 0x4) 10:28:53 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000380), &(0x7f00000003c0)=0xc) 10:28:53 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)) tkill(0x0, 0x7) 10:28:53 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x24, &(0x7f0000000000), 0xfe6a) [ 729.891162][ T1679] loop4: detected capacity change from 0 to 267 10:28:53 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x32, &(0x7f00000001c0), 0x8) [ 729.969270][ T1679] BTRFS error (device loop4): superblock checksum mismatch [ 729.987926][ T1679] BTRFS error (device loop4): open_ctree failed 10:28:53 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000280)=ANY=[], &(0x7f0000001700)=0x8) 10:28:53 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x6}}) tkill(0x0, 0x0) 10:28:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea222", 0x66, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) [ 730.273488][ T1716] loop4: detected capacity change from 0 to 267 [ 730.303177][ T1716] BTRFS error (device loop4): superblock checksum mismatch [ 730.318460][ T1716] BTRFS error (device loop4): open_ctree failed 10:28:53 executing program 0: r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) 10:28:53 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') mknodat$null(r0, &(0x7f0000001380)='./file0\x00', 0x0, 0x103) 10:28:53 executing program 2: execveat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 10:28:53 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8983, 0x0) 10:28:53 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x1}, 0x1c) 10:28:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea222", 0x66, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:54 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') ioctl$TUNGETFEATURES(r0, 0x800454cf, 0x0) 10:28:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000200), 0x4) 10:28:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x0, 0x0, &(0x7f0000000080)) 10:28:54 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') [ 730.580431][ T1742] loop4: detected capacity change from 0 to 267 10:28:54 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, 0x0) [ 730.629076][ T1742] BTRFS error (device loop4): superblock checksum mismatch [ 730.662861][ T1742] BTRFS error (device loop4): open_ctree failed 10:28:54 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000200, 0x0) 10:28:54 executing program 1: openat$cgroup(0xffffffffffffffff, &(0x7f00000009c0)='syz1\x00', 0x200002, 0x0) 10:28:54 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') write$FUSE_IOCTL(r0, 0x0, 0x0) 10:28:54 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 10:28:54 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00), 0x0) 10:28:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea222", 0x66, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:54 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') getsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 10:28:54 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, 0x0, 0x0) [ 730.968741][ T1773] loop4: detected capacity change from 0 to 267 10:28:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) 10:28:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg1\x00'}) 10:28:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 731.051601][ T1773] BTRFS error (device loop4): superblock checksum mismatch [ 731.074517][ T1773] BTRFS error (device loop4): open_ctree failed 10:28:54 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') setsockopt$packet_add_memb(r0, 0x107, 0x1, 0x0, 0x0) 10:28:54 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') getpeername(r0, 0x0, 0x0) 10:28:54 executing program 2: r0 = socket(0x1, 0x2, 0x0) getsockname(r0, 0x0, &(0x7f00000001c0)) 10:28:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775", 0x69, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:54 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) 10:28:54 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') getsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 10:28:54 executing program 5: r0 = socket(0x1, 0x2, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, 0x0, 0x0) 10:28:54 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:28:54 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') utimensat(r0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) [ 731.353648][ T1800] loop4: detected capacity change from 0 to 267 [ 731.378123][ T1800] BTRFS error (device loop4): superblock checksum mismatch [ 731.388837][ T1800] BTRFS error (device loop4): open_ctree failed 10:28:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775", 0x69, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:54 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, 0x0) 10:28:55 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') write$FUSE_STATFS(r0, 0x0, 0x0) 10:28:55 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x580, 0x0) 10:28:55 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000d40), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, 0x0) [ 731.599597][ T1821] loop4: detected capacity change from 0 to 267 [ 731.628807][ T1821] BTRFS error (device loop4): superblock checksum mismatch [ 731.643630][ T1821] BTRFS error (device loop4): open_ctree failed 10:28:55 executing program 5: fchmodat(0xffffffffffffffff, &(0x7f0000000c80)='./file0\x00', 0x0) 10:28:55 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 10:28:55 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, 0x0) 10:28:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775", 0x69, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:55 executing program 3: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) 10:28:55 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 10:28:55 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) recvmmsg(r0, &(0x7f0000009fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f000000a200)={0x0, 0x3938700}) 10:28:55 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x204000, 0x0) 10:28:55 executing program 3: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000040)=""/185) 10:28:55 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) fchmodat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) [ 731.958242][ T1846] loop4: detected capacity change from 0 to 267 10:28:55 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000140)) [ 732.015177][ T1846] BTRFS error (device loop4): superblock checksum mismatch [ 732.046288][ T1846] BTRFS error (device loop4): open_ctree failed 10:28:55 executing program 2: r0 = socket(0x1, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 10:28:55 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mounts\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) 10:28:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d", 0x6b, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) [ 732.288898][ T1872] loop4: detected capacity change from 0 to 267 10:28:55 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 10:28:55 executing program 1: syz_usb_disconnect(0xffffffffffffffff) syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0xa5, 0x2, 0x7, 0x1, 0x3, 0x0, "", {{{0x9, 0x5, 0x1, 0x2, 0x0, 0x0, 0x0, 0xc0}}, [{}]}}}]}}]}}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x0, 0x0}, {0x0, 0x0}]}) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) 10:28:55 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) 10:28:55 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) 10:28:55 executing program 5: openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000240)='devices.allow\x00', 0x2, 0x0) [ 732.335823][ T1872] BTRFS error (device loop4): superblock checksum mismatch [ 732.350502][ T1872] BTRFS error (device loop4): open_ctree failed 10:28:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d", 0x6b, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:55 executing program 5: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2400) 10:28:56 executing program 2: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) listen(r0, 0x0) 10:28:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040)=0x200000, 0x4) [ 732.578711][ T1894] loop4: detected capacity change from 0 to 267 10:28:56 executing program 5: openat$ptp0(0xffffff9c, &(0x7f0000000280), 0x149500, 0x0) 10:28:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040)=0x200000, 0x4) [ 732.627706][ T1894] BTRFS error (device loop4): superblock checksum mismatch [ 732.638684][ T1894] BTRFS error (device loop4): open_ctree failed 10:28:56 executing program 2: r0 = openat$ptp0(0xffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f0000000200)) 10:28:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001d00)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) [ 732.935885][T13473] usb 2-1: new high-speed USB device number 14 using dummy_hcd [ 733.300212][T13473] usb 2-1: config 1 interface 0 altsetting 165 endpoint 0x1 has invalid wMaxPacketSize 0 [ 733.310327][T13473] usb 2-1: config 1 interface 0 altsetting 165 bulk endpoint 0x1 has invalid maxpacket 0 [ 733.321681][T13473] usb 2-1: config 1 interface 0 altsetting 165 endpoint 0x82 has invalid wMaxPacketSize 0 [ 733.332254][T13473] usb 2-1: config 1 interface 0 altsetting 165 bulk endpoint 0x82 has invalid maxpacket 0 [ 733.342845][T13473] usb 2-1: config 1 interface 0 has no altsetting 0 [ 733.598531][T13473] usb 2-1: string descriptor 0 read error: -22 [ 733.610631][T13473] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 733.639625][T13473] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 733.923566][T13473] usblp 2-1:1.0: usblp0: USB Bidirectional printer dev 14 if 0 alt 165 proto 3 vid 0x0525 pid 0xA4A8 [ 733.975720][T13473] usb 2-1: USB disconnect, device number 14 [ 734.021262][T13473] usblp0: removed 10:28:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001d00)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, 0x0, &(0x7f0000000040)) 10:28:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040)=0x200000, 0x4) 10:28:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d", 0x6b, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:58 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000440)={@loopback, 0x0, 0x1}, 0x20) 10:28:58 executing program 2: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, 0x0) 10:28:58 executing program 0: pipe(&(0x7f0000002580)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) [ 734.779834][ T1959] loop4: detected capacity change from 0 to 267 10:28:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040)=0x200000, 0x4) 10:28:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001d00)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000140), 0x4) 10:28:58 executing program 2: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RAUTH(r0, &(0x7f0000000000)={0x14}, 0xfffffff7) write$P9_RRENAME(r0, &(0x7f00000001c0)={0x7}, 0x7) 10:28:58 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') [ 734.847696][ T1959] BTRFS error (device loop4): superblock checksum mismatch [ 734.889142][ T1959] BTRFS error (device loop4): open_ctree failed 10:28:58 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000100)) 10:28:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0xf0}, [@IFLA_IFALIAS={0x14, 0x14, 'team_slave_1\x00'}, @IFLA_GROUP={0x8}]}, 0x3c}}, 0x0) 10:28:58 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000040)='syz0\x00') ioctl$UI_DEV_DESTROY(r0, 0x5502) 10:28:58 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000100), 0x4) 10:28:58 executing program 1: timerfd_create(0x0, 0x81000) [ 735.175114][ T1989] loop4: detected capacity change from 0 to 267 [ 735.196718][ T1991] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 735.209484][ T1989] BTRFS error (device loop4): superblock checksum mismatch [ 735.224971][ T1989] BTRFS error (device loop4): open_ctree failed [ 735.239935][ T1991] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 735.256410][ T1991] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 10:28:58 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0x2, &(0x7f0000002a40)) 10:28:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:58 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000002680), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TRANSFER(r0, 0xc02064cc, &(0x7f0000000100)) 10:28:58 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="3801"], 0x138) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 735.484595][ T2007] loop4: detected capacity change from 0 to 267 [ 735.523960][ T2007] BTRFS error (device loop4): superblock checksum mismatch [ 735.540802][ T2007] BTRFS error (device loop4): open_ctree failed 10:28:59 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) r1 = dup(r0) fcntl$getflags(r1, 0x1) 10:28:59 executing program 3: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x204c0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000040)={0x29, 0x6, 0x0, {0x1}}, 0x29) 10:28:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x4, 0x0, &(0x7f0000000580)) 10:28:59 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000000)=""/95) 10:28:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:59 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="3801"], 0x138) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 735.853689][ T2029] loop4: detected capacity change from 0 to 267 10:28:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0xb, 0x0, &(0x7f00000000c0)) 10:28:59 executing program 1: r0 = inotify_init() inotify_add_watch(r0, 0x0, 0x6) 10:28:59 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/cgroup', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) [ 735.955953][ T2029] BTRFS error (device loop4): superblock checksum mismatch [ 735.995775][ T2029] BTRFS error (device loop4): open_ctree failed 10:28:59 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000012c0)='statm\x00') ioctl$KDGKBDIACR(r0, 0x4b4a, 0x0) 10:28:59 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/cgroup', 0x0, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, 0x0) 10:28:59 executing program 1: socketpair(0x1d, 0x0, 0x0, &(0x7f0000003200)) 10:28:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:28:59 executing program 2: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r0, 0x1, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8004}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x9c, r2, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x44, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}]}, @TIPC_NLA_SOCK={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7f}]}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7f}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7ff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x60000}]}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x8880}, 0x4008011) ioctl$IOCTL_VMCI_CTX_REMOVE_NOTIFICATION(0xffffffffffffffff, 0x7b0, &(0x7f0000000300)={@my=0x1, 0xfffffffd}) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x5c, 0x0, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_ADDR={0x30, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x40}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private0}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) syz_genetlink_get_family_id$batadv(&(0x7f00000004c0), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000500)) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000f40), 0xc8402, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f00000011c0)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001180)={&(0x7f0000001100)={0x48, r2, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x34, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff8000}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x8000080) socket$packet(0x11, 0x2, 0x300) 10:28:59 executing program 5: bind$alg(0xffffffffffffffff, 0x0, 0x0) 10:28:59 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f00000003c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:28:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x4, &(0x7f00000003c0)=@framed={{}, [@ldst={0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440), 0x8, 0x10, 0x0}, 0x78) [ 736.323525][ T2068] loop4: detected capacity change from 0 to 267 [ 736.341905][ T2064] can: request_module (can-proto-0) failed. [ 736.382913][ T2064] can: request_module (can-proto-0) failed. [ 736.410505][ T2068] BTRFS error (device loop4): superblock checksum mismatch [ 736.421572][ T2068] BTRFS error (device loop4): open_ctree failed 10:29:00 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="3801"], 0x138) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 10:29:00 executing program 5: sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000003280), 0xffffffffffffffff) 10:29:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}]}, 0x1c}}, 0x0) 10:29:00 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000004c0)={0x2020}, 0x2020) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB="1dc140c1013a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) 10:29:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:00 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x7, 0x0, 0x4) 10:29:00 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000100), 0x4) 10:29:00 executing program 1: shmget(0x2, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) socket(0x0, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000280)}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000001300)=ANY=[]) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x3b, 0x0, 0x0, 0x0, 0xbb03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4, 0x0, 0x7}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x8) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 10:29:00 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB="1dc140c1013a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) [ 736.676318][ T2090] loop4: detected capacity change from 0 to 267 [ 736.688052][ T2091] libceph: resolve 'Á@Á' (ret=-3): failed [ 736.704236][ T2091] libceph: Failed to parse monitor IPs: -3 10:29:00 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, 0x0) [ 736.812704][ T2090] BTRFS error (device loop4): superblock checksum mismatch [ 736.834375][ T2090] BTRFS error (device loop4): open_ctree failed [ 736.872825][ T2114] libceph: resolve 'Á@Á' (ret=-3): failed [ 736.896952][ T2114] libceph: Failed to parse monitor IPs: -3 [ 736.907749][ T2120] libceph: resolve 'Á@Á' (ret=-3): failed 10:29:00 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB="1dc140c1013a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) 10:29:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x174, &(0x7f0000000300)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 736.945807][ T2120] libceph: Failed to parse monitor IPs: -3 [ 737.128119][ T2140] libceph: resolve 'Á@Á' (ret=-3): failed [ 737.146011][ T2140] libceph: Failed to parse monitor IPs: -3 10:29:00 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="3801"], 0x138) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 10:29:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:00 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB="1dc140c1013a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) 10:29:00 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f0000000680), 0x4) 10:29:00 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB="1dc140c1013a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) [ 737.246313][ T2155] loop4: detected capacity change from 0 to 267 [ 737.277561][ T2155] BTRFS error (device loop4): superblock checksum mismatch 10:29:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000001980)=""/152, 0x98}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3b) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x109, &(0x7f0000000580)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 737.296634][ T2155] BTRFS error (device loop4): open_ctree failed 10:29:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0, 0x0, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:00 executing program 5: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/mm/ksm/run\x00', 0x1, 0x0) write$sysctl(r0, 0x0, 0x0) 10:29:00 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB="1dc140c1013a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) [ 737.353154][ T2164] libceph: resolve 'Á@Á' (ret=-3): failed [ 737.363087][ T2164] libceph: Failed to parse monitor IPs: -3 [ 737.384933][ T2163] libceph: resolve 'Á@Á' (ret=-3): failed [ 737.394846][ T2163] libceph: Failed to parse monitor IPs: -3 10:29:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x103382) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) [ 737.529055][ T2193] loop4: detected capacity change from 0 to 267 10:29:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x24, 0x2, 0x1, 0x3, 0x0, 0x0, {}, [@CTA_STATUS={0x8}, @CTA_MARK_MASK={0x8, 0x1a}]}, 0x24}}, 0x0) [ 737.580142][ T2193] BTRFS error (device loop4): superblock checksum mismatch [ 737.598065][ T2189] libceph: resolve 'Á@Á' (ret=-3): failed [ 737.608485][ T2189] libceph: Failed to parse monitor IPs: -3 [ 737.618173][ T2193] BTRFS error (device loop4): open_ctree failed 10:29:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, 0x0) 10:29:03 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000000000)=""/98, 0x62, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f", 0x7, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="240000001a005f0014f9f507000909", 0xf) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9b41000014", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x4148, 0x87a, 0x0, 0x4b6ae4f95a5de35b) 10:29:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {0x0, 0x0, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:03 executing program 2: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x7b, 0x4b, 0xb, 0x10, 0x1d50, 0x60a1, 0x9c83, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xa6, 0x2f, 0xb1}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000001880)={0x2c, &(0x7f0000001600), 