fffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:40 executing program 3: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x900000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:40 executing program 3: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:40 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:41 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa7e254f5773f8d2, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:41 executing program 3: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:41 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208203) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8000000000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x1ff}, &(0x7f0000000140)=0x8) creat(&(0x7f0000000280)='./bus\x00', 0x4f) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={r3, @in={{0x2, 0x4e24, @multicast1}}}, &(0x7f0000000240)=0x84) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f0000000340)) r4 = syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x40000) write$smack_current(r4, &(0x7f0000000380)='\x00', 0x1) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x20800, 0x0) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000300)={0x20, 0x29, 0x4, 0x1c, 0x6, 0x7, 0x1, 0x169, 0xffffffffffffffff}) 03:46:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:41 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:41 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:42 executing program 4: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x89) ftruncate(r0, 0x208200) fsetxattr$security_ima(r0, &(0x7f0000000100)='security.ima\x00', &(0x7f0000000180)=@v1={0x2, "75528ddc9cec641bc733"}, 0xb, 0x2) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f00000001c0)={0xfff, 0x20000000}) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f0000000300)=[{&(0x7f0000006200)=""/220, 0x1e0}, {&(0x7f0000000280)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2010000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:42 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:42 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:42 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40100, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2300000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:42 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(0xffffffffffffffff, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:42 executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x400001, 0x28) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000001c0), 0x4) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r3, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:42 executing program 3: open(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:43 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, 0x0, 0x0, 0x0) 03:46:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x7f', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:43 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r2 = mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x810, r0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000180)={r2}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x2711}, 0x10) write$FUSE_POLL(r1, &(0x7f00000000c0)={0x18, 0x0, 0x4, {0x57}}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r3, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:43 executing program 3: open(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:43 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, 0x0, 0x0, 0x0) 03:46:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x7f', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:43 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f00000007c0)={"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"}) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:43 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, 0x0, 0x0, 0x0) 03:46:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:43 executing program 3: open(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\xe0', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:44 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:44 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}], 0x5, 0x0) 03:46:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:44 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(0x0, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:44 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0), 0x0, 0x0) 03:46:44 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}], 0x5, 0x0) 03:46:44 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}], 0x5, 0x0) 03:46:44 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(0x0, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:44 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000140)={&(0x7f00003ef000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000482000/0x3000)=nil, &(0x7f00001d3000/0x4000)=nil, &(0x7f0000185000/0x3000)=nil, &(0x7f00002bb000/0x1000)=nil, &(0x7f000000e000/0x4000)=nil, &(0x7f0000027000/0x3000)=nil, &(0x7f0000dff000/0x200000)=nil, &(0x7f0000e3a000/0x2000)=nil, &(0x7f0000e50000/0x1000)=nil, &(0x7f0000000100)="91c27e646c4f7b5afacb8fff2c91c52a2bb928c61fd99b", 0x17, r1}, 0x68) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:44 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(0x0, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:44 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {0x0}], 0x6, 0x0) 03:46:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:45 executing program 3: open(0x0, 0x141042, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r1, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xd2f873574f257e0a, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:45 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:45 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {0x0}], 0x6, 0x0) 03:46:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:45 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204, 0x13c}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:45 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(0x0, 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf4ffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:45 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {0x0}], 0x6, 0x0) 03:46:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1653.334272][T13443] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop2 03:46:45 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(0x0, 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf5ffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:46 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(0x0, 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:46 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:46:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:46 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:46 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0xffdfffffffffffff) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x2) 03:46:46 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:46:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1653.957664][ T26] audit: type=1804 audit(2000000806.528:223): pid=13496 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir315381839/syzkaller.nqmbpE/142/bus" dev="sda1" ino=17555 res=1 03:46:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:46 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:46:46 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:46 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000100)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f00000000c0)={0x30000000}) [ 1654.322880][ T26] audit: type=1804 audit(2000000806.895:224): pid=13527 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir315381839/syzkaller.nqmbpE/143/bus" dev="sda1" ino=17525 res=1 03:46:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf9fdffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:47 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:47 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {0x0}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:46:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:47 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x10000, 0x0) [ 1654.736946][ T26] audit: type=1804 audit(2000000807.302:225): pid=13561 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir315381839/syzkaller.nqmbpE/144/bus" dev="sda1" ino=16568 