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, &(0x7f0000000b40)={0x84, &(0x7f0000000700), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, &(0x7f0000000840)={0x44, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, &(0x7f0000001340)={0x84, &(0x7f0000000e40)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000040)={0x2c, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000480)={0x2c, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0}) 10:29:03 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001340)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in=@empty, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@private1, 0x0, 0x32}, @in=@dev}}}, 0xf8}}, 0x0) [ 740.115477][ T2232] loop4: detected capacity change from 0 to 267 [ 740.148663][ T2232] BTRFS error (device loop4): superblock checksum mismatch [ 740.158706][ T2236] netlink: 16549 bytes leftover after parsing attributes in process `syz-executor.5'. [ 740.173452][ T2232] BTRFS error (device loop4): open_ctree failed 10:29:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:03 executing program 1: clock_getres(0x0, &(0x7f0000000000)) io_setup(0x0, &(0x7f0000000040)) 10:29:03 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000600)={'ip6tnl0\x00', &(0x7f0000000580)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @private2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) 10:29:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0, 0x0, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) [ 740.390105][T32126] usb 3-1: new high-speed USB device number 20 using dummy_hcd 10:29:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000880)={'gretap0\x00', 0x0}) [ 740.456347][ T2260] loop4: detected capacity change from 0 to 267 [ 740.482496][ T2260] BTRFS error (device loop4): superblock checksum mismatch [ 740.493867][ T2260] BTRFS error (device loop4): open_ctree failed 10:29:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f00000000c0)=ANY=[], 0x20001290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000000880)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/71, 0x47}}, {{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000001ec0)=""/4096, 0x20002ec0}], 0x1}}], 0x2, 0x2100, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 10:29:04 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x8001}, 0x20) 10:29:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200), 0x0, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) [ 740.710206][T32126] usb 3-1: Using ep0 maxpacket: 16 [ 740.741026][ T2284] loop4: detected capacity change from 0 to 267 [ 740.784380][ T2284] BTRFS error (device loop4): superblock checksum mismatch [ 740.798766][ T2284] BTRFS error (device loop4): open_ctree failed [ 741.042656][T32126] usb 3-1: New USB device found, idVendor=1d50, idProduct=60a1, bcdDevice=9c.83 [ 741.052323][T32126] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 741.080098][T32126] usb 3-1: Product: syz [ 741.084349][T32126] usb 3-1: Manufacturer: syz [ 741.093235][T32126] usb 3-1: SerialNumber: syz [ 741.117655][T32126] usb 3-1: config 0 descriptor?? [ 741.600164][T32126] airspy 3-1:0.0: Board ID: 00 [ 741.604973][T32126] airspy 3-1:0.0: Firmware version: [ 742.650203][T32126] airspy 3-1:0.0: usb_control_msg() failed -71 request 10 [ 742.659448][T32126] airspy 3-1:0.0: Registered as swradio16 [ 742.666846][T32126] airspy 3-1:0.0: SDR API is still slightly experimental and functionality changes may follow [ 742.705398][T32126] usb 3-1: USB disconnect, device number 20 [ 743.430209][T32126] usb 3-1: new high-speed USB device number 21 using dummy_hcd [ 743.671944][T32126] usb 3-1: Using ep0 maxpacket: 16 10:29:07 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) 10:29:07 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000007140)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e20, 0x0, @remote}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000100)="56bd24", 0x3}, {&(0x7f0000000180)="4558ed9b607f48fda437bb75f30acc770d7cfd2341e462758a97f937d4cb042fb18cf3b4efb1ef1b22444ca3a4a13616a1bac05e916967773cc3d6cbeb4d9e10f029b39da625cc4c1216b8e672d49b95c3a27f0ddcabdd4c24a56c5815c82542f1e6aaa9d3d35e533194a4", 0x6b}, {&(0x7f0000000200)="7ea146425302", 0x6}], 0x3}}], 0x1, 0x0) 10:29:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200), 0x0, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) 10:29:07 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local}}) 10:29:07 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 10:29:07 executing program 1: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', 0x0, 0x20, &(0x7f0000000100)) [ 744.017682][ T2328] loop4: detected capacity change from 0 to 267 [ 744.051069][T32126] usb 3-1: New USB device found, idVendor=1d50, idProduct=60a1, bcdDevice=9c.83 10:29:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:07 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x0, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x4a40, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000300)="900000001c001f4d154a817393278bff0a808f7802000000ec36710014000100ac1414bb0542d6401051a2d708f37ac8da1a29760099c5ac0000c5b068d0bf46d3234565778d8757006113ffaf6c3efed495a46215be0000766426c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b001500de1df32c1739d7fbee9aa241fa18e9e0b39010d7cebf6f2cdabb54", 0x90, 0x0, 0x0, 0x0) [ 744.087939][T32126] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 744.114750][ T2328] BTRFS error (device loop4): superblock checksum mismatch [ 744.129418][T32126] usb 3-1: Product: syz [ 744.151602][ T2328] BTRFS error (device loop4): open_ctree failed [ 744.159485][T32126] usb 3-1: config 0 descriptor?? [ 744.190142][T32126] usb 3-1: can't set config #0, error -71 10:29:07 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x40) [ 744.199842][T32126] usb 3-1: USB disconnect, device number 21 [ 744.217928][ T2351] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.2'. 10:29:07 executing program 5: clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)={0x0, r0+60000000}, 0x0) 10:29:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x5393, &(0x7f0000000080)=ANY=[]) [ 744.259134][ T2359] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.2'. 10:29:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200), 0x0, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x16, &(0x7f00000003c0), 0x4) 10:29:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x5393, &(0x7f0000000080)=ANY=[]) [ 744.434261][ T2370] loop4: detected capacity change from 0 to 267 [ 744.450915][ T2370] BTRFS error (device loop4): superblock checksum mismatch [ 744.459575][ T2370] BTRFS error (device loop4): open_ctree failed 10:29:08 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) 10:29:08 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8930, &(0x7f0000000040)) 10:29:08 executing program 2: pipe(&(0x7f0000000580)={0xffffffffffffffff}) mmap$xdp(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x6, 0x13, r0, 0x0) 10:29:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00'/10, 0xa, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) signalfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) eventfd2(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000180)={0xd, 0xf8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000040)={0xffc}, 0x0, 0x0) 10:29:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) [ 744.644144][ T2388] loop4: detected capacity change from 0 to 267 [ 744.690583][ T2388] BTRFS error (device loop4): superblock checksum mismatch [ 744.713052][ T26] audit: type=1326 audit(1633256948.184:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2390 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f4e13b788d9 code=0x0 [ 744.718084][ T2388] BTRFS error (device loop4): open_ctree failed 10:29:08 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:08 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) 10:29:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00'/10, 0xa, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) [ 745.182122][ T2425] loop4: detected capacity change from 0 to 267 [ 745.241180][ T2425] BTRFS error (device loop4): superblock checksum mismatch [ 745.275139][ T2425] BTRFS error (device loop4): open_ctree failed 10:29:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00'/10, 0xa, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:08 executing program 5: sendmmsg$unix(0xffffffffffffffff, &(0x7f00000089c0)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="79f06482c9e54510bf7a5c2f", 0xc}], 0x1}}], 0x1, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x890c, &(0x7f00000000c0)={'sit0\x00', 0x0}) [ 745.504199][ T2452] loop4: detected capacity change from 0 to 267 [ 745.522450][ T26] audit: type=1326 audit(1633256948.994:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2390 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f4e13b788d9 code=0x0 10:29:09 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setrlimit(0x1, &(0x7f0000000000)={0x6, 0x3}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 10:29:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) [ 745.554615][ T2452] BTRFS error (device loop4): superblock checksum mismatch [ 745.565847][ T2452] BTRFS error (device loop4): open_ctree failed 10:29:09 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$bt_hci(r0, &(0x7f0000000000)={0x1, @le_read_iso_tx_sync={{0x2061, 0x2}}}, 0x6) recvfrom$unix(r1, &(0x7f0000000040)=""/167, 0xa7, 0x0, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) 10:29:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00', 0xf, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:09 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) 10:29:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:09 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}, 0x4}}, 0x26) [ 745.755566][ T2487] loop4: detected capacity change from 0 to 267 [ 745.785513][ T2487] BTRFS error (device loop4): superblock checksum mismatch 10:29:09 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) [ 745.813060][ T2487] BTRFS error (device loop4): open_ctree failed 10:29:09 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000100)) 10:29:09 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00', 0xf, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) [ 745.964473][ T2508] loop4: detected capacity change from 0 to 267 10:29:09 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) [ 746.035625][ T2508] BTRFS error (device loop4): superblock checksum mismatch [ 746.066191][ T2508] BTRFS error (device loop4): open_ctree failed [ 746.371569][ T1355] ieee802154 phy0 wpan0: encryption failed: -22 [ 746.378047][ T1355] ieee802154 phy1 wpan1: encryption failed: -22 10:29:10 executing program 2: clock_adjtime(0x0, &(0x7f0000000000)={0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff9ea69926}) 10:29:10 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:10 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc, 0x0, 0x4}, 0x40) 10:29:10 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00', 0xf, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:10 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) [ 747.045120][ T2553] loop4: detected capacity change from 0 to 267 10:29:10 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000300)='mm_compaction_end\x00'}, 0x10) 10:29:10 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) [ 747.088284][ T2553] BTRFS error (device loop4): superblock checksum mismatch [ 747.125394][ T2553] BTRFS error (device loop4): open_ctree failed 10:29:10 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)) ioctl$PPPIOCSNPMODE(r0, 0x8010743f, &(0x7f0000000040)) 10:29:10 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_CMAP(r0, 0x540e, 0x0) 10:29:10 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00', 0x12, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:10 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x1, 0x9, 0xfff, 0x80}, 0x82) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f00000003c0)={r0, 0x0, 0x0}, 0x20) 10:29:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000013a00)) setxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300), &(0x7f00000003c0)=@v2={0x0, 0x0, 0x0, 0x0, 0xdf8, "047b5d733c9e922e18b33288af75e70d82a1aa3b999652ab799b2d4c8c12ecfa1f7c82adb330a31a29b1786644035da3bdcef3f5482b706dec5c5609c192c5fa33fd98c01af35545cf0f336c02979cae1cddfac940ea989c45053b899245b60598cb4be85aaa49d9f916def88f6489ab1162c71d273d3ed17d349f9e922bea200fb2944257fa07753135a88999548637900a06900bbbd80af2ea54728b3409bcd47c09a07f7a200f86b8800ae26cddeeface169bc34be9fb98721481f45cd59383dcf696393d3af8bd5b42f3c9cc70129c5e5f6fcf5f3dd9f0615566caa300e6d71cd958c230f8e3c6ca17a7254281d596bad611750e78478bb479aaa82a5a5ef4dbe71a3b8d937a647e4249aace0622fec1d68a6b2fee4c48572c1aa63caeae6b842448c89e6ac5a3b4969b0daf77f2656d22e084469c9dbe56477e0337645183e9ddb996c0a69765d7fcd33503e4d46ab502898586cce513fc262eea668ae16cf06968164dba4599d751e90b2d47f8cf7ef7825d73479327b2518058c49e567afff0435185d19da2f776ae1d44692ca2c5de49ff6164be2f798a2e83f670269c35c3b2391c80b28180b886b16439ec9e4de9e52d4c6317be92bcc6262dcdb0fe22730fbc997b3beda71708ca1f29d46cd5855f090176481e30e157ca9639cfd6015e9d13200c759d38987fdbbd748a4b5fdfe50b3e15a0556d736fa0dd2d4add5ed0b42111e58a381390146bd3ebd49d55a691dadc751a908b1673e004ab568096845f42f785cbcda2551e861dbf246accfcd30039730bf27a0047683af423dd43ee464f7f2bd6dcce5c1c0af79578924d7619b3581ed03c44aeca2cb3d0e850c7283e2717b5e5984584d5a4d1730c82172c02ff69f834e1c724defcf7286775512babb3008d70459f199684b5685c256ef5386fc1f2bef9f9013840e33f9d293a86f93d54a733ce62e58dc520a58c0496fe049dd1b9c5b7bc0a4acc6769d2b7e936448f76255c2e9d8a4b2bafd9de13c6409b4dfa6bf96f8c45a933b54038860018dd5a1177a77dc6ba7bab50cec9d9dc916a58eb2afe60f1ab24b3e479480655005e602c4d9b59d67855dc7ecb2818f4fa94000a0d7dfc4d95847141666eb094ecdfce15d53375d27fe040511747b4df0554bf80d1752d22091fc1870497404324be04f81d39d50a222589e9108bddb4556355c8c6b78a5678054765568a547967b2a646d2834f7e8e599932d5cfaa2652946e1564fd3cc4602a115280df90a65ff5a16a2e9be87762318d74ea8ed49832aff24f9e4cc78c1e1ccee807eb4502278bf815595796f6cc363b24b8a9522bc30b800939bb2ff491cff35001127d6dff15515717529c09a6157813603850af6b93b8d70a4c0f801de310ca0654dd030991201e980ef0e63a63ee9de1e2fd654a173fbed0a72108f43d721c776afe9d8fca86d99dab7f18785c88edd11896f03a2eaac3440c2e159c9f83a92eca4b8c03b62e7c45fa25145560a49a16d24336f4f6e1445df363562a4a767920ee49127d1974cbf56eaec5a2e4dd36114ff71f282ffd199872a7487ac203b634eeeaae6876753a52ffcb1a6ae4d83239f4e0fa0a428f1c60630f66f26f5e458856652e86948bf4e131a091e2e748d176eaab8c795f2e14752116e9bfca6b8297c8d1c3de822f1e267b1a24a8281463619a39bb1cdbe317e6959c44c1f8e90b0d08717b6aea2335eed200b3ca35a1675c8329a970ff7e4a8cf819c1e7a20da07ad58a7b5a1f94454850ec2917a19878262cc3d23b795213dd9108f21e7b462d3a0b1c835f876ce6f19f090695ba5d17a87c01fda12d9c409f5568896344c4f1bf8801cc35caa4d02072a9b861c84e5d8841908b2751b19a75b5876bbd8916e4d39dd35c134e0859ecdbba1ed1d69b4443facbda7cd6049fca556059e955c9577f18a5f77d885c4ab5f248209e5640cedf4de2e442688182b84f4c619fdc263fa0ea88ccdad9576450d6368e4733c0758d3c366b8346155c690e54a9b1a46e4d68b72ecf4b7e584b4e4a2c380f48b47c0e757c2727344bf6d5b1d19329ef8d6aeeb513a16ec322b69a36142a9d5a2abfdab72fc30fd90087332b9661dedc882246ed29889e1169ade574707cf27516f82e4f6dbd2b4c6f33920fdc0b45e58aa0646c2feb5d338fab6a7388d4295a9ffed78d37df8fdf90a6a120949bd6890a5f2925e90113f384b4923c5e0e9fdb58242a10376d60eda1af1d30f3c69b729255b166449a1d476f49a9659cc2ceac26f7c6d1021d74520cd9000de4af5c43f212af42985ba503afa24a496ed8b572439a6f1508df25274ca057e308e5bf21006f992ad9e69b71e4c77cdd63a1c244773c12e4207dc3bc1eb558b42d60d8beace163d64fb384f8110acb18d4f68e8fdb7f9d5fd656ff4997f1bdf693a7fb12ffe96af823e49e9c6f9df5a1cc3c780222c75eceb01ee3fddf8319a99d069afb9fb3153fe5b5589acde2b9d3bd794827adff0df17aa3e8cc26decffc5e30475ef7aec000134c405b6a95afac3385335949ec3a9e284bc6414b764106b749cd1366ac074808a1cab2157f78a2d45ed078f067e253ce5a00913d11adacfd45b1ac7bd2fab58c918cf533e9ff0a590a6834ebb88174388013705a4ddbb158bb3d15d96103e35562a4e139fe780a147a6aba5b9a8fb13f3a8841434ff7b3d2d11d7a64032370e13da9caf86d13009c69ad0e7e89b129b501374c0c597c0349212ad8284ad9e64033cbcb150a9012d2ff367303f0db2fb0cc8a8997db602b71be4c57e65a98425754df5c944ce3051631fd3be1de364ddc664d1f1e28ed42036b189e42c2b1e79b8bf73b6130594f37e4395a712cf04baa69fb6df736f10e7d6f1eb67416b63bc1c62140177529fb346d78fbda05233d283a818b51404680405c75c1c437a14e3f960ee8f7e5ad553155a4f8d24063360c177acb3948ab0f04b33a599a36550cdb6d6b6a3e23851e28efbac8a4aa226873b7defb28c5f8dc159ff0f3d54f24b06096b4a31bc5c064868115dd14b1ee3ac3e4423587db1f0ca5ea03741985bf79b2522d0df5d68b55c271ac759e8e135ade422a4b79159d06c737db3f6330eff6c4d348a796b5bf19c517cd51d0ef1bdc03b586d8a4161774c22e432986b332738a55cf3a2be225ce04273090f25570a0227c7c2cfceb2febebd653feab7a08103477d731e69a0650e3c5b08fda54a6d1645e4716f0b9e486af10a3e63bd5033fff2f610d78c24ec5050bfef93611768d92c00fb931d56bbda2307f78e445fd4622c6d6f02946e212bdb85f97882206526c2393ee6b108e4a5bcb5143abe88049eb64b247aef21c68894cdae858a727cfb0c33992490d1fe44e6f4eb27665aa35b4b3124990d8712b6148f939df0fee4cfc26d8ff195dcc78ad53947b891bf9f7dc8e9657b5007ef46a7662f3dcfbd88ed3b3e46a1ea382889b731e284899449fec6a375d34791ff6102f6cc7f8e5a52876d843a3f4726717d4032da7b3d3d3713ea896bfd71d202bef2ce89fc3156472ad129713892295f7a021a1949315c652decc4674990febcc5598e4d2875ca4be116cc4e38b639e4f710e9dd8dab43ae705302a5d2081ccb786e684a6d61704b30c89b8f8e9d9edc0835262e454ce54cee2711ca40515db82efa06b61571b93daac6fe6f4191688e57ed657a1593a09a2dd645ef41ec560c62f9526c2709c342bb2e7d2a97e9f0199d7a8034eff0fe2e996d204510772095451c66b28b799a3d26f363e648ad759b288d60abd71805e2de20a0fcfe4c7b2fecd514b67bced52060e5759d0a0601082a7a5d0fd2a3107b4fb3f1d238da4c1ab78553bc3d26b01b757cb6660222c563495002242161c9605bf2a7b5f69b5d6ed99e9e04258a20e965580de1e9bf629c616f2a00124838f17c4da208de9147857694c974023a770a4940917c08a3715b20431d84802765268915a145a994b7c64673f606ec8f6903e9d8c09cf7438f58ee5c90f0b59098a8f09dcc3e3db0ea8f2e8b4e2543ac46f764a5e9e198f3500c658429f17db5f2bc75184a1cc8f1f676cab2e6631f6000c6e00257a4eae034c0fd7d27c629773dc335b14f54a6bcd6506a4d5a23a60769c75a9a68b35277230ac84d03f4f6eb5e0c599462768ab6ce9166ae86e93e077d3cb5075f97ae073110eca1e95f74f3d373e6bc09f07c2bcc99acf818e28a55201b77835d16730ac880f1bc607b1297da1b66a6a14f6389458b77d8e3a02510469922b972995bc352d84412d65695d5299eb24ecd8931f19ea943d79e67dfdfd1262caa9453e306c9d13cb8874dfd967465c0fcb674b3aa92d26e270f8d02ea79ec940d5fe09cd0063516794e613419b67cfe6344be0ec9564e4bace68d321be7b38a1a1ef4c06700648138a49766a01174e4291d338287b01565f3c152673801e3d3315672c302d6ed87b480740e630e8129e2b839bcf7abad2f65b7853799c27e8bd130cde24598ee95807baf609b4447ee7c64a914a02f41f4cf032966a018f8d357f3a407e335167ecc189c7cdea19b02faf6a1740403940a3f0e106948368e9253d6a1ea7c355a043d2cf8d37883b978a7c87d8da3a01d9d686efbf4bcc4f11eca9ce9ecd9146e18e874cab83af324c9d3a660e5c6e34fbd58d942157b058a8427ebc78f4309b91390d7710ae04b20ea1e8ccd2e2f1171569064b474adb1e9e28752b897890dec32705b20fedc4ac5df3bc3467bea3edfc3b47d63eb65031bc50c452e6d7155c7ad75bd08d57b0d53f13c12ed9617ec86f95aacb6c1ddaa5ab5759525d6f3e2d06873785179dc6e8b09747700078ad92d618dbb7cf36766f859ea7faf7d3c508a09c0666d25c042b31c481f7e7eccc4c769d3a5bf5bb782a8edd85e0d9c74bc94d62eb070ef696c9e111d64cca60e5a0fd9552f37fc8d9581ad6aafe181b8c5011122053797a70b7c3fe1a88d6eb0ccafa76e50d2f03d4fde53d15b2af4b0ae685aa15d65d742c92e9571311790bb7a8b1cafc1b2c23567a83c296b547816d7cfe"}, 0xe01, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000000c0), 0x24, 0x0) llistxattr(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 747.432198][ T2581] loop4: detected capacity change from 0 to 267 10:29:11 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) [ 747.530057][ T2581] BTRFS error (device loop4): superblock checksum mismatch [ 747.546454][ T2581] BTRFS error (device loop4): open_ctree failed 10:29:11 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002100)={0x0, 0x0, &(0x7f0000001a80)=[{0x0}, {&(0x7f00000005c0)='E', 0x1}], 0x2}, 0x0) [ 747.618066][ T2592] loop5: detected capacity change from 0 to 512 10:29:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) 10:29:11 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:11 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00', 0x12, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:11 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000440)=""/251, 0x26, 0xfb, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r0, 0x10, &(0x7f0000000180)={0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) [ 747.775787][ T2592] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 10:29:11 executing program 0: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) [ 747.833033][ T2610] loop4: detected capacity change from 0 to 267 [ 747.847543][ T2610] BTRFS error (device loop4): superblock checksum mismatch [ 747.872415][ T2610] BTRFS error (device loop4): open_ctree failed 10:29:11 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x2}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = dup(0xffffffffffffffff) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x400002, 0x0, 0x10, r4, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r5) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000040)={0x4, 0x1}) 10:29:11 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00', 0x12, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:11 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000030c0)={'sit0\x00', 0x0}) 10:29:11 executing program 0: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) 10:29:11 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:11 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:11 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000400)=""/232, 0xe8}, {&(0x7f00000000c0)=""/156, 0x97}, {&(0x7f0000000000)=""/104, 0x73}, {&(0x7f0000000500)=""/246, 0xf6}, {&(0x7f0000001700)=""/4081, 0x1000}, {&(0x7f0000003700)=""/4100, 0x1000}], 0x346, 0x0, 0xfffffffffffffef5}, 0x0) [ 748.110331][ T2632] loop4: detected capacity change from 0 to 267 [ 748.158761][ T2632] BTRFS error (device loop4): superblock checksum mismatch [ 748.174119][ T2632] BTRFS error (device loop4): open_ctree failed 10:29:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:12 executing program 2: syz_open_dev$usbmon(&(0x7f0000000100), 0xb87, 0x0) 10:29:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00', 0x13, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) [ 748.898013][ T2663] loop4: detected capacity change from 0 to 267 [ 748.928837][ T2663] BTRFS error (device loop4): superblock checksum mismatch [ 748.948074][ T2663] BTRFS error (device loop4): open_ctree failed 10:29:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00', 0x13, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:12 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)) ioctl$PPPIOCGNPMODE(r0, 0x4004743c, 0x0) 10:29:12 executing program 0: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) 10:29:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:12 executing program 5: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') [ 749.408694][ T2681] loop4: detected capacity change from 0 to 267 [ 749.433229][ T2681] BTRFS error (device loop4): superblock checksum mismatch [ 749.448555][ T2681] BTRFS error (device loop4): open_ctree failed 10:29:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x10, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) [ 749.483213][ T2688] syz-executor.2 (2688) used obsolete PPPIOCDETACH ioctl 10:29:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00', 0x13, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:13 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000040)={0x283}) 10:29:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x10, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:13 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000140)={0x0, 0x0}) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x0) [ 749.628159][ T2709] loop4: detected capacity change from 0 to 267 [ 749.662867][ T2709] BTRFS error (device loop4): superblock checksum mismatch 10:29:13 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) [ 749.699747][ T2709] BTRFS error (device loop4): open_ctree failed 10:29:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x10, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:13 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000780), 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) syz_open_dev$vcsa(&(0x7f0000000780), 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000780), 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$vcsa(&(0x7f0000000780), 0x0, 0x0) getpid() sendmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x10, 0x1, 0x1, [r0]}}], 0x10}, 0x0) 10:29:13 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) [ 749.925675][ T2742] loop4: detected capacity change from 0 to 267 [ 749.999816][ T2742] BTRFS error (device loop4): superblock checksum mismatch [ 750.038559][ T2742] BTRFS error (device loop4): open_ctree failed 10:29:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:13 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) 10:29:13 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001140)={0x11, 0x4, &(0x7f00000011c0)=@framed={{}, [@alu]}, &(0x7f0000000040)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080), 0x8, 0x10, &(0x7f0000001100), 0x10}, 0x24) 10:29:13 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:13 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x17, 0x8, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/3746], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffdf8}, 0x48) pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2ffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)=@deltaction={0x34, 0x31, 0x2, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}]}, @TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000005}, 0x0) ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, 0x0) clone(0x92000200, 0x0, 0x0, 0x0, 0x0) exit(0x0) openat$urandom(0xffffff9c, &(0x7f0000000240), 0x40, 0x0) [ 750.369698][ T2767] loop4: detected capacity change from 0 to 267 [ 750.399814][ T2767] BTRFS error (device loop4): superblock checksum mismatch [ 750.408554][ T2767] BTRFS error (device loop4): open_ctree failed 10:29:14 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x17, 0x8, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/3746], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffdf8}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2ffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) exit(0x0) r0 = openat$urandom(0xffffff9c, &(0x7f0000000240), 0x40, 0x0) write$binfmt_misc(r0, &(0x7f0000000380)={'syz1', "b86df0367478b9c3a828a3d923e7e3346c44ee86900b19263bd3549044f676a94dab6715d4720f4f8dd1c6e590b06687b005d7d2dc2089cce40d"}, 0x3e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 10:29:14 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:14 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) 10:29:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000005c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x4001, 0x5}]}]}, 0x20}}, 0x0) 10:29:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) [ 750.755835][ T2795] loop4: detected capacity change from 0 to 267 [ 750.806089][ T2795] BTRFS error (device loop4): superblock checksum mismatch [ 750.825334][ T2795] BTRFS error (device loop4): open_ctree failed 10:29:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:14 executing program 5: r0 = openat$nvram(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4140010, r0, 0x8000000) 10:29:14 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x17, 0x0, 0x2, 0x10, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xe}, 0x40) 10:29:14 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) 10:29:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:14 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000004b40)=[{{&(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10, 0x0}}, {{&(0x7f0000000640)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000001c40)=[@ip_ttl={{0x10, 0x0, 0x3}}], 0x10}}], 0x2, 0x0) [ 751.380422][ T2825] loop4: detected capacity change from 0 to 267 10:29:14 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000140)={'ip6gre0\x00', @ifru_map}) 10:29:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:15 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8901, &(0x7f00000003c0)={'batadv_slave_1\x00'}) 10:29:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x13, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x4, 0x340, 0xffffffff, 0x234, 0x144, 0x0, 0xffffffff, 0xffffffff, 0x320, 0x320, 0x320, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa4, 0xe4}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@loopback, @private0, [], [], 'bond0\x00', 'veth0_virt_wifi\x00'}, 0x0, 0xa4, 0xcc}, @common=@unspec=@NFQUEUE2={0x28}}, {{@ipv6={@mcast2, @dev, [], [], 'macvlan1\x00', 'erspan0\x00'}, 0x0, 0xa4, 0xc8}, @REJECT={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x39c) [ 751.610800][ T2840] loop4: detected capacity change from 0 to 267 10:29:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x8, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x4, 0x340, 0xffffffff, 0x234, 0x144, 0x0, 0xffffffff, 0xffffffff, 0x320, 0x320, 0x320, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa4, 0xe4}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@loopback, @private0, [], [], 'bond0\x00', 'veth0_virt_wifi\x00'}, 0x0, 0xa4, 0xcc}, @common=@unspec=@NFQUEUE2={0x28}}, {{@ipv6={@mcast2, @dev, [], [], 'macvlan1\x00', 'erspan0\x00'}, 0x0, 0xa4, 0xc8}, @REJECT={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x39c) 10:29:15 executing program 2: alarm(0xe8) alarm(0x0) 10:29:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:15 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) [ 752.316719][ T2865] loop4: detected capacity change from 0 to 267 10:29:15 executing program 2: mknod$loop(&(0x7f0000000700)='./file0\x00', 0x0, 0x1) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1010, 0x0) 10:29:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:15 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_DEV_SETUP(r0, 0x405c5503, 0x0) 10:29:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:15 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) 10:29:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:16 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f0000000980)=""/4103, 0x1007}], 0x2}, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) [ 752.525315][ T2884] input: syz0 as /devices/virtual/input/input25 [ 752.532995][ T2887] loop4: detected capacity change from 0 to 267 10:29:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) [ 752.587257][ T2894] input: syz0 as /devices/virtual/input/input26 10:29:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:16 executing program 2: r0 = msgget(0x0, 0x238) msgctl$IPC_RMID(r0, 0x0) [ 752.737651][ T2914] loop4: detected capacity change from 0 to 267 10:29:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:16 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f00000001c0), 0x4) 10:29:16 executing program 2: signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000), 0x6) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x147, 0x1000000, 0x0) 10:29:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:16 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, 0x0, 0x0) [ 753.245532][ T2943] loop4: detected capacity change from 0 to 267 10:29:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:16 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000240), 0x1, 0x60042) write$P9_RSTATu(r0, &(0x7f0000000280)={0x5c, 0x7d, 0x0, {{0x0, 0x47, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4, '@&\xc5/', 0xb, '/dev/vcsa#\x00', 0x4, ':^$)', 0xffffffb5, ')'}, 0x0, '', 0x0, 0x0, 0xffffffffffffffff}}, 0x5c) 10:29:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x5393, &(0x7f0000000080)=ANY=[@ANYBLOB='7']) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:16 executing program 2: signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000), 0x6) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x147, 0x1000000, 0x0) [ 753.518894][ T2968] loop4: detected capacity change from 0 to 267 10:29:17 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000240), 0x1, 0x60042) write$P9_RSTATu(r0, &(0x7f0000000280)={0x5c, 0x7d, 0x0, {{0x0, 0x47, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4, '@&\xc5/', 0xb, '/dev/vcsa#\x00', 0x4, ':^$)', 0xffffffb5, ')'}, 0x0, '', 0x0, 0x0, 0xffffffffffffffff}}, 0x5c) 10:29:17 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:17 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000240), 0x1, 0x60042) write$P9_RSTATu(r0, &(0x7f0000000280)={0x5c, 0x7d, 0x0, {{0x0, 0x47, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4, '@&\xc5/', 0xb, '/dev/vcsa#\x00', 0x4, ':^$)', 0xffffffb5, ')'}, 0x0, '', 0x0, 0x0, 0xffffffffffffffff}}, 0x5c) 10:29:17 executing program 2: signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000), 0x6) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x147, 0x1000000, 0x0) 10:29:17 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, 0x0, 0x0) [ 754.217077][ T2991] loop4: detected capacity change from 0 to 267 10:29:17 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000240), 0x1, 0x60042) write$P9_RSTATu(r0, &(0x7f0000000280)={0x5c, 0x7d, 0x0, {{0x0, 0x47, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4, '@&\xc5/', 0xb, '/dev/vcsa#\x00', 0x4, ':^$)', 0xffffffb5, ')'}, 0x0, '', 0x0, 0x0, 0xffffffffffffffff}}, 0x5c) 10:29:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:17 executing program 2: signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000), 0x6) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x147, 0x1000000, 0x0) 10:29:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010", 0x96, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:17 executing program 5: write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000280)={0x5c, 0x7d, 0x0, {{0x0, 0x47, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4, '@&\xc5/', 0xb, '/dev/vcsa#\x00', 0x4, ':^$)', 0xffffffb5, ')'}, 0x0, '', 0x0, 0x0, 0xffffffffffffffff}}, 0x5c) 10:29:17 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, 0x0, 0x0) [ 754.426549][ T3008] loop4: detected capacity change from 0 to 267 [ 754.449448][ T3008] BTRFS: device fsid 84eb0a0b-d357-4bc1-8741-9d3223c15974 devid 0 transid 7 /dev/loop4 scanned by syz-executor.4 (3008) 10:29:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) sendmmsg$inet6(r0, &(0x7f0000003c40)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0}}], 0x1, 0x8000) 10:29:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010", 0x96, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:18 executing program 5: write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000280)={0x5c, 0x7d, 0x0, {{0x0, 0x47, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4, '@&\xc5/', 0xb, '/dev/vcsa#\x00', 0x4, ':^$)', 0xffffffb5, ')'}, 0x0, '', 0x0, 0x0, 0xffffffffffffffff}}, 0x5c) 10:29:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:18 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) 10:29:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet6(0xa, 0x3, 0x8) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote, r2}, 0x14) 10:29:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) [ 755.164455][ T3031] loop4: detected capacity change from 0 to 267 10:29:18 executing program 5: write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000280)={0x5c, 0x7d, 0x0, {{0x0, 0x47, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4, '@&\xc5/', 0xb, '/dev/vcsa#\x00', 0x4, ':^$)', 0xffffffb5, ')'}, 0x0, '', 0x0, 0x0, 0xffffffffffffffff}}, 0x5c) 10:29:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010", 0x96, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:18 executing program 5: r0 = syz_open_dev$vcsa(0x0, 0x1, 0x60042) write$P9_RSTATu(r0, &(0x7f0000000280)={0x5c, 0x7d, 0x0, {{0x0, 0x47, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4, '@&\xc5/', 0xb, '/dev/vcsa#\x00', 0x4, ':^$)', 0xffffffb5, ')'}, 0x0, '', 0x0, 0x0, 0xffffffffffffffff}}, 0x5c) 10:29:18 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000b40)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 10:29:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) r2 = syz_open_dev$sg(0x0, 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:18 executing program 5: r0 = syz_open_dev$vcsa(0x0, 0x1, 0x60042) write$P9_RSTATu(r0, &(0x7f0000000280)={0x5c, 0x7d, 0x0, {{0x0, 0x47, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4, '@&\xc5/', 0xb, '/dev/vcsa#\x00', 0x4, ':^$)', 0xffffffb5, ')'}, 0x0, '', 0x0, 0x0, 0xffffffffffffffff}}, 0x5c) [ 755.437835][ T3051] loop4: detected capacity change from 0 to 267 10:29:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) r2 = syz_open_dev$sg(0x0, 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, 0x0) 10:29:19 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:19 executing program 5: r0 = syz_open_dev$vcsa(0x0, 0x1, 0x60042) write$P9_RSTATu(r0, &(0x7f0000000280)={0x5c, 0x7d, 0x0, {{0x0, 0x47, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4, '@&\xc5/', 0xb, '/dev/vcsa#\x00', 0x4, ':^$)', 0xffffffb5, ')'}, 0x0, '', 0x0, 0x0, 0xffffffffffffffff}}, 0x5c) 10:29:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045010000000000000100000000010000000000000000000001000000000000720000000000", 0xe1, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) r2 = syz_open_dev$sg(0x0, 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:19 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) 10:29:19 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000400)={[{@overriderock}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:29:19 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000240), 0x0, 0x60042) write$P9_RSTATu(r0, &(0x7f0000000280)={0x5c, 0x7d, 0x0, {{0x0, 0x47, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4, '@&\xc5/', 0xb, '/dev/vcsa#\x00', 0x4, ':^$)', 0xffffffb5, ')'}, 0x0, '', 0x0, 0x0, 0xffffffffffffffff}}, 0x5c) [ 756.105726][ T3083] loop4: detected capacity change from 0 to 267 10:29:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) [ 756.155742][ T3083] BTRFS: device fsid 84eb0a0b-d357-4bc1-8741-9d3223c15974 devid 1 transid 7 /dev/loop4 scanned by syz-executor.4 (3083) 10:29:19 executing program 2: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001040)) 10:29:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) [ 756.228273][ T3083] BTRFS error (device loop4): superblock checksum mismatch [ 756.255038][ T3083] BTRFS error (device loop4): open_ctree failed 10:29:19 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000240), 0x0, 0x60042) write$P9_RSTATu(r0, &(0x7f0000000280)={0x5c, 0x7d, 0x0, {{0x0, 0x47, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4, '@&\xc5/', 0xb, '/dev/vcsa#\x00', 0x4, ':^$)', 0xffffffb5, ')'}, 0x0, '', 0x0, 0x0, 0xffffffffffffffff}}, 0x5c) 10:29:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045010000000000000100000000010000000000000000000001000000000000720000000000", 0xe1, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) [ 756.464408][ T3115] loop4: detected capacity change from 0 to 267 [ 756.478944][ T3115] BTRFS error (device loop4): superblock checksum mismatch [ 756.488685][ T3115] BTRFS error (device loop4): open_ctree failed 10:29:20 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000540)={0x1eb0, 0xd, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1dac, 0x3, 0x0, 0x1, [{0x1288, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_USERDATA={0xd5, 0x6, 0x1, 0x0, "325f1a120343591f31d77bdbe0f0080906bcd7a26586ab81f43a582b84a86e9f85650460c0cf919ef334c2540cf9a81c841faa51dde0ddca2eb8551b81b00f7931f9689ad97885962ec71c9ea0577a8fb935d6175be8d019637c863e3656a3821af22cdbda36b612970ccff2a79724f6705336d3aaa5f2c37b4205e97f6389fa9da2d6ba0f639bf5b59dc4a8a47eaf46a1b17beb3db795c8d5c46d55991f4f28b6428255afd2fe8b6b4856da59a2c3753d1fe3d3544978eaa959084d8e80b5b706786f3c8d54b6c4363a06e49bb3012c06"}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_KEY_END={0x1034, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x9, 0x1, "ed061bcaf3"}, @NFTA_DATA_VALUE={0x1001, 0x1, "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"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_DATA={0x138, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x8d, 0x1, "3b879be50a380f1265e2b6615ae37f174f48c0aeb996a598620629da8d88b16c14625203205b92fa5cd6e1d264b4294a952088fc0b43a45b94ae1b550adb5cc89bea14b9a21d00965240afc66539df8f33ac2a0dacbe5ea11e0f311145c31a4348f38f3e8fcce2b0e756e06f09588bf799cca2f623697591622326bec9228a1e1fa729eb4a843d0d1b"}, @NFTA_DATA_VALUE={0x81, 0x1, "fc31ed5e06238365b658c5435018548e25ebcc5e400cbd89359bc0bd350d064cf03199db97e46013b310cfe40f5bf5035d29bbde6ef4fcb1b336c1655755544c81129e84f5b7804d6755bb8ec0fc127322f3a9ec005d80f87d023805f1fcc9f7ba732cf11769ac2d9cd103d8bb57bcd1b302438f67172371a447651daf"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0x358, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0xf8, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x7d, 0x1, "5aa9891d6560b2d5bbf4b38a37a8ea7940de01e95e1c98050624dbb3fc0af77a4356b3ca56d9dc55cad0bc41666190140a6ed755b447f538c2b0a310aef295281ab43f171432c3f6e5d2376aa3eca032d1cb27ff5ba2221d2c6ffb547b07d339dd0b1f09111b0b2cb12a398b0fa79fc779973fbcd2764e905d"}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_DATA={0x1d0, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x65, 0x1, "379186b9156948fcfdbe42e0b652e3d10cf2f8bcedd831e695c6a5bab894138081972325b3447ba9f5535891feedece561f3ce1b1f26045b026d2512dca6a611c7acfaeba93738570c672d2e83f31f3eee5dbd18604f473853fef5559ca69dd473"}, @NFTA_DATA_VERDICT={0x5c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x41, 0x1, "94a7e79edd452051d3f9f4cf9d74bcaa1e5476575eeabdca1ef7aa0fa82b64b945ec7eb1434db0cd2e3f23774318793a949ee279e03d0fbbbf44006d6f"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x4}]}, @NFTA_SET_ELEM_USERDATA={0x75, 0x6, 0x1, 0x0, "9806153c814a641c22509e301001beddef6de94152fd2d968c4eed60796c39cdfa21f2594f3352c0872b8c066017b67e4a6ce9229f106ad326c823d49cc2e1268b1f3008bb470ac3123a968be4db12e49b427944eb48564548633e8a94917d1d7921b7c33253c4586be9636317c947f9b4"}]}, {0x554, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x108, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xb1, 0x1, "eb873c10b89285376506bdeab46fac274e0bf5a8282a12bc25c119c73b1727b8354dc0b78e4f6db9de4a4a50286e5204493b3ea9f3787ccb8e369290caa1e9a9e020f2f3b1a9a05b3355bdb5cf843611415c049f7c31458f5bf5a1d104fad15ed077257336a39e5c5b6022e03059968a085d9ba92af783b2b189e8314697b2eadaa9883c9aea40545f17d81a1f5e9e457195c5571d379d48ee2e4297ecfed9f0c484338ffc0a9141160ee51185"}, @NFTA_DATA_VALUE={0x4d, 0x1, "ea4e203fa5e81f5b21803ebada4dd90e347bb710e4ee751dbf46f91a7e98875d363f3b2902009853a4442a5a1dee406e9988eef41abc3978ae9b4cac1125f21377553aabcfecd0ec78"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_DATA={0x1e0, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x81, 0x1, "3fec9843dbe0bb10f4103ca3b5bd2910178697ac7e68de7e50c8bed038d1fa745427255a298c2e5465b8b363893afb6387050549fd68b3164b4f2968c1e670cd9b7fd766f9a9932a29ebd77be73ab243f6b1f65844d2c5d0bf456fec11481bf80e7bc29691f0ddb4bb0a648773b946acfc723d781f1004d6934f625f52"}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VALUE={0x85, 0x1, "a5229b235199b2a713805cf46f892e5da1a754cb5dbca235e317e7c20d5f2e406e118d74ce68a250b00c23da702e75eb477797de8eeb57b6bb771017ca058dd87762be09607a1112dacad6b37c5f5a60dc8e9cf72125a1cd40612521e8630b07b8b72f9f4e18e6cf00d44caddd666794caf4640641798941c1f92d7ca6f1b13821"}, @NFTA_DATA_VALUE={0x31, 0x1, "921bc8011f10bfaae0b9b849a1a19e444272f06fd54db8c29803f1c21fece144eb15294ac449c51cf7a3a57ed2"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_DATA={0x204, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0xe1, 0x1, "37434f69906708bba9f6b713b042e99ad36843a3ad1e2de79a40ab3c4482316d4fc3a3b8e45ec5255131054b58abb6125dca9cf62a9648e51af51be47e6394d4325142b7c44b3943ba388fc8f1474525bcc1cc9e77fc9948364c1eeb84a32d2c44ee686ad7a11d257ca9b65cea9e1c689515ba5e61a3f55acb742637e6f56399669fc8cfd41baddf3bb029abe0905ca1eda20b4a881d751dc71135c02ad7accd6eb08171f29026f87674265a1e491c67d7c423341bb41cd1a7a6e742ab2607ba247720847e73be5e9fc4473e94a85474af2141033155e97584b1a025bb"}, @NFTA_DATA_VALUE={0x99, 