res=1 03:46:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:47 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {0x0}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:46:47 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:47 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f00000000c0)=""/252) 03:46:47 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {0x0}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:46:47 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:48 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:46:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:48 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:48 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x8400, 0x0) sendto$x25(r0, &(0x7f0000000100)="190768d13cbc0b7325505cb57896b86622179a81b9ef1e68504a93133c401733c605ed32d1c021835d333c9729eaa6b9ebc865f7acfc6ea512b25a12a6b2ec5328f9edbd438869d466b6bbdf5e215b27ded8ea39272bfa417f9c043cf49d7ff7ca562fb5bce6a12f1f3b0d3e39c99425de7a60d9945552131534b09f42373f1a88bcda2a1215d93404839f45c03f7eb8566bd81987", 0x95, 0x4040000, &(0x7f00000001c0)={0x9, @null=' \x00'}, 0x12) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000200)={0x0, @speck128}) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r3, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:48 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:46:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x23, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x23, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:48 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:48 executing program 4: r0 = add_key(&(0x7f00000000c0)='.dead\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, r0, 0x101) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r3, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) write$P9_RLOCK(r3, &(0x7f0000000280)={0x8, 0x35, 0x1}, 0x8) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000001c40)={'ip6gretap0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000001c80)={@dev={0xfe, 0x80, [], 0x16}, @mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xc5fb, 0x1, 0xc5a, 0x500, 0x100000000, 0x100000, r4}) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000001c0)={0x2, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x88) tee(r1, r2, 0x4000000000000, 0x3) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000140)={0x41, 0x3, 0x8c29fb0cd0ad2c74}, 0x10) 03:46:48 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:46:48 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x48, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:49 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x48, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:49 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {0x0}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:46:49 executing program 4: ftruncate(0xffffffffffffffff, 0x208200) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') listen(r0, 0x6) preadv(r1, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:49 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r1, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:49 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b800000013000100000000000000000000000000000000000000000000000001ac1414aa00000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007a0310"], 0xb8}, 0x8}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000600)=0xc) r5 = syz_open_procfs(r4, &(0x7f00000007c0)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aB\xf2\xc6\v\x00\x1f\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc6\x16\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\x8f\x9a\xb5\xb3\xea>\xba4R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(:\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4p\xe2\x1f\x8d\xd1\xf7L\xedi9s\xba\x1d\xed\x8b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r5, 0xc058534f, &(0x7f0000000580)={{0x7fffffff, 0x3}, 0x0, 0x9, 0x7, {0x53a44b97, 0x9}, 0xfffffffffffffff7, 0xffff}) preadv(r5, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204, 0xfffffffffffffcd1}, {&(0x7f0000007500)=""/192, 0xfffffed8}], 0x1000000000000212, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r5, 