0x1, "9a285470c72464f9a6bd378b6e5eac86f2dfbdc934562dac04e635005ae992628ac79944e4ac629c82c65203ef7035b198696b4cdd27431d6601e2fef8a36926b5845feefefef9ff14520125cc4b5240bb3fc582da5aae7ac57e198e5d08be49118bed36a900cbe8aa62d9b1938981db0c109fac6993f7b1cdd35a2af234bb79a865d5b34aa602735a6971c6948a06faf2b7d724bd"}, @NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_USERDATA={0x31, 0x6, 0x1, 0x0, "d1c67cc238a1b2d012d5417274e74867cc0f6bc52b2fd8b31ec2d6446fc41c8a4186badb44ec3568379763fec5"}]}, {0x24c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x248, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xf5, 0x1, "8402e2ec6519b77de16c2716f527947d020ba6479c81529ef8985dda558177a8de2ffad6ad61cc8c6ffa9216b48452b14d355b4b5d6533a167c4734583fe63b5f2621bf0fc2c3b38ec170c91358a47fbfd9f828902616379afbafb06c67e9bb306d9899768c8e1a5281b24f18996b60756c019d6e14ba03c9dcd9f53e86142a680f08f2833e1aa2d157e78e8cb1f44e8dd7016e16ff16b7033e9e1f7fb121ba818e5d6a1b37e35140a5ed325968ba44e1154517e14e1bc4ce376607f7baee2ad93695150fd6ee5a0c2b1ff864d216d4ac0e5388e4d395c927c960256c66da1b599abce3ecb65750b8efb03f361fdfd876e"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0xf5, 0x1, "9e4037f2702efdd208dfab53d37c16c61496ba63c7a74ac393831548102f54cc2e8ee89664d3984d5d908d18df98b23c261a2f1be5949951d589f30202e57e04373ce22e9f344136c5086dc030a57ee98f3d86e2cff960d1b8a40ae4c7c2381f91a6ed0af9cd3ca82b0986ff525119b1be4b1657e7a894e0ae32a72b51b7a54c034be83be73f1731da27e08396f8396cc5ab67dfac344db7f97804f99208f79e179cf3d04f4ade492f57786aa20cd7ca77418d2d1c1a68584bdd778089e7a5ea60ac72f94c466a70dbff3dc9dc41e156df13b15f9fbef1654da40fb5e4ac0a10f2f38690291c53e69bb273384322adac83"}]}]}, {0x28, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}]}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xe8, 0x3, 0x0, 0x1, [{0xe4, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_USERDATA={0x31, 0x6, 0x1, 0x0, "4d374534cf61b9bb17924a1cd69b69afe1878efd3073a2df0736f60f9289ea87e7bb8be027af065adca44f3840"}, @NFTA_SET_ELEM_DATA={0xa4, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x75, 0x1, "a43a062cdbb119872dbb8002cc856a45e8af8212d17b2d4fec24d9b5de6a1a3b6a8604868762a0a65694f42aad358318bdedd6021fd90d08076303382cd5444273218388e2787df577a2377bed8eefd782c692dd3923fe4169bfdcc3a7e9ec8ae1eb5c469332544df9522151bd77b36f12"}]}]}]}]}, 0x1eb0}}, 0x0) 10:29:20 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) 10:29:20 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000240), 0x0, 0x60042) write$P9_RSTATu(r0, &(0x7f0000000280)={0x5c, 0x7d, 0x0, {{0x0, 0x47, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4, '@&\xc5/', 0xb, '/dev/vcsa#\x00', 0x4, ':^$)', 0xffffffb5, ')'}, 0x0, '', 0x0, 0x0, 0xffffffffffffffff}}, 0x5c) 10:29:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045010000000000000100000000010000000000000000000001000000000000720000000000", 0xe1, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:20 executing program 2: add_key(&(0x7f0000000100)='asymmetric\x00', 0x0, 0x0, 0xff77, 0x0) [ 757.086644][ T3140] loop4: detected capacity change from 0 to 267 10:29:20 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000240), 0x1, 0x0) write$P9_RSTATu(r0, &(0x7f0000000280)={0x5c, 0x7d, 0x0, {{0x0, 0x47, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4, '@&\xc5/', 0xb, '/dev/vcsa#\x00', 0x4, ':^$)', 0xffffffb5, ')'}, 0x0, '', 0x0, 0x0, 0xffffffffffffffff}}, 0x5c) 10:29:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x5393, &(0x7f0000000080)=ANY=[]) [ 757.142221][ T3140] BTRFS error (device loop4): superblock checksum mismatch [ 757.169122][ T3140] BTRFS error (device loop4): open_ctree failed 10:29:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000"/262, 0x106, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:20 executing program 2: syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nr_inodes}]}) 10:29:20 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000240), 0x1, 0x0) write$P9_RSTATu(r0, &(0x7f0000000280)={0x5c, 0x7d, 0x0, {{0x0, 0x47, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4, '@&\xc5/', 0xb, '/dev/vcsa#\x00', 0x4, ':^$)', 0xffffffb5, ')'}, 0x0, '', 0x0, 0x0, 0xffffffffffffffff}}, 0x5c) 10:29:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:20 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) [ 757.458637][ T3162] loop4: detected capacity change from 0 to 267 [ 757.476346][ T3161] tmpfs: Bad value for 'nr_inodes' [ 757.492480][ T3161] tmpfs: Bad value for 'nr_inodes' 10:29:21 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000240), 0x1, 0x0) write$P9_RSTATu(r0, &(0x7f0000000280)={0x5c, 0x7d, 0x0, {{0x0, 0x47, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4, '@&\xc5/', 0xb, '/dev/vcsa#\x00', 0x4, ':^$)', 0xffffffb5, ')'}, 0x0, '', 0x0, 0x0, 0xffffffffffffffff}}, 0x5c) [ 757.547306][ T3162] BTRFS error (device loop4): superblock checksum mismatch [ 757.561731][ T3162] BTRFS error (device loop4): open_ctree failed 10:29:21 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x0, @loopback}}}, 0xa0) 10:29:21 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000100)=@abs={0x1}, 0x6e) 10:29:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x5393, &(0x7f0000000080)=ANY=[]) 10:29:21 executing program 5: syz_open_dev$vcsa(&(0x7f0000000240), 0x1, 0x60042) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000280)={0x5c, 0x7d, 0x0, {{0x0, 0x47, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4, '@&\xc5/', 0xb, '/dev/vcsa#\x00', 0x4, ':^$)', 0xffffffb5, ')'}, 0x0, '', 0x0, 0x0, 0xffffffffffffffff}}, 0x5c) 10:29:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000"/262, 0x106, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:21 executing program 2: prctl$PR_SET_MM_MAP(0x29, 0xe, &(0x7f0000000080)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000fed000/0x10000)=nil, &(0x7f0000ff0000/0x4000)=nil, 0x0}, 0x68) 10:29:21 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, 0x0) 10:29:21 executing program 5: syz_open_dev$vcsa(&(0x7f0000000240), 0x1, 0x60042) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000280)={0x5c, 0x7d, 0x0, {{0x0, 0x47, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4, '@&\xc5/', 0xb, '/dev/vcsa#\x00', 0x4, ':^$)', 0xffffffb5, ')'}, 0x0, '', 0x0, 0x0, 0xffffffffffffffff}}, 0x5c) [ 757.896923][ T3188] loop4: detected capacity change from 0 to 267 [ 757.949787][ T3188] BTRFS error (device loop4): superblock checksum mismatch [ 757.968047][ T3188] BTRFS error (device loop4): open_ctree failed 10:29:21 executing program 2: setuid(0xee01) socket$key(0xf, 0x3, 0x2) 10:29:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, 0x0) 10:29:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000"/262, 0x106, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) [ 758.230399][ T3212] loop4: detected capacity change from 0 to 267 [ 758.259038][ T3212] BTRFS error (device loop4): superblock checksum mismatch [ 758.275699][ T3212] BTRFS error (device loop4): open_ctree failed 10:29:21 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x0, @loopback}}}, 0xa0) 10:29:21 executing program 5: syz_open_dev$vcsa(&(0x7f0000000240), 0x1, 0x60042) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000280)={0x5c, 0x7d, 0x0, {{0x0, 0x47, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4, '@&\xc5/', 0xb, '/dev/vcsa#\x00', 0x4, ':^$)', 0xffffffb5, ')'}, 0x0, '', 0x0, 0x0, 0xffffffffffffffff}}, 0x5c) 10:29:21 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000ac0)={'wpan0\x00'}) 10:29:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5393, &(0x7f0000000080)=ANY=[]) r2 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x5393, 0x0) 10:29:21 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) recvmmsg(r1, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:21 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000240), 0x1, 0x60042) write$P9_RSTATu(r0, 0x0, 0x0) 10:29:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000000180)=""/228, &(0x7f0000000280)=0xe4) [ 758.448905][ T3230] loop4: detected capacity change from 0 to 267 10:29:21 executing program 3: madvise(&(0x7f0000ecb000/0x4000)=nil, 0x4000, 0x12) mremap(&(0x7f0000fbc000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000ecb000/0x3000)=nil) [ 758.490799][ T3230] BTRFS: device fsid 84eb0a0b-d357-4bc1-8741-9d3223c15974 devid 1 transid 7 /dev/loop4 scanned by syz-executor.4 (3230) [ 758.525324][ T3230] BTRFS error (device loop4): superblock checksum mismatch 10:29:22 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) recvmmsg(r1, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) [ 758.536611][ T3230] BTRFS error (device loop4): open_ctree failed 10:29:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:22 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xc, &(0x7f0000000080)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000fed000/0x10000)=nil, &(0x7f0000ff0000/0x4000)=nil, 0x0}, 0x68) [ 758.744089][ T3251] loop4: detected capacity change from 0 to 267 [ 758.768205][ T3251] BTRFS error (device loop4): superblock checksum mismatch [ 758.777635][ T3251] BTRFS error (device loop4): open_ctree failed 10:29:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x0, @loopback}}}, 0xa0) 10:29:22 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x2) 10:29:22 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000240), 0x1, 0x60042) write$P9_RSTATu(r0, 0x0, 0x0) 10:29:22 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) recvmmsg(r1, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:22 executing program 3: utimensat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) 10:29:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:22 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0xffffffffffffff77, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0xffffffffffffff77, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r2) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f0000000000)={r4}, &(0x7f00000000c0)=0xb0) 10:29:22 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000240), 0x1, 0x60042) write$P9_RSTATu(r0, 0x0, 0x0) [ 758.957403][ T3271] loop4: detected capacity change from 0 to 267 [ 758.988701][ T3271] BTRFS error (device loop4): superblock checksum mismatch 10:29:22 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x28, &(0x7f0000000280)=ANY=[], &(0x7f00000002c0)=0x8) 10:29:22 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) recvmmsg(r0, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) [ 759.017075][ T3271] BTRFS error (device loop4): open_ctree failed 10:29:22 executing program 5: r0 = socket(0x2, 0x1, 0x84) r1 = dup(r0) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x14, &(0x7f0000000000), 0x4) 10:29:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x122, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) [ 759.260353][ T3294] sctp: [Deprecated]: syz-executor.5 (pid 3294) Use of int in max_burst socket option deprecated. [ 759.260353][ T3294] Use struct sctp_assoc_value instead 10:29:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0, 0x2000}], 0x1, 0x0, 0x0, 0x0) 10:29:22 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x26, &(0x7f0000000280), &(0x7f00000002c0)=0x8) 10:29:22 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000340), &(0x7f0000000080)=0x8) 10:29:22 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f0000000180), &(0x7f0000000240)=0xb0) [ 759.310953][ T3297] loop4: detected capacity change from 0 to 267 [ 759.324375][ T3297] BTRFS: device fsid 84eb0a0b-d357-4bc1-8741-9d3223c15974 devid 1 transid 7 /dev/loop4 scanned by syz-executor.4 (3297) [ 759.339368][ T3297] BTRFS error (device loop4): superblock checksum mismatch [ 759.353435][ T3297] BTRFS error (device loop4): open_ctree failed 10:29:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x122, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:22 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x27, &(0x7f0000000080), &(0x7f0000000100)=0x8) 10:29:22 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, &(0x7f0000000140)=ANY=[], &(0x7f00000003c0)=0xc) [ 759.517535][ T3313] loop4: detected capacity change from 0 to 267 [ 759.572368][ T3313] BTRFS error (device loop4): superblock checksum mismatch [ 759.597370][ T3313] BTRFS error (device loop4): open_ctree failed 10:29:23 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x900, &(0x7f0000000280), &(0x7f0000000380)=0x8) 10:29:23 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) 10:29:23 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) recvmmsg(r0, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574b", 0x122, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:23 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000100)='\v', 0x1}], 0x1, &(0x7f0000000300)=[@dstaddrv4={0x10, 0x84, 0x9, @local={0xac, 0x14, 0x0}}], 0x10}, 0x0) [ 759.987116][ T3345] loop4: detected capacity change from 0 to 267 [ 760.016437][ T3345] BTRFS error (device loop4): superblock checksum mismatch [ 760.027249][ T3345] BTRFS error (device loop4): open_ctree failed 10:29:23 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f00000001c0), 0x8c) 10:29:23 executing program 3: r0 = socket(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000000)={0x5, 0x6, 0xce, 0xffcd}, 0x8) 10:29:23 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0xf, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet(r0, &(0x7f00000003c0)={0x10, 0x2}, 0x10) dup2(r0, r1) r2 = fcntl$dupfd(r1, 0x0, r1) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xa, &(0x7f00000002c0), &(0x7f0000000380)=0x98) 10:29:23 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f00000005c0), 0x84) 10:29:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x127, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:23 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000100), &(0x7f0000000140)=0x8) 10:29:23 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000100), &(0x7f0000000180)=0x10) [ 760.407058][ T3371] loop4: detected capacity change from 0 to 267 10:29:23 executing program 3: r0 = socket(0x1c, 0x5, 0x0) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:23 executing program 2: socket(0x1c, 0x3, 0x5) [ 760.460607][ T3371] BTRFS error (device loop4): superblock checksum mismatch [ 760.485415][ T3371] BTRFS error (device loop4): open_ctree failed 10:29:24 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) recvmmsg(r0, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:24 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000340)={0x0, @in, 0x0, 0x0, 0x110}, 0x98) 10:29:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d32", 0x127, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:24 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x107, &(0x7f0000000280), &(0x7f00000002c0)=0x18) 10:29:24 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000005c0)={&(0x7f0000000180)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f00000004c0)=[@prinfo={0x14}, @sndrcv={0x2c}], 0x40}, 0x0) 10:29:24 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x25, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x19, &(0x7f0000000100), 0x8) 10:29:24 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x1d, &(0x7f0000000080)={0x0, 0x4}, 0x8) 10:29:24 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x26, &(0x7f0000000000), 0x8) [ 761.061254][ T3411] loop4: detected capacity change from 0 to 267 10:29:24 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000005c0)={&(0x7f0000000180)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f00000004c0)=[@prinfo={0x14}, @sndrcv={0x2c}], 0x40}, 0x0) [ 761.101901][ T3411] BTRFS error (device loop4): superblock checksum mismatch [ 761.109642][ T3411] BTRFS error (device loop4): open_ctree failed 10:29:24 executing program 3: open(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) 10:29:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x127, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:24 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000005c0)={&(0x7f0000000180)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f00000004c0)=[@prinfo={0x14}, @sndrcv={0x2c}], 0x40}, 0x0) [ 761.478307][ T3434] loop4: detected capacity change from 0 to 267 [ 761.542320][ T3434] BTRFS error (device loop4): superblock checksum mismatch [ 761.555302][ T3434] BTRFS error (device loop4): open_ctree failed 10:29:25 executing program 1: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:25 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, &(0x7f0000000680)={@loopback}, 0x14) 10:29:25 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0xf, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet(r0, &(0x7f00000003c0)={0x10, 0x2}, 0x10) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000000)=0x8) 10:29:25 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000005c0)={&(0x7f0000000180)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f00000004c0)=[@prinfo={0x14}, @sndrcv={0x2c}], 0x40}, 0x0) 10:29:25 executing program 0: r0 = socket(0x2, 0x1, 0x84) r1 = dup(r0) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x14, &(0x7f0000000000)={0x1, [0x0]}, 0x6) 10:29:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x129, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:25 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@un=@file={0xa}, 0xa) 10:29:25 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x46, 0x0, 0x0) [ 761.979405][ T3459] loop4: detected capacity change from 0 to 267 10:29:25 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0xffffffffffffff77, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r0, r1) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x15, &(0x7f0000000180)={r3}, &(0x7f0000000240)=0x8) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) r5 = fcntl$dupfd(r4, 0x0, r4) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0xf, &(0x7f0000000100), &(0x7f0000000280)=0xc) [ 762.036350][ T3459] BTRFS error (device loop4): superblock checksum mismatch [ 762.072475][ T3459] BTRFS error (device loop4): open_ctree failed 10:29:25 executing program 1: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:25 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) listen(r0, 0xfff) 10:29:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000180)="bad75e693175ff4ccfc4", 0xfffffec5}, {&(0x7f0000000300)="76df8cfefa7ddac22dcfcf9e00c693a47524fbfa60133f4bf9500ca94f344e4dd28a9ec9014befb0ea01a514ea8c7c66e5e88e77a778affc2a2030f7fbfa96fe6c14a0c75aee26637a81e3bcb693e7513645eb550c7adad4103ebae473f42372227fa59722490bdd9f2774cffe4bd181ffffffffffffffc3788e745965108c770cc26d1936bcc660d3ccbf2feaeb4603347ab0", 0x93}], 0x2, 0x8) 10:29:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c1", 0x129, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:25 executing program 5: pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCPNGETOBJECT(r0, 0x89e0, 0x0) 10:29:25 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b34, &(0x7f0000000000)='wlan1\x00\xff\x04\xec\xb5\x12\x03F\xd9\x0e\x00\xff\x05\x00 \x00\x00\x00\x00(\x00\x02\x00,\t\xfdj\xe3\x85\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbbg\xc18\x84\xb5%f\xcb\xe8oOArYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff\x809P\xee\x8aG\xdd2\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW0\x16\xc6G\xa3N\xc7\xd4\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\xd5\x8c\x80\x90(\x9f\x95\x86\"\x8a\x96\xf5\x19\xb6\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xb9\xf93\xac\x14\x1fXf\xfd\xd0\x1e\x83\x7f\x80\xddL\x1bt% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1de\xf2z\x90\x15s\xf3\xce\xcd\x91\xa8\xeb\b\xae+\xea^\x8b\x05B\xc5\x1a\xdc,\x8bE\xa2<\x82e\xecI\xb4p\x05\xa3\x1bra\x9ax\x943\x00\xe5M\xefM\xda[\xb8\x86\xae\xb7') 10:29:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001280)={0xffffffffffffffff}) getpid() getpid() sendmsg$unix(r0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}, 0x0) [ 762.371760][ T3498] loop4: detected capacity change from 0 to 267 10:29:25 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x84) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5411, &(0x7f0000000000)) 10:29:25 executing program 1: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:25 executing program 5: pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCPNGETOBJECT(r0, 0x89e0, 0x0) [ 762.442055][ T3498] BTRFS error (device loop4): superblock checksum mismatch 10:29:26 executing program 5: getresgid(&(0x7f0000000840), 0x0, 0x0) [ 762.484271][ T3498] BTRFS error (device loop4): open_ctree failed 10:29:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x129, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001280)={0xffffffffffffffff}) getpid() getpid() sendmsg$unix(r0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}, 0x0) 10:29:26 executing program 2: socketpair(0x18, 0x0, 0x2, &(0x7f0000000180)) 10:29:26 executing program 5: pipe(0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) [ 762.708544][ T3524] loop4: detected capacity change from 0 to 267 10:29:26 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:26 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0), r0) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:29:26 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x4e21, @dev}, @in6={0xa, 0x4e21, 0x0, @private2}], 0x2c) [ 762.753296][ T3524] BTRFS error (device loop4): superblock checksum mismatch [ 762.794209][ T3524] BTRFS error (device loop4): open_ctree failed 10:29:26 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @private1}], 0x1c) 10:29:26 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x84) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5411, &(0x7f0000000000)) 10:29:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12a, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:26 executing program 2: sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, 0x0, 0x8000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000b80), 