0x4008af14, &(0x7f0000000480)={0x2, 0x7ff}) setsockopt$inet_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000000280)="86de2dc0151b44bd1091cdcaa4df6038e827ac13e014aaf9f6288e40f902cc0e3a33b0b9f5a3311cbca4a1bb7b4869da967fb37c6d120fbbbe59f61974cf8097fc55349088c4d902665e502c0fc34aa1a201d6f0a4da294f3b407810ff342c345e9229b8f56add0870cdd640d5dc7913b58b37290dbb785076b156f2d4e480129a9489e0553b0194fad3214040796e4df6468690079c7f3a50361f5896843e8a6b2bd1037d23cbd3ec8d1806de1e12c08597ca6261324030429dc237454b35c2d7cce0f741c82fa9e2e0f0a45d6b68d6b6d4b8b63ab5352ced0c1104993b36cd07", 0xe1) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f00000000c0)=0x2000000) ioctl$VIDIOC_SUBDEV_G_EDID(r5, 0xc0285628, &(0x7f0000000200)={0x0, 0x7, 0xffffffffffffff38, [], &(0x7f0000000100)=0xaa1}) ioctl$VIDIOC_TRY_DECODER_CMD(r5, 0xc0485661, &(0x7f0000000400)={0x7, 0x1, @start={0x2, 0x1}}) 03:46:49 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {0x0}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:46:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffa0020000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1656.914653][T13755] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 03:46:49 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r1, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) [ 1657.056198][T13767] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 03:46:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x68, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:49 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {0x0}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:46:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffff0700, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:49 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:49 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r1, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x68, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:50 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:46:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffff7f, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:50 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') socket$xdp(0x2c, 0x3, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x2000000, 0x0) chdir(&(0x7f0000000040)='./file0\x00') symlink(&(0x7f00000001c0)='.\x00', &(0x7f0000000200)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f00000005c0)='./file0/../file0/file0\x00', 0x80000000002) fchdir(r3) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x4000, 0x0) getpeername$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) [ 1657.618910][T13817] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop0 new:/dev/loop5 03:46:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:50 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:50 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:46:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x74, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:50 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x74, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:50 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:46:50 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{0x3f, 0x0, 0xffffffffffff8000, 0x4}, {0xffffffff, 0x7, 0x3, 0x8}, {0xc31, 0x10001, 0x6, 0x100}]}) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000000c0)=0x2, 0x4) preadv(r1, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:50 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:51 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x400, 0x10000, 0x3f, 0x1000000000000000, 0x0, 0x6, 0x2000, 0x2, 0x883, 0x7, 0x8b, 0x3f, 0x0, 0x400, 0x8, 0x20, 0x51, 0x9, 0x5, 0x4bb, 0x6, 0x4, 0x1, 0x7, 0x2, 0x2, 0x7fffffff, 0x0, 0x10000, 0x5, 0x9, 0x2, 0x1, 0x7, 0x0, 0x885, 0x0, 0x2, 0x0, @perf_bp={&(0x7f00000000c0), 0x6}, 0x1040, 0x0, 0x6de, 0xd, 0xfffffffffffffffd, 0x4, 0x4}, r3, 0xa, r2, 0x3) 03:46:51 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {0x0}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:46:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xe0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:51 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:51 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {0x0}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:46:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2a0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:51 executing program 4: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x3) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() sched_getscheduler(r2) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000240)=""/209) preadv(r3, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) syz_open_procfs(r2, &(0x7f0000000200)='children\x00') 03:46:51 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2a0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:51 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {0x0}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:46:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:51 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:51 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:46:52 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000100)='team_slave_0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000600)=@add_del={0x2, &(0x7f0000000000)='nr0\x00'}) syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/220, 0xdc}, {&(0x7f0000000580)=""/90, 0x5a}, {&(0x7f0000000200)=""/247, 0x1f}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000000140)=""/192, 0xc0}], 0x1000000000000003, 0x0) 03:46:52 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:52 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:46:52 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:52 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:46:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:52 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {0x0}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:46:52 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x10) ftruncate(r0, 0x208200) open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x306, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000800}, 0x40000) preadv(r1, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:52 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x500, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:52 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {0x0}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:46:52 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:53 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x2081fc) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r1}) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./bus/../file0\x00', 0x4, 0x5, &(0x7f0000000380)=[{&(0x7f00000007c0)="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", 0x1000, 0xf92}, {&(0x7f00000002c0)="aa058099865fdf464e5463929819a62617e8e2efb2a724042a7ace2bd9f3a61e112f0baf0616e7d7321cf857cd3a6b29a9873071aae4540560418c9915d38ffadd9f11", 0x43, 0xbf9b}, {&(0x7f0000000500)="8c2ee3ff080ef2734771a2962bae451c85ec5f54160d4bffe127a102a7bd6d23b916f7937b9040bf7f08245aea9450e3f9601a06815995e4d22abef6be649246277943cbfdc5f342151ed0571ab7919a912a769a4c63e303639340ebbd91b891ef3186057be181b675b87f7d04de6f35cddad738308449d45a66bda2b11ddf26f7b4e35ed99d5c149de1b52c14c8279da60d5cc30f36707570fa9372aaae5dda157eb4cf412e13ec5918f9662d4cd1d5fced18f85cc100796d115d4bab2da8e4b8951c6047b231d4b493561779d0c238e68b8fa10a2ec902b0c9c3b32cc9c1c92d8e", 0xe2, 0x7}, {&(0x7f0000000340)="9e30641b6df68acc602b99cdfea6083d14e1292fcbd0e709fef4efd219ef30a24987e68a342da8c3c57d5eea7b96f53c290d402b35ecc9266abef54639dbff03", 0x40, 0x6662}, {&(0x7f0000000600)="40dea89622cda9b44568e9d7656330c8be088111d778a745808678de1d25a67d54155db2bc45f2eb5767029301429fee223c642c674aa43c99fc7b5a4c57b83ed3af3c61215ec284e04fc638324050475469b9b26eaf11f362db2713065e7c162545ba6f6819c59b9bf738eb04acda5725c766b2b22939dbbdf0dc149e46ccc4d4a712f82882ec00c9b0119e8e64b31520", 0x91, 0x2000}], 0x40004, &(0x7f00000017c0)={[{@quota='quota'}, {@nobarrier='nobarrier'}, {@quota_off='quota=off'}, {@data_writeback='data=writeback'}, {@noacl='noacl'}, {@locktable={'locktable', 0x3d, '/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b'}}, {@upgrade='upgrade'}, {@norecovery='norecovery'}], [{@seclabel='seclabel'}, {@subj_user={'subj_user'}}, {@obj_user={'obj_user', 