0xffffffffffffffff) connect$netlink(0xffffffffffffffff, 0x0, 0x0) 10:29:26 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0), r0) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:29:26 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xc}]}]}}, &(0x7f0000000240)=""/4085, 0x36, 0xff5, 0x1}, 0x20) 10:29:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x18, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:29:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001c00)=""/4096, 0x28, 0x1000, 0x1}, 0x20) [ 763.152835][ T3558] loop4: detected capacity change from 0 to 267 [ 763.193054][ T3558] BTRFS error (device loop4): superblock checksum mismatch 10:29:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x2, &(0x7f0000000080)=@raw=[@map_val], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 763.258385][ T3558] BTRFS error (device loop4): open_ctree failed 10:29:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/4085, 0x1a, 0xff5, 0x1}, 0x20) 10:29:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12a, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:26 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:27 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x84) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5411, &(0x7f0000000000)) 10:29:27 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:27 executing program 2: perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 10:29:27 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002280)={0x11, 0x5, &(0x7f0000000100)=@raw=[@exit, @call, @map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @exit, @alu, @call, @func], &(0x7f0000000180)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000001280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 763.522440][ T3585] loop4: detected capacity change from 0 to 267 [ 763.538274][ T3585] BTRFS error (device loop4): superblock checksum mismatch [ 763.552366][ T3585] BTRFS error (device loop4): open_ctree failed 10:29:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12a, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:27 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x26, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f0000000240)=""/4085, 0x26, 0xff5, 0x1}, 0x20) 10:29:27 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) close(r0) 10:29:27 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) [ 763.790078][ T3608] loop4: detected capacity change from 0 to 267 10:29:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x26, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f0000000240)=""/4085, 0x26, 0xff5, 0x1}, 0x20) 10:29:27 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:27 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x14, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 763.871849][ T3608] BTRFS error (device loop4): superblock checksum mismatch [ 763.899038][ T3608] BTRFS error (device loop4): open_ctree failed 10:29:27 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000100), 0x10) 10:29:27 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x10}]}]}}, &(0x7f0000001c00)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 10:29:27 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmmsg(r0, &(0x7f0000008600)=[{}, {{&(0x7f0000000200)=@un=@file={0x1, './file0/../file0/file0\x00'}, 0x80, &(0x7f00000026c0)=[{&(0x7f0000000140)}, {0x0}, {&(0x7f0000000200)}, {&(0x7f00000024c0)="42f48bebf3abfd0a5e3db7c04f1fe14d06f9aa88d849752a4dc93bbc22e521f9909d36ea", 0x24}, {0x0}], 0x5, &(0x7f0000000600)}}], 0x2, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000340)={'veth0_to_team\x00', {0x2, 0x0, @multicast1}}) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x1c) fcntl$setstatus(r2, 0x4, 0x6100) write$FUSE_NOTIFY_STORE(r2, 0x0, 0x87ffffc) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x17ffff2, 0x4002011, r3, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r1, 0x200004) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f00000003c0)="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", 0x2000, 0x0) r4 = open(&(0x7f0000000380)='./bus\x00', 0x17e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r4, 0x0, 0x8080fffffffe) 10:29:27 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:27 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) [ 764.187066][ T3638] loop4: detected capacity change from 0 to 267 10:29:27 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 10:29:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) 10:29:27 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:27 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) [ 764.476640][ T26] audit: type=1326 audit(1633256967.940:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3649 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f4e13b788d9 code=0x0 10:29:28 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) [ 764.522942][ T3658] loop4: detected capacity change from 0 to 267 10:29:28 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f00000009c0)={0x2, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, [@sadb_x_nat_t_port={0x1, 0x15}, @sadb_address={0x3, 0x5, 0x0, 0xa0}]}, 0x30}}, 0x0) 10:29:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @remote}, 0x10) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @tipc=@name={0x1e, 0x2, 0x0, {{0x41}, 0x2}}, @nl=@proc={0x10, 0x0, 0x25dfdbff, 0x40}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x1, 0x0, 0x0, 0x0, 0xc000, &(0x7f0000000040)='gre0\x00', 0x7fffffff, 0x3, 0x719}) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) socket$packet(0x11, 0xa, 0x300) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x734, 0x0, 0xffffffffffffff39) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) 10:29:28 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}, {@autodefrag}]}) [ 764.819079][ T3676] loop4: detected capacity change from 0 to 267 10:29:28 executing program 3: io_setup(0x40000, &(0x7f0000000000)) 10:29:28 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:28 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) [ 764.898531][ T3682] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 10:29:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, 0x0) 10:29:28 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:28 executing program 3: setsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0xffffffffffffffff}, 0xc) madvise(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) [ 765.213496][ T3697] loop4: detected capacity change from 0 to 267 10:29:28 executing program 5: r0 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:28 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @remote}, 0x10) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @tipc=@name={0x1e, 0x2, 0x0, {{0x41}, 0x2}}, @nl=@proc={0x10, 0x0, 0x25dfdbff, 0x40}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x1, 0x0, 0x0, 0x0, 0xc000, &(0x7f0000000040)='gre0\x00', 0x7fffffff, 0x3, 0x719}) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) socket$packet(0x11, 0xa, 0x300) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x734, 0x0, 0xffffffffffffff39) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) 10:29:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, 0x0) 10:29:30 executing program 3: syz_emit_ethernet(0x7e, &(0x7f0000000240)={@local, @random, @val, {@ipv6}}, 0x0) 10:29:30 executing program 5: r0 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:30 executing program 0: r0 = socket(0x1, 0xc005, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 10:29:30 executing program 3: clock_getres(0x3ba6b22aeab5b66c, 0x0) [ 767.448831][ T3731] loop4: detected capacity change from 0 to 267 10:29:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, 0x0) 10:29:31 executing program 5: r0 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:31 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000040)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 10:29:31 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:31 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000040)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) [ 767.823977][ T3754] loop4: detected capacity change from 0 to 267 10:29:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @remote}, 0x10) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @tipc=@name={0x1e, 0x2, 0x0, {{0x41}, 0x2}}, @nl=@proc={0x10, 0x0, 0x25dfdbff, 0x40}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x1, 0x0, 0x0, 0x0, 0xc000, &(0x7f0000000040)='gre0\x00', 0x7fffffff, 0x3, 0x719}) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) socket$packet(0x11, 0xa, 0x300) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x734, 0x0, 0xffffffffffffff39) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) 10:29:32 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}]}) 10:29:32 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000040)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 10:29:32 executing program 0: r0 = socket(0x2, 0x2, 0x0) getsockopt$sock_int(r0, 0xffff, 0x10, 0x0, 0x0) 10:29:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:32 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000040)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 10:29:32 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) [ 769.195802][ T3783] loop4: detected capacity change from 0 to 267 [ 769.261392][ T3783] BTRFS info (device loop4): allowing degraded mounts [ 769.277265][ T3783] BTRFS info (device loop4): disk space caching is enabled 10:29:32 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000200)={0x0, @in, 0x2, 0x0, 0x2}, 0x98) [ 769.334784][ T3783] BTRFS info (device loop4): has skinny extents 10:29:32 executing program 0: mlock(&(0x7f0000ff1000/0xf000)=nil, 0xf000) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 10:29:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000cc0)='./file0\x00', 0x200, 0x0) fcntl$getown(r0, 0x5) 10:29:33 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) [ 769.681451][ T3783] attempt to access beyond end of device [ 769.681451][ T3783] loop4: rw=4096, want=2064, limit=267 [ 769.761168][ T3783] BTRFS error (device loop4): failed to read chunk root [ 769.941398][ T3783] BTRFS error (device loop4): open_ctree failed 10:29:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @remote}, 0x10) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @tipc=@name={0x1e, 0x2, 0x0, {{0x41}, 0x2}}, @nl=@proc={0x10, 0x0, 0x25dfdbff, 0x40}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x1, 0x0, 0x0, 0x0, 0xc000, &(0x7f0000000040)='gre0\x00', 0x7fffffff, 0x3, 0x719}) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) socket$packet(0x11, 0xa, 0x300) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x734, 0x0, 0xffffffffffffff39) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) 10:29:34 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0xffffffffffffff77, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r2) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={r4}, 0x14) 10:29:34 executing program 0: r0 = shmget(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmat(r0, &(0x7f0000fed000/0x13000)=nil, 0x1000) 10:29:34 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}]}) 10:29:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:34 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f00000002c0), 0x8) [ 771.138694][ T3842] loop4: detected capacity change from 0 to 267 10:29:34 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) [ 771.221730][ T3842] BTRFS info (device loop4): allowing degraded mounts [ 771.271374][ T3842] BTRFS info (device loop4): disk space caching is enabled [ 771.343681][ T3842] BTRFS info (device loop4): has skinny extents 10:29:34 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)=@ipv6_deladdrlabel={0x1c, 0x49, 0x1}, 0x1c}}, 0x0) 10:29:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000000)=@ipv6_deladdrlabel={0x1c, 0x49, 0x1, 0x0, 0x0, {0xa, 0x0, 0x88}}, 0x1c}}, 0x0) 10:29:35 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) [ 771.733395][ T3842] attempt to access beyond end of device [ 771.733395][ T3842] loop4: rw=4096, want=2064, limit=267 [ 771.768982][ T3842] BTRFS error (device loop4): failed to read chunk root [ 771.870467][ T3842] BTRFS error (device loop4): open_ctree failed 10:29:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@ipv4_newrule={0x24, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_PRIORITY={0x8, 0x6, 0xffff}]}, 0x24}}, 0x0) 10:29:36 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$getflags(r0, 0x401) 10:29:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{}]}) 10:29:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000e00)={0x0, @l2tp={0x2, 0x0, @multicast2}, @ipx={0x4, 0x0, 0x0, "8ca19ea8adf8"}, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000dc0)='syzkaller0\x00'}) 10:29:36 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) [ 772.801832][ T3895] loop4: detected capacity change from 0 to 267 [ 772.824899][ T3895] BTRFS info (device loop4): allowing degraded mounts 10:29:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$netlink(0xffffffffffffffff, &(0x7f000000f000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x1d, 0x0, 0x0, @ipv4=@multicast1}]}]}, 0x1c}], 0x1}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="a0010000100013070000000000000000ac1414bb000000000000000000000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="fe8000000000000000000000000000bb0000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000083020000000000000000000000000000000000000000000000000000000000000000000000000000000200000096000000000000004800020063626328646573335f65646529000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c0017"], 0x1a0}}, 0x0) 10:29:36 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="03042a015c0060004003002cfff57b016d2763bd56373780398d537503e51002591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801601842fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) [ 772.860216][ T3895] BTRFS info (device loop4): disk space caching is enabled [ 772.893696][ T3895] BTRFS info (device loop4): has skinny extents 10:29:36 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:36 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x3b, 0x8, 0x0, 0x39c9}) [ 772.977165][ T3915] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.3'. 10:29:36 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:36 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="03042a045c0060004003002cfff57b016d2763bd56373780398d537503e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801601842fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) 10:29:36 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) [ 773.123249][ T3895] attempt to access beyond end of device [ 773.123249][ T3895] loop4: rw=4096, want=2064, limit=267 [ 773.159662][ T3895] BTRFS error (device loop4): failed to read chunk root 10:29:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x38, 0x0, 0x9, 0x301, 0x0, 0x0, {}, [@NFCTH_STATUS={0x8}, @NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x38}}, 0x0) [ 773.179223][ T3947] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.3'. [ 773.466176][ T3895] BTRFS error (device loop4): open_ctree failed [ 773.565624][ T3957] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 10:29:37 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:37 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:37 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x6c0180, 0x0) 10:29:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="d187304eeef79f7a00000000000000000000000000000000000000000000000084eb0a0bd3574bc187419d3223c15974000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000001000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000000df2d02f661843fea2224e6775d94d5b84eb0a0bd3574bc187419d3223c15974", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@autodefrag}]}) 10:29:37 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="03042a045c0060004003002cfff57b016d2763bd56373780398d537503e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801601842fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) 10:29:37 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/cgroup', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, 0x0) 10:29:37 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="03042a045c0060004003002cfff57b016d2763bd56373780398d537503e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801601842fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) 10:29:37 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="03042a01f40260004003002cfff57b016d2763bd56373780398d537503e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801601842fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) [ 773.754490][ T3970] loop4: detected capacity change from 0 to 267 [ 773.792773][ T3970] BTRFS info (device loop4): enabling auto defrag 10:29:37 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x3}]}, 0x1c}}, 0x0) [ 773.804492][ T3970] BTRFS info (device loop4): disk space caching is enabled [ 773.813030][ T3970] BTRFS info (device loop4): has skinny extents 10:29:37 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:37 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="03042a01f40260004003002cfff57b016d2763bd56373780398d537503e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801601842fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) [ 774.103314][ T3970] attempt to access beyond end of device [ 774.103314][ T3970] loop4: rw=4096, want=2064, limit=267 [ 774.126491][ T3970] BTRFS error (device loop4): failed to read chunk root [ 774.225318][ T3970] BTRFS error (device loop4): open_ctree failed 10:29:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:38 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x80247009, &(0x7f0000000100)) 10:29:38 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:38 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="03042a045c0060004003002cfff57b016d2763bd56373780398d537503e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801601842fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) 10:29:38 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="03042a01f40260004003002cfff57b016d2763bd56373780398d537503e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801601842fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) 10:29:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@autodefrag}]}) 10:29:38 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) [ 774.652325][ T4024] loop4: detected capacity change from 0 to 267 10:29:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x24, 0x4, 0x8, 0x801, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x11}]}, 0x24}}, 0x0) [ 774.710196][ T4024] BTRFS info (device loop4): enabling auto defrag [ 774.732448][ T4024] BTRFS info (device loop4): disk space caching is enabled 10:29:38 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="03042a01f40260004003002cfff57b016d2763bd56373780398d537503e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801601842fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) 10:29:38 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) [ 774.771519][ T4024] BTRFS info (device loop4): has skinny extents 10:29:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x78, 0x0, 0x9, 0x301, 0x0, 0x0, {}, [@NFCTH_PRIV_DATA_LEN={0x8}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8}}, @NFCTH_TUPLE={0x44, 0x2, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}]}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x78}}, 0x0) 10:29:38 executing program 3: socketpair$unix(0x2, 0x2, 0x0, &(0x7f0000000000)) [ 774.991804][ T4059] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 775.037844][ T4059] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 775.049439][ T4024] attempt to access beyond end of device [ 775.049439][ T4024] loop4: rw=4096, want=2064, limit=267 [ 775.081302][ T4024] BTRFS error (device loop4): failed to read chunk root [ 775.164856][ T4024] BTRFS error (device loop4): open_ctree failed 10:29:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x0, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:38 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, 0x0, 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:38 executing program 3: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000000580)={0x0, 'syz1\x00'}) 10:29:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x18, &(0x7f00000003c0), 0x4) 10:29:38 executing program 0: syz_emit_ethernet(0x56, &(0x7f0000000140)={@multicast, @local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "a68e01", 0x1c, 0x6, 0x0, @remote, @private0, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0xc2, 0x8000, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @nop]}}}}}}}}, 0x0) 10:29:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000000df2d02f661843fea2224e6775d94d5b", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@autodefrag}]}) 10:29:39 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, 0x0, 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:39 executing program 2: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, 0x0, 0x0) [ 775.616926][ T4079] loop4: detected capacity change from 0 to 267 10:29:39 executing program 3: socketpair(0x1f, 0x0, 0x0, &(0x7f0000000140)) [ 775.688059][ T4079] BTRFS info (device loop4): enabling auto defrag [ 775.727376][ T4079] BTRFS info (device loop4): disk space caching is enabled 10:29:39 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, 0x0, 0x90}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x0, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) [ 775.757101][ T4079] BTRFS info (device loop4): has skinny extents 10:29:39 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$pptp(0x18, 0x1, 0x2) splice(r1, 0x0, r0, &(0x7f0000000040), 0x2, 0x0) 10:29:39 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000140)=0x4) 10:29:39 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:39 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000002840)={&(0x7f0000000200)=@in={0x10, 0x2}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000240)='y', 0x1}], 0x1, &(0x7f0000002700)=[@prinfo={0x14, 0x84, 0x7, {0x3}}, @init={0x14, 0x84, 0x1, {0x18, 0xfff, 0x2, 0x1}}, @sndrcv={0x2c}], 0x54}, 0x0) 10:29:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x0, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:39 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, 0x0, 0x0) [ 776.099215][ T4079] attempt to access beyond end of device [ 776.099215][ T4079] loop4: rw=4096, want=2064, limit=267 [ 776.118094][ T4079] BTRFS error (device loop4): failed to read chunk root [ 776.185890][ T4079] BTRFS error (device loop4): open_ctree failed 10:29:39 executing program 0: connect(0xffffffffffffffff, &(0x7f0000000ac0)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 10:29:39 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x900, &(0x7f0000000080)={0x0, 0x65}, 0x8) 10:29:39 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000040), &(0x7f0000000100)=0x98) 10:29:39 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:39 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000), &(0x7f00000000c0)=0x98) 10:29:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:39 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x2}, 0x1c) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0}, 0x0) 10:29:39 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 10:29:39 executing program 2: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000300)=""/249) 10:29:40 executing program 4: sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)='\b', 0x1}], 0x1}, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x25, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) 10:29:40 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, 0x0, 0x0) 10:29:40 executing program 0: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/78) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 10:29:40 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000000)={0x0, 0x0, 0x3f}, 0x8) 10:29:40 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:40 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, 0x0, 0x0) 10:29:40 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg(r0, &(0x7f0000001a80)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f00000018c0)=[{0xc}, {0xc}], 0x18}, 0x0) 10:29:40 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x1203, &(0x7f0000000040), &(0x7f0000000000)=0x3a) 10:29:40 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f00000005c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000700)=[{0xc}, {0xc}], 0x18}, 0x0) 10:29:40 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:40 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, &(0x7f0000000540)=ANY=[], 0x90}, 0x0) sendmsg$inet(r0, 0x0, 0x0) 10:29:40 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x3}, 0x1c) sendto$inet6(r0, &(0x7f0000000400)='q', 0x1, 0x0, &(0x7f0000000140)={0x1c, 0x1c, 0x3}, 0x1c) 10:29:40 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000400)=[@init={0x14}], 0x14}, 0x0) 10:29:40 executing program 4: r0 = socket$inet6(0x1c, 0x5, 0x0) getsockopt$inet6_int(r0, 0x29, 0x16, 0x0, &(0x7f0000000140)) 10:29:40 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x15, &(0x7f0000000100), &(0x7f0000000140)=0x8) 10:29:40 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:40 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 10:29:40 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x0, 0xfffffffb}, 0x10) 10:29:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xf7}, 0x14) 10:29:40 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x1, 0x0, &(0x7f00000000c0)) 10:29:40 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000000180)="b4", 0x1, 0x0, 0x0, 0x0) 10:29:40 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000280)='{', 0x1}], 0x1, &(0x7f00000003c0)=[{0xc}], 0xc}, 0x0) 10:29:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, &(0x7f0000000040)='\\', 0x1, 0x0, &(0x7f0000000280)=@in={0x10, 0x2}, 0x10) 10:29:40 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind(r0, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) 10:29:41 executing program 3: openat$ptmx(0xffffff9c, 0x0, 0x59aa49d5172f2681, 0x0) 10:29:41 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x84, &(0x7f0000000280)=@in={0x10, 0x2}, 0x10) 10:29:41 executing program 0: openat$ptmx(0xffffff9c, &(0x7f00000003c0), 0x400, 0x0) 10:29:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x28, &(0x7f0000000180)=ANY=[], &(0x7f00000002c0)=0x8) 10:29:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, &(0x7f00000000c0)=""/145, 0x91, 0x0, 0x0, 0x0) 10:29:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept4$inet(r0, 0x0, 0x0, 0x0) 10:29:41 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:41 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000180)={0x1c, 0x1c, 0x3}, 0x1c) dup2(r1, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000000c0), &(0x7f0000000000)=0x98) 10:29:41 executing program 3: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x10, 0x2}, 0x10) 10:29:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000002840)={&(0x7f0000000200)=@in={0x10, 0x2}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000240)='y', 0x1}], 0x1, &(0x7f0000002700)=[@init={0x14, 0x84, 0x1, {0x0, 0xfff, 0x2, 0x1}}, @sndrcv={0x2c}], 0x40}, 0x0) 10:29:41 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000180)={0xfffffffffffffdf3, 0x1c, 0x1}, 0x1c) sendmsg(r0, &(0x7f00000005c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)="c3", 0x1}], 0x1}, 0x0) 10:29:41 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000200)=@in6={0x1c, 0x1c, 0x2}, 0x1c) connect(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 10:29:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000600)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000840000000a000000ec"], 0x1c}, 0x0) 10:29:41 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:41 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000002840)={&(0x7f0000000200)=@in={0x10, 0x2}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000240)='y', 0x1}], 0x1, &(0x7f0000002700)=[@prinfo={0x14}, @init={0x14}], 0x28}, 0x0) 10:29:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x6, 0x401}, 0x14) 10:29:42 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000000180)="b4", 0x1, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)=""/223, 0xdf}], 0x1}, 0x0) 10:29:42 executing program 2: r0 = socket(0x1c, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c}, 0x1c) 10:29:42 executing program 3: accept$inet(0xffffffffffffffff, &(0x7f0000001900), &(0x7f0000001940)=0x10) 10:29:42 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000200)=@in6={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) writev(r0, &(0x7f0000001400)=[{&(0x7f0000000000)="a9233f2d89716aeb36ccc600d573b105a9cabc6f70cd38fbd772e4fe1f5d3b6782a2068da0fc1d963890fe747100c8cac2f86544df6b2dc879bfc9f9259bc7b1bce9fa0950441284fe66e42928339405a9aa24e23ebbefe353d5c5f0b48eb2b91294a01df4510a369239dfd2de5f4c770fb0", 0x72}, {&(0x7f00000001c0)="4b87e77c915284f8425a08d43d33b3be87b2d65314128a3820d158bfb2c6c33226bb09d8b3d66fb186e57254359d8c54d5", 0x31}, {&(0x7f0000000240)="de8672f96a56298f25f3ddc4d707f19305c6c10be129adfa4305e4763bef79efd9088b27a92de57716067de9a92185fe2a217105fa0fb59cd0f88a70bcd0d8ed80295d7e9569ab298eefdea61b39192e732807a3e9c043eb2cbeab0788caa88d2640ff70c7c14be9370c9927f104d915b363722304b6063d64fa27c48a3eba2e14066f2cf83975574df7e9a61ff21fb71f7167e73794f065f03ed6fc290b5db4df79503f02926944a6aabb58e1fde2fd784bc057a0e26ac00c708b939abb2f287bcf331f69e769ffd16ee48d7aba5519574fc69e6916b2026017a32d2bc75db0f2adb7635920530689624db3c399e29f4b7c", 0xf2}, {&(0x7f0000000340)="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", 0xe5c}], 0x4) 10:29:42 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000002840)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002700)=[@prinfo={0x14}], 0x14}, 0x0) 10:29:42 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:42 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x1}, 0x1c) 10:29:42 executing program 2: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/78) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000300)=""/249) 10:29:42 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000200)=@v={0x93, 0x0, 0x90}) 10:29:42 executing program 4: r0 = socket(0x2b, 0x1, 0x0) getsockopt$packet_buf(r0, 0x107, 0x29, 0x0, 0x0) 10:29:42 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:42 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$SNDCTL_MIDI_PRETIME(r0, 0xc0046d00, &(0x7f0000000180)=0x3) 10:29:42 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x5452, &(0x7f00000000c0)=@generic={0x3}) 10:29:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x101, 0x300, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x50}}, 0x0) 10:29:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x10b, &(0x7f0000000580)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:29:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x107, &(0x7f0000000580)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:29:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x5c, 0x2, 0x6, 0x101, 0x300, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}}, 0x0) 10:29:42 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x2, @broadcast, 'bond_slave_0\x00'}}, 0x1e) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e000f000000e8bd6efb250314000e000100240248ff050005001200", 0x4f}], 0x1}, 0x0) 10:29:42 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x80045105, &(0x7f00000000c0)=@generic) 10:29:42 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940), 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:43 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_IOCTL(r0, &(0x7f0000000080)={0x20, 0xfffffffffffffff5, r1}, 0x20) [ 779.519327][ T4362] device bond0 entered promiscuous mode [ 779.537015][ T4362] device bond_slave_0 entered promiscuous mode [ 779.550631][ T4362] device bond_slave_1 entered promiscuous mode 10:29:43 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x2, @broadcast, 'bond_slave_0\x00'}}, 0x1e) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e000f000000e8bd6efb250314000e000100240248ff050005001200", 0x4f}], 0x1}, 0x0) 10:29:43 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x2, @broadcast, 'bond_slave_0\x00'}}, 0x1e) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e000f000000e8bd6efb250314000e000100240248ff050005001200", 0x4f}], 0x1}, 0x0) 10:29:43 executing program 5: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 10:29:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940), 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:43 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000008, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x15b, &(0x7f0000000580)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:29:45 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$SNDCTL_TMR_SOURCE(r0, 0x4004510d) 10:29:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940), 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:45 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000200)={@local, @remote, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @private}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x4}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57}}}}}}, 0x0) 10:29:45 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x2, @broadcast, 'bond_slave_0\x00'}}, 0x1e) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e000f000000e8bd6efb250314000e000100240248ff050005001200", 0x4f}], 0x1}, 0x0) 10:29:45 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$SNDCTL_SEQ_SYNC(r0, 0x5101) 10:29:45 executing program 4: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002100)='ns/uts\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 10:29:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000280)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000002c0)={0x44, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x7f}]}, 0x44}}, 0x0) 10:29:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0), 0x4) 10:29:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@uni_xlate}]}) 10:29:46 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff232, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r4 = socket$netlink(0x10, 0x3, 0xb) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 10:29:46 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001d00000000000000000021850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_ext_handle_unwritten_extents\x00', r2}, 0x10) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r3, 0x208202) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) [ 782.638127][ T4416] FAT-fs (loop2): bogus number of reserved sectors [ 782.678504][ T4416] FAT-fs (loop2): Can't find a valid FAT filesystem [ 782.774427][ T4416] FAT-fs (loop2): bogus number of reserved sectors [ 782.785402][ T26] audit: type=1800 audit(1633256986.251:130): pid=4426 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14961 res=0 errno=0 [ 782.800431][ T4416] FAT-fs (loop2): Can't find a valid FAT filesystem 10:29:46 executing program 5: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xc) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="2c00000024000b0f000000000000000000020000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100647272"], 0x2c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000880)=@newtfilter={0x34, 0x28, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0xd}}, [@filter_kind_options=@f_flow={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000840)=@newtfilter={0x30, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0xd}}, [@filter_kind_options=@f_fw={{0x7}, {0x4}}]}, 0x30}}, 0x0) 10:29:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:46 executing program 2: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208202) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) [ 783.064632][ T26] audit: type=1800 audit(1633256986.531:131): pid=4441 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=14956 res=0 errno=0 [ 783.107820][ T4442] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 10:29:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000040)=0xffffffffffffff38) [ 783.238251][ T4451] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 783.243894][ T26] audit: type=1800 audit(1633256986.711:132): pid=4454 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14961 res=0 errno=0 10:29:46 executing program 5: fork() waitid(0x0, 0x0, 0x0, 0xc0000007, 0x0) 10:29:46 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001d00000000000000000021850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_ext_handle_unwritten_extents\x00', r2}, 0x10) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r3, 0x208202) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) 10:29:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) [ 783.492746][ T26] audit: type=1800 audit(1633256986.961:133): pid=4463 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=14956 res=0 errno=0 10:29:47 executing program 5: socketpair(0x26, 0x5, 0x16, &(0x7f0000000000)) 10:29:47 executing program 2: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208202) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) [ 783.580248][ T26] audit: type=1800 audit(1633256987.011:134): pid=4466 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14901 res=0 errno=0 10:29:47 executing program 5: bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100)=0xffffffffffffffff, 0x4) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000440)) 10:29:47 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000040)={@val, @val, @ipx={0xffff, 0x1e, 0x0, 0x0, {@random, @broadcast}, {@broadcast, @broadcast}}}, 0x33fe0) [ 783.738238][ T26] audit: type=1800 audit(1633256987.201:135): pid=4477 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=14922 res=0 errno=0 10:29:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000011c0)={&(0x7f0000001000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x2}}, &(0x7f0000001100)=""/130, 0x1a, 0x82, 0x1}, 0x20) 10:29:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x300}]}}, &(0x7f0000000280)=""/208, 0x2a, 0xd0, 0x1}, 0x20) 10:29:47 executing program 4: r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000002dc0)={0x0, 0x0, 0xffbffff8}) 10:29:47 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f0000000080)=0xffffffff) 10:29:47 executing program 5: r0 = openat$tcp_mem(0xffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) write$tcp_mem(r0, 0x0, 0xffffffffffffffa2) 10:29:47 executing program 2: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208202) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) 10:29:47 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001d00000000000000000021850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_ext_handle_unwritten_extents\x00', r2}, 0x10) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r3, 0x208202) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) 10:29:47 executing program 4: r0 = gettid() r1 = fork() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000002dc0)={0x0, 0x0, 0xfdfffff8}) [ 784.405442][ T26] audit: type=1800 audit(1633256987.871:136): pid=4500 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=14965 res=0 errno=0 10:29:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') write$binfmt_script(r0, 0x0, 0x0) 10:29:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) [ 784.555527][ T26] audit: type=1800 audit(1633256987.931:137): pid=4499 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14967 res=0 errno=0 10:29:48 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2c, 0x0, 0x0) 10:29:48 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x23, &(0x7f0000004740)=@nat={'nat\x00', 0x1b, 0x5, 0x570, 0x1d0, 0x0, 0xffffffff, 0x3d8, 0x1d0, 0x620, 0x620, 0xffffffff, 0x620, 0x620, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:traceroute_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@private, 'macsec0\x00'}}}, {{@ipv6={@empty, @loopback, [], [], 'veth0_to_bond\x00', 'veth0_to_team\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@dev, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@private1, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5d0) 10:29:48 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x5c}, {0x5}, {0x6}]}) 10:29:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:48 executing program 2: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208202) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) [ 785.024588][ T26] audit: type=1326 audit(1633256988.491:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4519 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f629c1b78d9 code=0x0 [ 785.078110][ T26] audit: type=1800 audit(1633256988.491:139): pid=4524 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=14967 res=0 errno=0 10:29:48 executing program 0: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000180)={0x200443, 0x73ce3f267e391a8}, 0x18) 10:29:48 executing program 5: prctl$PR_SET_TIMERSLACK(0x29, 0x0) 10:29:48 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001d00000000000000000021850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_ext_handle_unwritten_extents\x00', r2}, 0x10) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r3, 0x208202) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) 10:29:48 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4e, &(0x7f0000004740)=@nat={'nat\x00', 0x1b, 0x5, 0x570, 0x1d0, 0x0, 0xffffffff, 0x3d8, 0x1d0, 0x620, 0x620, 0xffffffff, 0x620, 0x620, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:traceroute_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@private, 'macsec0\x00'}}}, {{@ipv6={@empty, @loopback, [], [], 'veth0_to_bond\x00', 'veth0_to_team\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@dev, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@private1, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5d0) 10:29:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x80108907, 0x0) 10:29:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)=@bridge_delneigh={0x24, 0x1d, 0xc05, 0x0, 0x0, {}, [@NDA_LINK_NETNSID={0x8}]}, 0x24}}, 0x0) 10:29:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:48 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000001d80), 0x20001d86) 10:29:48 executing program 5: syz_usb_connect$uac1(0x5, 0x71, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 10:29:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000f80)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@bridge_getlink={0x50, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'syz_tun\x00'}, @IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @loopback}]}]}]}, 0x50}}, 0x0) 10:29:49 executing program 2: r0 = socket(0xa, 0x3, 0x2) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, 0x0, 0x0) 10:29:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x14, 0x0, 0x0) [ 785.939135][T13473] usb 6-1: new high-speed USB device number 19 using dummy_hcd 10:29:49 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x5411, &(0x7f0000000040)={'veth1\x00', @ifru_addrs=@sco={0x1f, @none}}) 10:29:49 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/config', 0x0, 0x0) lseek(r0, 0xfffffffffffffff9, 0x1) 10:29:49 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:49 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001d00000000000000000021850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_ext_handle_unwritten_extents\x00', r2}, 0x10) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r3, 0x208202) sendfile(r0, r1, 0x0, 0x8000fffffffa) 10:29:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18"], 0x28}, 0x0) 10:29:49 executing program 2: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000003c0)=ANY=[@ANYBLOB="12015002020000082505a1a440000102030109023b000101000000090400000002060000052406000005"], &(0x7f0000000380)={0x0, 0x0, 