0x3d, '/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b'}}]}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) write$P9_RREADDIR(r2, &(0x7f00000001c0)={0xc2, 0x29, 0x1, {0x7ff, [{{0x80, 0x0, 0x6}, 0x4, 0x2, 0x5, './bus'}, {{0x2, 0x2}, 0x0, 0x4, 0x5, './bus'}, {{0x28, 0x2, 0x1}, 0x7, 0x6, 0xe, './bus/../file0'}, {{0x40, 0x3, 0x6}, 0x8, 0x0, 0x5, './bus'}, {{0x40, 0x1, 0x1}, 0x1e, 0x0, 0x5, './bus'}, {{0x8, 0x2, 0x3}, 0x1ff, 0x7a7, 0x5, './bus'}]}}, 0xc2) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000000c0)=0x3, 0x0) 03:46:53 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {0x0}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:46:53 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:53 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:46:53 executing program 4: sigaltstack(&(0x7f0000ffc000/0x2000)=nil, &(0x7f00000000c0)) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x600, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:53 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:46:53 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:53 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:46:54 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:54 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x6, &(0x7f0000000340)=[{&(0x7f0000000140)="9eea78224dd3cedbae604e9d22bbf967a3db6b052993e73899c9a54d50c2d736484db93e56d910c2766003eac3fd9c820f364e5a3b78d2420241a793b4cb3b5a78985b2e68050c0024ae8b4689a5235edc1e999d83877f6197b6fc6e3b4553094d4bf90620357144ea34cf136ebc6946b8ad183032bf984d47d1a0e94e8cdc2ca5cf58f5224e8c49297adb1887d08e3970df522c91ca157b4726ba09cbc945f315f66c7582cc45254b47a6565d88b0a8fff0de38e6de79669de39a6a9ba8deb716825a79a39f3b0d689b45157cc7bdb9d8c102b77eb2bb7aa67cdadff587af8527bd7acd167ff78afe7e4902afff3446", 0xf0, 0x40}, {&(0x7f00000007c0)="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", 0x1000, 0x7}, {&(0x7f00000017c0)="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", 0x1000, 0x8}, {&(0x7f0000000240)="84858d284c6f6ef9691a7b73eb99f16e56a12d16e105beacc876023cb1a0e4cb973c95fb5beead7f1305b322cc3a2686aa9be2cd5c44ab0a8f39885d844ca68b236aaf2c1c3e991319bf2c0ea4803b5208f11daa32b5174e30a3a4a2e69b3955053c1d22", 0x64, 0x20}, {&(0x7f00000002c0)="016369a5d1865bcb3e6b9891eb1bbca3c54503dc93cdf76adee89cd1acff2ea77765240d6b9810428caff2255c9f1d4b9c9040f0fa5d040e46dab008a0fe89bfce6f1157c9d340934a0b1b24df1f14b8791d0d0f2eab0970d1e10a8e", 0x5c}, {&(0x7f00000027c0)="6d3cd3fa36b6950e67ddaa22164a60670ff0c06b8180aba913fb52a29b063ee42955b826f59397d0314e59ddc4348349a9425095674c128b802f321fa7056c31b373e01e5bc1ae0c05560ce907c960fee6bba685d832a7db2f303fdb6529290268b9b282a03c3c905532a0e46e92864d4b411d5a8330119824cba9a0f2a043549974db75ea5d686416b434f7d03f07ed6e65aef386524486211c95bcf0051485bad67bbb6a3374e2566b620f31a3460705fd97aa4092bc28bd48e5716c8f64d52635fd1b683af3285a29d20c98ff19eef8991ce94df8637f31717c9092f977fd3af5f37c7aa3e95c29b44125c189fc391a7147fa1748211762a49fa52d9eca0a1f67bec9cbed7eba8da638465d74812bf5a0101112b8202b88d674bd2a6c67ab15e854b181655345e604e140a8b2c95384949c9571ea0bb11cfd00b544492ac390874fbf46f968d9bbd12d710530249ce593021f55be56eff9d04f033adae6eed234cc0a090f86f5280ced3cfef5b1cbd1c6cd866942352d6be971d0e5babc0222511f590a6288a64a6480ba3a5624c8e2c2c14ae4e3c782df89a0cee93e95a81b8446b3b1331aba885dcd35a0bc9d511ab6326969e9477a9578389c35b74ee1ead25adc564b21f6b11bcc3118f8b2cf8453523bb47b53b35469ce5348ea070a0ba3ccd1009b290724d35818c9e8ffb41b5c1685e79123cd60901143882b2fcdbf753d8565b0d90d321f4764eb307b5ed816d29db168bf2bb9bb4db0ac8282ecc305e39dc104dd7ccaa522104d6b5d620919f69a8c326ef4436fc4b0b0b90a9327c428e6a18d0febd031b679d25258586f99f821a151886a739a94093510de91d9b98e39d5ebcdbecda4f2664d9b42f5df92a04e8bb5b99af07aae89433dd9da2089ecc31a0013677cc4c735056903664572e686a51ced08d67d8428c0a688d83cc2e11d0c92f0ccd9ec72a798493d7c64c20a1fe5590e4aeac839335fcabe050acd38d2a5a67a9cad365ca62fbb049923072cde0c68e346c15abcbed15b4c4c4460c83d981de0696889619e924fd87670b996522444224a23b98f491ede6db98a961881b95b737938c29f43e7ce3234cb57207d1822d897551790b4f45006a294d5323ad8a5901a548cc8e5afc5707a86e0ef309625840fee4735b50ac5689757fc95713e768f98a885948639acf224056ebf3f2fc3a5718f70d6e3189c5c77c02d62c30e1f0b1510abe1f27db63cd332e9caa1f2f516559541621dd3b54657de334321b4defaa09fd2bb573b0d915