0x5, &(0x7f0000000140)={0x5, 0xf, 0x5}}) 10:29:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000f80)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@bridge_getlink={0x3c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'syz_tun\x00'}, @IFLA_AF_SPEC={0x8, 0x1a, 0x0, 0x1, [@AF_INET6={0x4, 0x2}]}]}, 0x3c}}, 0x0) 10:29:49 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001d00000000000000000021850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_ext_handle_unwritten_extents\x00', r2}, 0x10) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r3, 0x208202) sendfile(r0, r1, 0x0, 0x8000fffffffa) [ 786.350472][T13473] usb 6-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 786.370900][T13473] usb 6-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 786.393882][T13473] usb 6-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 786.569505][T13477] usb 3-1: new high-speed USB device number 22 using dummy_hcd [ 786.590500][T13473] usb 6-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 786.599850][T13473] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 786.607941][T13473] usb 6-1: Product: syz [ 786.614253][T13473] usb 6-1: Manufacturer: syz [ 786.619474][T13473] usb 6-1: SerialNumber: syz [ 786.819018][T13477] usb 3-1: Using ep0 maxpacket: 8 [ 786.959204][T13473] usb 6-1: 0:2 : does not exist [ 786.974429][T13473] usb 6-1: USB disconnect, device number 19 [ 787.049069][T13477] usb 3-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 787.240113][T13477] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 787.249727][T13477] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 787.257897][T13477] usb 3-1: Product: syz [ 787.262766][T13477] usb 3-1: Manufacturer: syz [ 787.267358][T13477] usb 3-1: SerialNumber: syz [ 787.320352][T13477] cdc_ether 3-1:1.0: skipping garbage [ 787.325846][T13477] usb 3-1: bad CDC descriptors [ 787.527582][T13470] usb 3-1: USB disconnect, device number 22 [ 787.648970][T13477] usb 6-1: new high-speed USB device number 20 using dummy_hcd [ 788.009521][T13477] usb 6-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 788.018643][T13477] usb 6-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 788.030050][T13477] usb 6-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 788.199016][T13477] usb 6-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 788.208289][T13477] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 788.217725][T13477] usb 6-1: Product: syz [ 788.222268][T13477] usb 6-1: Manufacturer: syz [ 788.227309][T13477] usb 6-1: SerialNumber: syz [ 788.308907][T32127] usb 3-1: new high-speed USB device number 23 using dummy_hcd 10:29:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000f80)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@bridge_getlink={0x50, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'syz_tun\x00'}, @IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @loopback}]}]}]}, 0x50}}, 0x0) 10:29:51 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000f80)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="340000002000e38629bd7000fedbdf2502"], 0x34}}, 0x0) 10:29:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x22, 0x0, 0x0) 10:29:51 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001d00000000000000000021850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_ext_handle_unwritten_extents\x00', r2}, 0x10) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r3, 0x208202) sendfile(r0, r1, 0x0, 0x8000fffffffa) [ 788.549189][T13477] usb 6-1: 0:2 : does not exist [ 788.571675][T13477] usb 6-1: USB disconnect, device number 20 [ 788.578893][T32127] usb 3-1: Using ep0 maxpacket: 8 [ 788.609460][ T26] kauditd_printk_skb: 3 callbacks suppressed 10:29:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x4, 0x0, 0x88) [ 788.609475][ T26] audit: type=1800 audit(1633256992.071:143): pid=4635 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15185 res=0 errno=0 10:29:52 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) 10:29:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe, 0xc, 0x2, [@ptr]}}, &(0x7f00000005c0)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 10:29:52 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001d00000000000000000021850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_ext_handle_unwritten_extents\x00', r2}, 0x10) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) [ 788.840939][T32127] usb 3-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 788.973027][ T26] audit: type=1800 audit(1633256992.442:144): pid=4655 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15201 res=0 errno=0 [ 789.001249][ T4656] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 789.049489][T32127] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 789.058558][T32127] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 789.073563][T32127] usb 3-1: Product: syz [ 789.078010][T32127] usb 3-1: Manufacturer: syz [ 789.085424][T32127] usb 3-1: SerialNumber: syz [ 789.136379][T32127] cdc_ether 3-1:1.0: skipping garbage [ 789.142354][T32127] usb 3-1: bad CDC descriptors 10:29:52 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000008900), 0x2, 0x0) mount$fuseblk(&(0x7f0000003480), &(0x7f00000034c0)='./file0\x00', &(0x7f0000003500), 0x0, &(0x7f0000003600)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}]}}) 10:29:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x24, &(0x7f0000000140)={@multicast1=0xe0000002, @empty}, 0x10) 10:29:52 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001d00000000000000000021850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_ext_handle_unwritten_extents\x00', r2}, 0x10) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) 10:29:52 executing program 2: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000003c0)=ANY=[@ANYBLOB="12015002020000082505a1a440000102030109023b000101000000090400000002060000052406000005"], &(0x7f0000000380)={0x0, 0x0, 0x5, &(0x7f0000000140)={0x5, 0xf, 0x5}}) 10:29:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000000c0)={@initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x16}}, 0xc) [ 789.265172][T13477] usb 3-1: USB disconnect, device number 23 10:29:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000002040)={&(0x7f0000000bc0)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_EEE_MODES_OURS={0xeb0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x94, 0x3, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ',[\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '##^[&-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(`\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '^@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/nvram\x00'}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0xe15, 0x5, "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"}]}]}, 0xec4}}, 0x0) [ 789.373854][ T26] audit: type=1800 audit(1633256992.842:145): pid=4673 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15233 res=0 errno=0 10:29:52 executing program 5: semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000540)=""/96) 10:29:52 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001d00000000000000000021850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_ext_handle_unwritten_extents\x00', r2}, 0x10) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) 10:29:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:53 executing program 0: bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 10:29:53 executing program 4: getgid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000000)=[r0]) getegid() semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000240)={{0x0, 0xee00, 0xffffffffffffffff, 0x0, 0x0, 0xc0, 0x5}, 0x7f, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xf7d}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000200)=0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f00000001c0)='./file0\x00', r2, r3) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000200)) read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020}, 0x2020) getgid() getegid() ioctl$TIOCL_GETKMSGREDIRECT(r1, 0x4b66, &(0x7f0000000040)) 10:29:53 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000100)=ANY=[], 0x58) [ 789.584381][ T26] audit: type=1800 audit(1633256993.052:146): pid=4695 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14882 res=0 errno=0 10:29:53 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001d00000000000000000021850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_ext_handle_unwritten_extents\x00', r2}, 0x10) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208202) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) 10:29:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_POWER_SAVE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 789.730060][ T26] audit: type=1800 audit(1633256993.202:147): pid=4705 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15105 res=0 errno=0 10:29:53 executing program 4: syz_emit_ethernet(0x336, &(0x7f0000000740)=ANY=[@ANYBLOB="9d0e95747be40180c200000186dd608b8cad03002c"], 0x0) [ 789.755428][T13477] usb 3-1: new high-speed USB device number 24 using dummy_hcd [ 790.008679][T13477] usb 3-1: Using ep0 maxpacket: 8 [ 790.209255][T13477] usb 3-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 790.389229][T13477] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 790.398380][T13477] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 790.407264][T13477] usb 3-1: Product: syz [ 790.412437][T13477] usb 3-1: Manufacturer: syz [ 790.417228][T13477] usb 3-1: SerialNumber: syz [ 790.459653][T13477] cdc_ether 3-1:1.0: skipping garbage [ 790.465063][T13477] usb 3-1: bad CDC descriptors [ 790.677220][T32127] usb 3-1: USB disconnect, device number 24 10:29:54 executing program 5: mkdir(&(0x7f0000000140)='./file1\x00', 0x14d) chdir(&(0x7f0000000000)='./file1\x00') 10:29:54 executing program 2: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000003c0)=ANY=[@ANYBLOB="12015002020000082505a1a440000102030109023b000101000000090400000002060000052406000005"], &(0x7f0000000380)={0x0, 0x0, 0x5, &(0x7f0000000140)={0x5, 0xf, 0x5}}) 10:29:54 executing program 0: syz_emit_ethernet(0x3a, &(0x7f0000000100)={@random="67d1a0af7ee0", @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x11, 0x0, @private=0xa010100, @dev}, {0x0, 0x0, 0x18, 0x0, @wg=@data}}}}}, 0x0) 10:29:54 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x101, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x9489, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x3f, @mcast1, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x4e1f, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x17}}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80), 0x400000000000065, 0x0) sendto$inet6(r0, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000001600)='veth0_to_hsr\x00') ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) sendmmsg$inet(r0, 0x0, 0x0, 0x44000) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@random={'security.', 'veth0_to_hsr\x00'}, &(0x7f0000000540)=""/4096, 0x1000) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000040)) 10:29:54 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001d00000000000000000021850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_ext_handle_unwritten_extents\x00', r2}, 0x10) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208202) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) 10:29:54 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) [ 791.261008][ T26] audit: type=1800 audit(1633256994.732:148): pid=4742 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15393 res=0 errno=0 10:29:54 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000ec0), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x0, 0x3}}) 10:29:54 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001d00000000000000000021850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_ext_handle_unwritten_extents\x00', r2}, 0x10) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208202) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) 10:29:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x4, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), r0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280), r0) 10:29:54 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/keys\x00', 0x0, 0x0) [ 791.471577][ T26] audit: type=1800 audit(1633256994.942:149): pid=4759 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14905 res=0 errno=0 10:29:55 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001d00000000000000000021850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_ext_handle_unwritten_extents\x00', r2}, 0x10) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r3, 0x208202) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) 10:29:55 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x6e6bb2, 0x2}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, @in6=@mcast2}}, 0xe8) 10:29:55 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x1}, 0x1c) [ 791.608727][T32127] usb 3-1: new high-speed USB device number 25 using dummy_hcd [ 791.644090][ T26] audit: type=1800 audit(1633256995.112:150): pid=4769 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14905 res=0 errno=0 [ 791.879062][T32127] usb 3-1: Using ep0 maxpacket: 8 [ 792.128659][T32127] usb 3-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 792.338721][T32127] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 792.348366][T32127] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 792.356996][T32127] usb 3-1: Product: syz [ 792.361357][T32127] usb 3-1: Manufacturer: syz [ 792.365940][T32127] usb 3-1: SerialNumber: syz [ 792.409478][T32127] cdc_ether 3-1:1.0: skipping garbage [ 792.415172][T32127] usb 3-1: bad CDC descriptors [ 792.624673][T13477] usb 3-1: USB disconnect, device number 25 10:29:56 executing program 2: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000003c0)=ANY=[@ANYBLOB="12015002020000082505a1a440000102030109023b000101000000090400000002060000052406000005"], &(0x7f0000000380)={0x0, 0x0, 0x5, &(0x7f0000000140)={0x5, 0xf, 0x5}}) 10:29:56 executing program 5: capset(&(0x7f0000000180)={0x19980330}, 0x0) 10:29:56 executing program 0: clock_adjtime(0x0, &(0x7f0000000000)={0x8001}) 10:29:56 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) 10:29:56 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001d00000000000000000021850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_ext_handle_unwritten_extents\x00', r2}, 0x10) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r3, 0x208202) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) 10:29:56 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) [ 793.200355][ T26] audit: type=1800 audit(1633256996.672:151): pid=4796 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15004 res=0 errno=0 10:29:56 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, 0x0) 10:29:56 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000002400), 0x0, 0x0) mmap$perf(&(0x7f0000ff2000/0xe000)=nil, 0xe000, 0x3, 0x12, r0, 0x0) 10:29:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000000)=0x9, 0x6) fork() 10:29:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xc, &(0x7f0000000000)=0x800, 0x4) 10:29:56 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040), 0x6) ioctl$sock_bt_hci(r0, 0x400448e6, &(0x7f0000000080)) ioctl$sock_bt_hci(r0, 0x400448e7, &(0x7f0000000080)) 10:29:57 executing program 4: openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000012c0)='tasks\x00', 0x2, 0x0) fork() syz_mount_image$iso9660(&(0x7f0000002b40), &(0x7f0000002b80)='./file0\x00', 0x2, 0x4, &(0x7f0000002fc0)=[{&(0x7f0000002bc0)="106c1d9183590435491e77b9d5322f456f24894d17281474df94d046bd18388a0bf3c797edf6ea7fff35f87bb5ee0ead2da55468e4c586ef563a47a756503bbf3bee2f840310db272563177d1a2a4e747d05d5baac6a6392be7b1362", 0x5c, 0x1}, {&(0x7f0000002c80)="9ce9", 0x2, 0x2}, {0x0}, {0x0, 0x0, 0x1}], 0x800, &(0x7f0000003080)={[{@block}, {@session}], [{@subj_role={'subj_role', 0x3d, '\x00'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@fsname={'fsname', 0x3d, '.\xe3(@}{'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@fsname={'fsname', 0x3d, '/]'}}]}) socket$unix(0x1, 0x2, 0x0) [ 793.578710][ T8964] usb 3-1: new high-speed USB device number 26 using dummy_hcd [ 793.848403][ T8964] usb 3-1: Using ep0 maxpacket: 8 [ 794.091396][ T8964] usb 3-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 794.268461][ T8964] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 794.277998][ T8964] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 794.286558][ T8964] usb 3-1: Product: syz [ 794.291076][ T8964] usb 3-1: Manufacturer: syz [ 794.295662][ T8964] usb 3-1: SerialNumber: syz [ 794.339122][ T8964] cdc_ether 3-1:1.0: skipping garbage [ 794.344663][ T8964] usb 3-1: bad CDC descriptors [ 794.553886][ T8964] usb 3-1: USB disconnect, device number 26 10:29:58 executing program 0: r0 = gettid() r1 = getpgid(0x0) tgkill(r0, r1, 0x0) 10:29:58 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001d00000000000000000021850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208202) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) 10:29:58 executing program 5: syz_mount_image$iso9660(&(0x7f0000000b40), &(0x7f0000000b80)='./file0\x00', 0x0, 0x0, &(0x7f0000000e00), 0x0, &(0x7f0000000e80)={[{@session}, {@gid={'gid', 0x3d, 0xee00}}, {@sbsector}]}) 10:29:58 executing program 4: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000000c0)={&(0x7f0000ffd000/0x2000)=nil}) 10:29:58 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:58 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x42, &(0x7f0000000040), 0x4) 10:29:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)={{0x14}, [@NFT_MSG_DELTABLE={0x34, 0x2, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_HANDLE={0xc}, @NFTA_TABLE_FLAGS={0x8}]}, @NFT_MSG_NEWRULE={0xe68, 0x6, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_RULE_HANDLE={0xc}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_HANDLE={0xc}, @NFTA_RULE_POSITION_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0xe28, 0x4, 0x0, 0x1, [{0xec, 0x1, 0x0, 0x1, [@rt={{0x7}, @void}, @log={{0x8}, @val={0x48, 0x2, 0x0, 0x1, [@NFTA_LOG_LEVEL={0x8}, @NFTA_LOG_PREFIX={0x9, 0x2, 0x1, 0x0, 'TIPC\x00'}, @NFTA_LOG_FLAGS={0x8}, @NFTA_LOG_QTHRESHOLD={0x6}, @NFTA_LOG_QTHRESHOLD={0x6}, @NFTA_LOG_LEVEL={0x8}, @NFTA_LOG_LEVEL={0x8}, @NFTA_LOG_SNAPLEN={0x8}]}}, @masq={{0x9}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_MASQ_REG_PROTO_MAX={0x8}, @NFTA_MASQ_FLAGS={0x8}, @NFTA_MASQ_REG_PROTO_MIN={0x8}, @NFTA_MASQ_FLAGS={0x8}, @NFTA_MASQ_REG_PROTO_MAX={0x8}]}}, @redir={{0xa}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_REDIR_REG_PROTO_MIN={0x8}, @NFTA_REDIR_FLAGS={0x8}, @NFTA_REDIR_REG_PROTO_MIN={0x8}, @NFTA_REDIR_FLAGS={0x8}, @NFTA_REDIR_REG_PROTO_MIN={0x8}, @NFTA_REDIR_REG_PROTO_MIN={0x8}]}}, @dup_ipv4={{0x8}, @void}, @synproxy={{0xd}, @void}]}, {0xd38, 0x1, 0x0, 0x1, [@payload={{0xc}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_BASE={0x8}, @NFTA_PAYLOAD_OFFSET={0x8}, @NFTA_PAYLOAD_CSUM_TYPE={0x8}, @NFTA_PAYLOAD_SREG={0x8}, @NFTA_PAYLOAD_DREG={0x8}, @NFTA_PAYLOAD_BASE={0x8}, @NFTA_PAYLOAD_DREG={0x8}, @NFTA_PAYLOAD_SREG={0x8}]}}, @bitwise={{0xc}, @val={0xcd8, 0x2, 0x0, 0x1, [@NFTA_BITWISE_SREG={0x8}, @NFTA_BITWISE_MASK={0xccc, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0xb1, 0x1, "f90c197c0050f0aa7517ccb496a1a17e619d158af41814bd790e28c455a3fa4bc75cb48f473844ed15753e126e8447b9507312ead400ea945a31041a4ace105bd5fe118039be3ac6d8b2cc4c6832480954e00bec2d5575d5553fe8a200a009828ad97bcfe4cf250efc072103000991312e095bc4b8ee23160cdedd2f3c912bda098ac9b3e749343b6209bf3ac53be2485d1becd98238c830c74195d541e9b098caa85a70035d62198664930b5a"}, @NFTA_DATA_VALUE={0x6d, 0x1, "144c5bd6e1c8d64e7afdd55479ebb6e3d2366838646cabb7fca4898fc86baf8a745d9ae2cce202a7905fd182b518e5e6e11c9e9b5f664142d087faa58ef08185071c06f2339aafc20c67fbbd0aa34361fd7fe6b206b03b0d2db98ab935a59b6a1f6f3cde931dcfe572"}, @NFTA_DATA_VALUE={0xba1, 0x1, "a16055e851bb3787a0f04607955eaca864ea7bf4d255b44623bf8426d23c31dbb17f02a6e6719328f703818a961e0e2249527f033b2aac676501d2683ab9c5f7ec88d2edeb1e3bae0c53948b352c6eb2ae94ea56aad389ee77418b9e2ccc6288c06efa2617d3aca2bf76203267bfeb15c987cf77c15f972d22dad5dcc4a132635a663c78190377c403c28721015bed5b3b9df9139a1d99c4a0be1687ad1aabc15ee009a3144e2ce87285397acb5bb8bc4b2138ebcd09b3a2df0d49f6d67780a248ef1a10c4b9cc48ee9f4c282c2688e4fea4581a730d9322f552ccf14aeb3536d4aab90b08164fcce856161498234667baf873fc361c606888232a29955962b256a45690c5ee720ef40a95d886d206b643186a6eba4146a954eae8aa94e0beea1906682315aebce959b7e848c17303ae4f1718da3f6c87a2d8f1109b07976ffecdbf6a4cb8d1cb4de5c79ee7f22ed2d9b46696fab141c235fad4af481a7d64b29fc40a28691857d1a8c8b49e8901cc4d1c1b9fff4061a2bdfe957431b2a17e25dba1399bc32a92df3677bbe0c8f1f6a838b0a5251b19a381478e9b02f1e52a126a38a51b179b262af5cfc7714b6509cfd76abfe7d250df58c27b10032db2a4edf7ad2bf826924596eb3d2836cf58af49d30f30b0e606a27ce1b947a6983084ebfe8408eb25cdfdbe3fa6792cd0b6ff8292aa8c82e256914ca23ccf02ca7bf57ccff35ddfa8ee1805f118ec96d820cebf4c387139936d7ed1df77bfaebe6cb42255de78d1affc11cda4fa78d92b19e8daf10c3a02d3d8bb24e417c28b8b23708394011dc9164d99412c9126b53671b7de3bac52881b9d44b329a2da825a3152733a094ee8b6e9c8632640db44a6c626c89c1bb8dc7e1d5f7b902def87dbbadd7ecc1ec18670d48a99c080200b50c1c3c8785ba575c66f91f8e108dff5998de9e2300a9d914456c7b0d4db19d12f5f98d9a6548f50eea08a9e6c816df33eaeeec93dd191d6ba7ff39fcee3ae77c319c86e75c624ed58bdbf6770c019edd702bb0ab00f8849b35dcba63f68da4801868bbf89f797a309bf919d7c562e26467c775e629b4ea0d10e3e03d2dcb79b5d8337419e08de2ae95c90f7123b0ec20d59c216ae674935f25fb56d702b9febd54751b2c6aef9ebde421f072070ebc3c4604fbc85ab18421822a5a37bfb2b5aaed28b2b7b07fd53e576b6226457bbbb0e99230d82913c17778eac39bdbe7b615560e8958ca578092afc931c4d0eea702465b03fcf053ece8b3b06b9327875b1fade682c96e5f901f2f876628ad01b27a2bfbf9187e3a75d4792bc76bf7fefd2246b679e49c7054ed2068cc1848324334e9411389db07df868457233672120f7f50bfb0ae5ddd0d1385c3df23443156118413fa310ae62e817ea9df5df2ba0e1decdabf4ba5635a36257df1234da6bcb2e2c98f6f82f13ae3f30ea876c43c8798c4f4b4ec9218321f1b067017fe2dfe54e02712fefc90105bc2ef27b343b71de1bbda39525df172f3b95dc9626b8d2381b59324f37cf991fb9dc005fae999dbc7ac4e2e166122dfa99aa6f47e04bfdf6d5a44f5a1ed8e7a541fd7ba73a50ed93dbdc586f46f3cad085f6608bb07d6d39ce0a833d74047727063bca3717c6e815890c40a24b0a0711a7465febd0f50401d56b61fd2db3ae104f8c39a3f4b1865298599dfb3dd96bc3fb8b45e5199902490376dfa2a797b0bc379a69b20160c8caf9755dae53568dfb16c8c1026057a8fbb2d28ac829a76341a5c2f6fe72554e6522dc0ab8ffb5242857a8e27efebe213a6fc8b0dbff57e779fa2a07b3ee4eac9b2ac6053f4b877f014fcacf5609da3706277a1989205af83da0e55035e52e5aa3ff1671e6f514b65ac27c96633c4e2848e1d6c753a5ad28cb8d063b1bff0100d4bea719bc47cf73a3de4b797cb5dcc0e338f122447db4b3fe08d8ad412398e65b7a0de5ed63fd02d102d2f58ee24913faed9ef207d69028bd2f3b63d0b7506943811fbd49eb6ef056692543eaa8028aac75d9c8c54d644d20344ceadae6fc4fb2d36096dc042a07948605ae9dfaaf6d95ebbb661f8c7af1e352a7c403a494fb57aaec0c6b471fa0dab8cbb7b7c1ecd0ec30aab52db3912518371c81f37bd608a2d91bfe20ad23a855391c2581cf8e7cf124e26e919ba7126bbb141fa2fded9045a6d766faa305a5ba7f87eb8c371281fb303cffa3f0c880e847c1fd367729d22c122384fe66f12c309aded78479fa8f73e53eba819558fcce455f71758edc2f07168ccb81a9da518a226c1970f66bcc2f00579e12eb5a7eb3d3c8d2e6c07d554c338340eb6600d5a5af6fda2d24037e355eeb3cd5b66402bffff44e2ac953272eb8903418e6eebf64520cd18a898988859cb36ff419858daa326a85f18445be047057ba2fd87b5ee6caa393cb26e4f2255623bbb4b5ecd0499102ade9eee8434972432bac12574a77d9b232758012cec9622d2a8170bf47a6168302ce7da9015af9704d0038bba3cc5e960751e87fd8de0d3a182bd45c33f8e272bf193255e0144ac1ddab6b076a0df700fa393c003794bb85790e9153c1dd54e939edecffdd7b708deb52f97dc496b008c45e8e1f2584ff9cebaea5ca32d2f390dc4adac860b150eff7b937ba81547728dd7034b0179fcfc768cad990544bb42a2007bea206f7f60697e9996a5ccd7da21fdcc1f8847dc64d0d60455e3e768affa5bf5b7fa67d4bcfd232e96dbfc43c96578a78f29b09057fe3dac50eb94d6b8e28d18b8a5e472cb670b6c48c296cf5abe73acd4429f7f5929c38e48b7967be78e5b7640d406c323c101eb1b8bdd21c87918f3201e330e7654b023c3b147ab23d83e9c5e9554fe81f7616ef6115b0cc596eabd107567733c2369a6585dbd7184971ee4d3832ac3ea4171c56dbf0bafe9110bac99febcbd0b1e169255deabdb5bb039fce3758e280c8f0c12e322d7aa80ca0fbd9bdec0d2625bb9fe41e96fbb331fc403597c2fea0fdbd99d24e206cee1912acd856b98593be8192614a253c6897cadb5ec4f5bd7636c10bcf7f4ad4d2a0b6581a409e3734f5a988b11a52a38f7bd99606932597a04b4c7452718fd95562841fbaeaf38bbc0651678ae63c0424ad0ce667a8f9b295d0018db51699dcba85fe1e3d58b95e9fcbc85b11423ffc35c892a8b823915d7a357e0339b93129d698a50abbe2429e586f11c783b377bdc76ab15ae359309bc11c7d31f0fca0678684c70c734e6ef2035814909b7d0b471b514af2f1900bc7ceeef10e15c36ca67bac1498d3405e88cffa58cc09272582bdab7afea30ce85d0ffb5ef4c16fd4c46fe73184b19d00ba0faa49618075d943fdabdb1ea4db17e67e7326f35a88eaf492bb82e4bf0d75d039b82991f6054702deae334402b86b03467169ec9acb581d3c62d106db9558b143f044525f905d9fbd0c8ea358f8bc0ec52047a20676b102ab53da67b52b1824338bfaf23e8443836a31ad5ee71a9c437bb3bf89210b3ab42c011e40967f47c979fe9adb1e09624e07db8dbdc14450b06536b462c66d10bc9f54a453a03da057aa8896c3627830bc297c58018a625f8d6e2aa1fb354278b4531ef5294d7f63351ba4f74340aa4a0cf5ae555396d2969ba8730ed91cc5e900f3028c18371a8701596b26d59a8f2a2b1e616478a513ad90c4df180985c6fa41094e3bac00863dd0c25afe9a30d5e98601f2d1f76d06ece9da86c038c29626a59d6b57ad26fb524ba8b40e8b793660033d04aad01df2b9b47451d5806ce6c04594ef69fce4ed843bb528da8f4a85890dd840019f3e3378d87933b272858c0a05ac5e0768614405e33480bf2cc19c716434a7930fff7829b822f125cc405ef1329c7cde85b5a09f3002fc4620d34747a34bf7dd7c048b3cbdff3a0a6a5a69dd35efbd33a8fe607b85a50ebe667c1810a03879ebabe7c6d440a3f6fce835f151851eae9b12ec7dee1c93c0922ce171469c625f055cd14631f9061d32ac5ad9870491f4cd93ac4f31356770cf1f1b5bc21fc885aa453bc8770236d86f608fccb901c3c36b1f5ae7b20600d6a79bbdfd83c2abbaa91e063021feed3f8bef97d03d700ac9fe4545dcf8f041ef165cb5cddd41f7e75e483d31c221399ac3244fe5dcdbaf529c7d117b7a89aecc1edea891697df00eee0c09cd4a9337131c9cfe1e4af8f509c4b33c3eee8782"}]}]}}]}]}]}], {0x14}}, 0xec4}}, 0x0) [ 795.179278][ T26] audit: type=1800 audit(1633256998.642:152): pid=4856 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15755 res=0 errno=0 10:29:58 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mremap(&(0x7f0000147000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f00004b6000/0x2000)=nil) 10:29:58 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x41}, 0x0) io_uring_enter(r1, 0x2a6e, 0x0, 0x0, 0x0, 0xe) 10:29:58 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x41}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0xe) 10:29:59 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001d00000000000000000021850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208202) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) 10:29:59 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x2, 0xf, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@empty, @in=@loopback}}, @sadb_x_nat_t_port={0x1, 0x15}]}, 0x58}}, 0x0) [ 795.656442][ T26] audit: type=1800 audit(1633256999.122:153): pid=4888 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15749 res=0 errno=0 10:29:59 executing program 0: r0 = socket(0x23, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) 10:29:59 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x41}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0xe) 10:29:59 executing program 5: r0 = socket(0x18, 0x0, 0x2) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x541b, 0x0) 10:29:59 executing program 2: r0 = socket(0x23, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) 10:29:59 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:29:59 executing program 5: r0 = socket(0x11, 0xa, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x40012102) 10:29:59 executing program 2: r0 = socket(0x2a, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x541b, &(0x7f0000000000)={'wlan1\x00'}) 10:29:59 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, 0x0, 0x0) 10:29:59 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001d00000000000000000021850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208202) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) 10:29:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x1600bd80, &(0x7f0000000340)="43a1b1b5cf28bb812a8acfe2b9edf69302835ce82b4e2acdec6413fc9d96f840b5ca2d477ccfc3c7e319932dd6732a413a", 0x31) 10:29:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x5, &(0x7f0000000740)="a4f0a825", 0x4) 10:29:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x2, &(0x7f00000000c0)={@loopback, @dev}, 0xc) [ 796.263583][ T26] audit: type=1800 audit(1633256999.732:154): pid=4917 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15758 res=0 errno=0 10:29:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x6c2, &(0x7f0000000740)="a4f0a825", 0x4) 10:29:59 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x10, 0x0, 0x0, 0x9}, 0x40) 10:29:59 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1e, 0x1, &(0x7f0000000000)=@raw=[@call], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:29:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x7, 0x0, 0x0) 10:30:00 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:30:00 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_ext_handle_unwritten_extents\x00'}, 0x10) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208202) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) 10:30:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000003080)={0x0, 0x0, &(0x7f0000003040)={&(0x7f0000002fc0)={0x34, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x34}}, 0x0) 10:30:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @remote}, {0x306, @link_local}, 0x2, {0x2, 0x0, @broadcast}, 'veth1_virt_wifi\x00'}) 10:30:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x1}]}}, &(0x7f0000000240)=""/145, 0x26, 0x91, 0x1}, 0x20) 10:30:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x2, 0x0, 0x0) 10:30:00 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1c, 0x1, &(0x7f0000000000)=@raw=[@call], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:30:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f00000000c0)=""/205, 0xcd, 0x22, 0x0, 0x0) [ 797.085396][ T26] audit: type=1800 audit(1633257000.552:155): pid=4942 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15753 res=0 errno=0 10:30:00 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time\x00') ioctl$TUNSETLINK(r0, 0x40305829, 0x0) 10:30:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)={0x16, 0x0, 0x100, 0x3}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 10:30:00 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r0 = socket$kcm(0x11, 0x200000000000002, 0x300) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000940)={&(0x7f0000000180)="ff30a38306d6bbd5fa22790bf9e5", &(0x7f0000000bc0)=""/149, &(0x7f00000002c0)="bb64b19f224663bbcb62d5ff9451e4bf378ee7b630479bcf1f5994f64684f861b1b84acc272da910369e92cc4b5e23e05e952abf7e87f1f8564fc8eb7ff37c6a2000c712d8671479020db418f496f176564542bab45e34b0", 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x38) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2a}, @dev}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) 10:30:00 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_ext_handle_unwritten_extents\x00'}, 0x10) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208202) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) [ 797.533801][ T26] audit: type=1800 audit(1633257001.002:156): pid=4965 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15029 res=0 errno=0 10:30:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440), 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:30:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002b80)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = gettid() getpid() sendmsg$unix(r1, &(0x7f0000001640)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r2, r3, 0x0, 0x0, 0x0}, 0x30) 10:30:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x11}]}}, &(0x7f0000000080)=""/175, 0x26, 0xaf, 0x1}, 0x20) 10:30:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1}]}}, &(0x7f0000000180)=""/156, 0x2a, 0x9c, 0x8}, 0x20) 10:30:01 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r0 = socket$kcm(0x11, 0x200000000000002, 0x300) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000940)={&(0x7f0000000180)="ff30a38306d6bbd5fa22790bf9e5", &(0x7f0000000bc0)=""/149, &(0x7f00000002c0)="bb64b19f224663bbcb62d5ff9451e4bf378ee7b630479bcf1f5994f64684f861b1b84acc272da910369e92cc4b5e23e05e952abf7e87f1f8564fc8eb7ff37c6a2000c712d8671479020db418f496f176564542bab45e34b0", 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x38) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2a}, @dev}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) 10:30:01 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_ext_handle_unwritten_extents\x00'}, 0x10) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208202) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffa) 10:30:01 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r0 = socket$kcm(0x11, 0x200000000000002, 0x300) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000940)={&(0x7f0000000180)="ff30a38306d6bbd5fa22790bf9e5", &(0x7f0000000bc0)=""/149, &(0x7f00000002c0)="bb64b19f224663bbcb62d5ff9451e4bf378ee7b630479bcf1f5994f64684f861b1b84acc272da910369e92cc4b5e23e05e952abf7e87f1f8564fc8eb7ff37c6a2000c712d8671479020db418f496f176564542bab45e34b0", 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x38) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2a}, @dev}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) [ 798.012232][ T26] audit: type=1800 audit(1633257001.482:157): pid=4979 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15755 res=0 errno=0 10:30:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x101}, 0x14}}, 0x0) [ 798.212498][ T4988] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 798.224731][ T4988] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 10:30:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000440)=""/251, 0x26, 0xfb}, 0xc) 10:30:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r0, r3, 0x16, &(0x7f0000000100)={0x0, 0x0, 0x3}) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xfffffffffffffffe) getpid() getgroups(0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:30:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r0, r3, 0x16, &(0x7f0000000100)={0x0, 0x0, 0x3}) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xfffffffffffffffe) getpid() getgroups(0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:30:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x101}, 0x14}}, 0x0) [ 798.517601][ T5006] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 798.537356][ T5006] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 10:30:02 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440), 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7000, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/110, 0x6e}], 0x1}}], 0x1, 0x0, 0x0) 10:30:02 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001d00000000000000000021850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_ext_handle_unwritten_extents\x00', r1}, 0x10) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208202) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000fffffffa) 10:30:02 executing program 0: setuid(0xee00) r0 = getpgrp(0x0) sched_setaffinity(r0, 0x0, 0x0) 10:30:02 executing program 5: clone(0x3a3dd4008480af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101403, 0x1) finit_module(r0, 0x0, 0x0) 10:30:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r0, r3, 0x16, &(0x7f0000000100)={0x0, 0x0, 0x3}) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xfffffffffffffffe) getpid() getgroups(0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:30:02 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg(r0, &(0x7f0000000980)={&(0x7f0000000000)=@in6={0x18, 0x3}, 0xc, 0x0}, 0x0) 10:30:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r0, r3, 0x16, &(0x7f0000000100)={0x0, 0x0, 0x3}) ptrace(0x10, r1) ptrace$pokeuser(0x6, r2, 0x388, 0xfffffffffffffffe) getpid() getgroups(0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:30:02 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@random="750ceba84510", @broadcast, @val, {@ipv4}}, 0x0) [ 798.945793][ T5024] ------------[ cut here ]------------ 10:30:02 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001d00000000000000000021850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_ext_handle_unwritten_extents\x00', r1}, 0x10) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208202) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000fffffffa) [ 799.005482][ T5024] WARNING: CPU: 1 PID: 5024 at fs/read_write.c:429 __kernel_read+0x907/0xb30 [ 799.044526][ T5024] Modules linked in: 10:30:02 executing program 2: syz_emit_ethernet(0xe, &(0x7f0000000100)={@random="750ceba84510", @broadcast, @val, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x29, 0x0, @local, "c70c21b44027a6e493eeb9df56575abc", @local, "32f8e179aec4ef5c5679f2c1ac16ebd5"}}}}, 0x0) [ 799.065674][ T5024] CPU: 1 PID: 5024 Comm: syz-executor.5 Not tainted 5.15.0-rc3-syzkaller #0 [ 799.106871][ T5024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 10:30:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000025c0)={0x0, 0x0, &(0x7f0000002480)=[{&(0x7f0000000100)="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", 0x1000}, {&(0x7f0000001100)="7973c80d1f18e4c61935095b65a5091e03fa75b2bb351102e815f4058e085cd386aed4393f010eeafd8e52af1927a7c423c3ec757f3b379a7c52a1853712cb1287928a38b27147a934dbea4a20f6c80b399daa967b65a41959b4c3bcaee41e169f03d59ec3205564616c06736b786920d44982c80da6cf2f0f2ab1e7021f1e5ef02a3a434d26581610942f145d0fd0afb1818bfc0d5175959fedac54d4f5dfe711e5c0a4b10f405ada1c9bd1125d008b5f7639649fc82bf69aed37b836dc69c038ccc716f7d7c17dae2f4ec82f7f", 0xce}, {&(0x7f0000001200)="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", 0xecb}], 0x3, &(0x7f0000002540)=[@cred, @rights, @rights], 0x68}, 0x0) [ 799.155036][ T5024] RIP: 0010:__kernel_read+0x907/0xb30 [ 799.174133][ T5024] Code: 8b e8 bd 9b 2c 02 31 ff 89 c3 89 c6 e8 a2 a3 ad ff 85 db 0f 85 e7 65 2c 07 49 c7 c5 ea ff ff ff e9 bc fe ff ff e8 49 9c ad ff <0f> 0b 49 c7 c5 ea ff ff ff e9 a9 fe ff ff e8 36 9c ad ff 48 89 ea 10:30:02 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001d00000000000000000021850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_ext_handle_unwritten_extents\x00', r1}, 0x10) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208202) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000fffffffa) [ 799.258161][ T5024] RSP: 0018:ffffc900032efb40 EFLAGS: 00010216 [ 799.289051][ T5024] RAX: 00000000000015ee RBX: 00000000001d7d30 RCX: ffffc90013d36000 [ 799.315701][ T5024] RDX: 0000000000040000 RSI: ffffffff81c86167 RDI: 0000000000000003 [ 799.335353][ T5024] RBP: 000000004808801c R08: 0000000000000000 R09: 0000000000008000 [ 799.344345][ T5024] R10: ffffffff81c85948 R11: 0000000000004000 R12: ffff88801dc34f00 [ 799.359602][ T5024] R13: 0000000000000001 R14: ffffc900032efd18 R15: 1ffff9200065df6b [ 799.380863][ T5024] FS: 00007f0fced52700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 799.391429][ T5024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 799.403625][ T5024] CR2: 00007fe4a71b8018 CR3: 000000003aaff000 CR4: 0000000000350ef0 [ 799.427041][ T5024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 799.435775][ T5024] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 799.443998][ T5024] Call Trace: [ 799.447549][ T5024] ? do_sendfile+0x1240/0x1240 [ 799.452586][ T5024] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 799.459005][ T5024] ? __vmalloc_node_range+0x580/0x9e0 [ 799.464492][ T5024] ? fsnotify_perm.part.0+0x22d/0x620 [ 799.470975][ T5024] ? apparmor_file_permission+0x264/0x4e0 [ 799.476796][ T5024] kernel_read+0xbf/0x1d0 [ 799.481587][ T5024] kernel_read_file+0x3b8/0x790 [ 799.486737][ T5024] ? __ia32_sys_fsconfig+0x150/0x150 [ 799.493484][ T5024] kernel_read_file_from_fd+0x62/0xb0 [ 799.498979][ T5024] __do_sys_finit_module+0xed/0x1a0 [ 799.504189][ T5024] ? __do_sys_init_module+0x250/0x250 [ 799.509646][ T5024] ? syscall_enter_from_user_mode+0x21/0x70 [ 799.516183][ T5024] do_syscall_64+0x35/0xb0 [ 799.521241][ T5024] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 799.527286][ T5024] RIP: 0033:0x7f0fd17db8d9 [ 799.532431][ T5024] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 799.552994][ T5024] RSP: 002b:00007f0fced52188 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 [ 799.561984][ T5024] RAX: ffffffffffffffda RBX: 00007f0fd18dff60 RCX: 00007f0fd17db8d9 [ 799.570339][ T5024] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 799.578844][ T5024] RBP: 00007f0fd1835cb4 R08: 0000000000000000 R09: 0000000000000000 [ 799.586997][ T5024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 799.595344][ T5024] R13: 00007ffd97912caf R14: 00007f0fced52300 R15: 0000000000022000 [ 799.604225][ T5024] Kernel panic - not syncing: panic_on_warn set ... [ 799.610985][ T5024] CPU: 0 PID: 5024 Comm: syz-executor.5 Not tainted 5.15.0-rc3-syzkaller #0 [ 799.619653][ T5024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 799.629689][ T5024] Call Trace: [ 799.633039][ T5024] dump_stack_lvl+0xcd/0x134 [ 799.637622][ T5024] panic+0x2b0/0x6dd [ 799.641503][ T5024] ? __warn_printk+0xf3/0xf3 [ 799.646082][ T5024] ? __warn.cold+0x1a/0x44 [ 799.650481][ T5024] ? __kernel_read+0x907/0xb30 [ 799.655228][ T5024] __warn.cold+0x35/0x44 [ 799.659460][ T5024] ? __kernel_read+0x907/0xb30 [ 799.664211][ T5024] report_bug+0x1bd/0x210 [ 799.668553][ T5024] handle_bug+0x3c/0x60 [ 799.672696][ T5024] exc_invalid_op+0x14/0x40 [ 799.677182][ T5024] asm_exc_invalid_op+0x12/0x20 [ 799.682019][ T5024] RIP: 0010:__kernel_read+0x907/0xb30 [ 799.687381][ T5024] Code: 8b e8 bd 9b 2c 02 31 ff 89 c3 89 c6 e8 a2 a3 ad ff 85 db 0f 85 e7 65 2c 07 49 c7 c5 ea ff ff ff e9 bc fe ff ff e8 49 9c ad ff <0f> 0b 49 c7 c5 ea ff ff ff e9 a9 fe ff ff e8 36 9c ad ff 48 89 ea [ 799.706969][ T5024] RSP: 0018:ffffc900032efb40 EFLAGS: 00010216 [ 799.713019][ T5024] RAX: 00000000000015ee RBX: 00000000001d7d30 RCX: ffffc90013d36000 [ 799.720984][ T5024] RDX: 0000000000040000 RSI: ffffffff81c86167 RDI: 0000000000000003 [ 799.728960][ T5024] RBP: 000000004808801c R08: 0000000000000000 R09: 0000000000008000 [ 799.736942][ T5024] R10: ffffffff81c85948 R11: 0000000000004000 R12: ffff88801dc34f00 [ 799.744986][ T5024] R13: 0000000000000001 R14: ffffc900032efd18 R15: 1ffff9200065df6b [ 799.752949][ T5024] ? __kernel_read+0xe8/0xb30 [ 799.757616][ T5024] ? __kernel_read+0x907/0xb30 [ 799.762368][ T5024] ? do_sendfile+0x1240/0x1240 [ 799.767115][ T5024] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 799.773344][ T5024] ? __vmalloc_node_range+0x580/0x9e0 [ 799.778732][ T5024] ? fsnotify_perm.part.0+0x22d/0x620 [ 799.784096][ T5024] ? apparmor_file_permission+0x264/0x4e0 [ 799.789824][ T5024] kernel_read+0xbf/0x1d0 [ 799.794157][ T5024] kernel_read_file+0x3b8/0x790 [ 799.799018][ T5024] ? __ia32_sys_fsconfig+0x150/0x150 [ 799.804316][ T5024] kernel_read_file_from_fd+0x62/0xb0 [ 799.809879][ T5024] __do_sys_finit_module+0xed/0x1a0 [ 799.815083][ T5024] ? __do_sys_init_module+0x250/0x250 [ 799.820480][ T5024] ? syscall_enter_from_user_mode+0x21/0x70 [ 799.826388][ T5024] do_syscall_64+0x35/0xb0 [ 799.830815][ T5024] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 799.836713][ T5024] RIP: 0033:0x7f0fd17db8d9 [ 799.841132][ T5024] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 799.860750][ T5024] RSP: 002b:00007f0fced52188 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 [ 799.869272][ T5024] RAX: ffffffffffffffda RBX: 00007f0fd18dff60 RCX: 00007f0fd17db8d9 [ 799.877418][ T5024] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 799.885561][ T5024] RBP: 00007f0fd1835cb4 R08: 0000000000000000 R09: 0000000000000000 [ 799.893532][ T5024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 799.901505][ T5024] R13: 00007ffd97912caf R14: 00007f0fced52300 R15: 0000000000022000 [ 799.910707][ T5024] Kernel Offset: disabled [ 799.915958][ T5024] Rebooting in 86400 seconds..