d6fbd1f5eae25b230657c790c7e2f2d93ee94322d800ef6a9da03ef8959e4436e6c3fe236db6281ea9c29efac827e380fb130cc142f6c4e3656d704372810958fccd853a215dbd3e5861e074260ecbe26ea42603741950e2eaa4214f614f6242e0f05aaac205f9fbff308574add28f8f4fbb76d48863ffeaaa8f1ef3005bb30876fbcff816a00d508f2705fd5fa35b01c06263377c8391889b22249a8aca61f8bf5e611e6b62b59e58323e010d0b7cf7c1d52b2f0ccbf2ca8e2475fff9d097a83f46d817d026243ef28bac81db1687ab29a42f425f008d1d890d6d5c21493fa358e92cb142bce4ac5d15e5c8d74ffa200d915878ca6d072e1fbb752af8830174f71d4ced05323d33e0f63826c1046a0b82297a4c0ebbd1082611bf54c5ed7889c2de6b5d37e08796a436f0c249a37761c27fa78b722a9214f8e8e903c47c47417a1517f58c9e8073fb10560477402ebb618b89c6ea3294350aa4d540cab64520399d1c806542e9ee4ab2f6ad49c9cce61f1f022b73f112b79ac65b0ef931aa55cb605d652a19589e972e1244efbc4c13b54a88fa527e59c823f4f178f90ffcfd424330540dfac7fdae46ee01a04f9f263ebbe23a9049695c16ee4c1735fa92d4036b4a5d634ee0a506272917ede0ac304190dee3ad875db7cb1c8fdb0ebe39d460abbbf0c47c9a027f0208bc9121b358e0bc0cda4babce89f5299440b52e57a28e0c8461db12adf6129316c5c75f1c86e4b07460d46e2bb7bc3a4e9bb18036ba527e1d7d384912e9ff338fe0ee8bb4e49ca90aac4f38a1e891625618adad70ba806f19c6aad39ffb690f0ac63f28e1b524be5733336c488a6116c5c9c5406605a7438164a935559a8cc245ad33bd9f74098ccfe49144ad779e89bb9c4b9e00a3aa0d326fe19c1fbc8a29b12326ecc29568d831a05bff0ccdfc077184d5f91548d13a84ba481fbca22a14691787b4f26b916856a46d5eeda2a1cf964f41028270169966a4409a35688cac52f9e9c579d29f7a3fd2b153399b24151a3973a0e9233c1198f593aae7eceed109df7e59c00a46c3d3288466052524939c9376f31a62b751ca783cf13a16cc232aa14c32262987a93b913dcddd2c2a988300a65ef75bcdccc84486f89d1e3358cc19a2493b606e71b06c8dc5669be76c8fa13a1e3f0dcdc96a4d6923d4ff0e872b2d68a7dd7e5bd8e7d423a201afa6de3a0349409dd8c271ab5c7560a03980993d86de3f5be82f218f80207a3d8bbc3c270b8aac47524274da07c518db51be8f5bf53fc2ffc3135198b49a73b108a5633d85af6e3e3caa80cdbe4eec72f7de421be8d4f4a476d46af16eecdc44c7570f5533dddce52c08adf8bbe7573d2865a87ce0191de8a18f18c4da956341d02ee7ab5c3b841b3532fcef69fc09f1c0c9365a09e5bfb49e7db50bfb63ed631bd1d059f2ef7b47025d7727e1235c63b37c12953cd30629592e999c5ab1965d40f5084a509bdf062984d206aed01e72d35353a070f1528f48ecacb075dbe4b0583ac333cac7ec1d9c0c1a7284d917c7d59df01910d2ed772fb9da93a5f927bdda1892c7e05bb05a5b8ad04ab2f6c1a82432bda4016265c7728936d27fba91285c73cf34ff1704e9ae563caeb7d943643cbf3c2d05973f80d40b4d11293067017cb404a7f9a2a07d70323d1833882a6f1a07b0296cae812362eaf1b4012a9766d41e941be1394afa4bba55df9aa43276c1899cac88f16d40fea8c8928a0094cecbb21134b87e19c192aeb188a676a52fcc09e01ad248fe29840d749d3b68f8d7fdd84acb3ff2faf895d9026f540b209f9d204ae7e1b7d1d6e87aa42b8530010f15830251e64f65863fe2953decf4f6fed9ed5802241615b1a5a3c4a4c80219b996f87d8d1411ea75bb6a85925410b3c19f394492a22497f6646fdf4306faee4cfc693a839003ed502e818442c0a7234e79fd4334141271d9d204b6617880c3fdc2bcc5be5a5059b1954f517b696857bf6bb53fd8e7484275482016992c8d3fdf4ba93eed6723d64d5e9d659a7a5d15660ff3ef320091702ec9591a113be599ca15e841c372ad4c69e5e4865e2971cac0f77d5c1aea108523297d49e5f014e1ce230da0a8272538cf936382d067a2ebf68d5b0e16748b6dece4e43766232a27bdc53f3775ba40772ac404db22dc17dbf0a64ff423a024a771dd00ca715c205fe7e69c757eb5bead0ddf96635012ec7d3964bdffe27b0438071558a76fd34046c72dc198b43db8314af492833ea0c1f3ea82dd427772d3d688f3707681063183dfa36f8337721d7b9a43db87c066635e91b90f0e6766a63d468eb81ddef456f474338237a3dfe328ab6eb41b554196f3a741166d36bfacefa2ae31ffd7574e28bffa2ee90aa0c365ee7162a2ab723445057d4bc24fb0449af5f729211b83920aff8ea2cbcf8dc0ebdba9a993dd080d8dce0cc39c4325d874bef32cb70618ca9a2744b6a25b31ff0a3389561c01bf33792e7d5f2ab64f66b60cdae084bc10deb458ba9202f7c924f8ee2f120c7afe4d9941b58568a4144b63ea05c5c8dc4d638ea01f3a5bd56ceb2ef33c22d065159ea7117183490e6022ff9ba6a828fd50b7ab48eb85e2b86094c5cab5c6e15de6886012c10ddc6b0d2bd1b558692fbe97a9a9e1c2cda8827a7dcc7c51f5efca8c36d120fffe5764ff53f46404e8071cf067627414cb50f4b6dc2c6d3913f5fad3eb55de619b846bc9e5a4ce4f3358d3576b409a9fbea371589a22ab0d23c443e80b1fb7e93eb19b3f48c9ca4e50a5b9a66071317ea7df5253ada4c9877b6bf1b2b6d084fcc1e6dfd1ff9acde0601b1c5ddbfb508ad281e6a38f8a1a0e44a8206e6089f5dc849f999374644263afff388eff12c4c7bc3c81da15a414aa407aff093634b45c99c403994943c247492348509817af2a0748eb5150a559ce9c23f24e0834762d6b5545f5e21e48607608c079f75cca2f223b702398e2930f397890a03cae3893f9ac6733ce71aabeed3d04781e362542087396bb8456a5ca238bfbd6639a4021b6f148a721ef997d2c674bfadc1eb7cd756d1d139c51c3fa784829f97da0c72214bddbf8eee331c5e083d93b1ab2739ffa5fc223fb309950d26209a55b55d367e23616452f13162b73a4da857beac3276c7633b8aad30da5c6111c1cf4f22a308d1f45f880e42371955a6058b73b14072465b6c2faab0971fbb56ca351834c76e81931939322284c0e1bff6e97107424c58f405d0952d5a5164b617cd40480108a0bfcd6651bab3dcb5c0e911425c357186941d48524ed7bdb163b45ee662462c64a6ec3c61fa88685923cccd82f793cdfc68735002597ae8c77c803f315da1949d87ad6e9a5cd7383e5996f549568ca96e1658c3cbca0ccbb683b42115ffbbabaac97e22f6e6c7b82ffd96f6513b97a8d9c5e33d6151bcc4d817cda91fd904b0673dd301338087c2365a8d1a4b68c5d14dd1e60cea99908a73e7a51ab2d73817c655cee05b08902709109a34f3d18a10064b084119b650c0b4e3101569cdab18ed16597ad0ed7f5ace311837f7916f59171c61214fe1d4777902e5bae959cbf8b903f9c67b8fa3cdacf1cd7f3ec130b1a6961cbb63e3f5c1042040a8e4f09a2e650be8926c3a1365acfe1c1ee058337efec6f9a8b2e9326a9cd1ec5719912853de83b417f53054d86f77407413ee0f6f4bcfdfe4dd02ded2ea6009d46de0bfddc696a0ba94289479db506c716c7ed8655dba2908afe400dfe82fecfa418f1f29eaa8aaecffef3e9fff3c8d359b08a02f3a5fdf897792cf89f854de193eb3124dfc39240422e8591c51e0b74275c2cb27676977622b63731e4b415e58fdd4a75f98c00ecd279588645bbb68897d07f7bf50320d144bb7aac8e7c677d4d8f6edf92591bd273bb18816347391d201e5a402e9bf501e97109403dd6dc8f2446ab3ba37d7aa50556c40dcb40db490e2225970f4dc42add0119ccaed474782dc744054130be90decc59b300fad78fe5417676291a19696c2479774766ece6c41846004725d4e07ebea038711a15d5f0859046faf4ab35ec78c50102f39ac58a9da5c90026408120762c2c092e1497bdcaf2c18d2cc6636e7ef79f930f21dacba6d8778242b217ac262c1b59fd1412e567700a5be07f1fc3bd7adef02b39a7397e13504d6269c408300fa29acc4226111d2810eb67089265e9dd02199d21fe99f175768af15d811be029bb278e137a7af8a7e1676f084d99833613ee710dc7e8938b3a288cf5403fa1270dac67ebdc80f709ec7bf08cf1e79f775612e021cb1ab06960c3fbdc1839f1ed2cb5d6b87135b093c008b1de495e9e5f7b3c35a2766681a3a20c5c3bc9db56039a6da877b3a546685479f1c4d02c43c864f131fc3e1ccff305478eb1c678341a265a58fa5c6feb0de7820d47f9ee9bf617c8af65c46b8d452be72a9112fee6b5afd02fcb8ea1ada8c03271f1f6bf5fd24c7e1d2892e6c77dd9224bb5ed270fa5526", 0x1000, 0x3ff}], 0x40, &(0x7f00000037c0)={[{@notreelog='notreelog'}, {@enospc_debug='enospc_debug'}, {@datasum='datasum'}, {@user_subvol_rm='user_subvol_rm_allowed'}, {@commit={'commit', 0x3d, 0x5}}, {@ssd_spread='ssd_spread'}, {@fragment_all='fragment=all'}], [{@dont_hash='dont_hash'}, {@smackfshat={'smackfshat', 0x3d, '/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b'}}, {@euid_gt={'euid>', r2}}, {@permit_directio='permit_directio'}, {@func={'func', 0x3d, 'PATH_CHECK'}}]}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r3, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) 03:46:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xae00, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:54 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{0x0}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:46:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:54 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{0x0}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:46:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa00, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:54 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(0xffffffffffffffff, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xaf00, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:54 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x3, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf17, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:54 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{0x0}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:46:54 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, 0x0, 0x0, 0x0) 03:46:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf17, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1020, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:55 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, 0x0, 0x0, 0x0) 03:46:55 executing program 1: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') socket$xdp(0x2c, 0x3, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x2000000, 0x0) chdir(&(0x7f0000000040)='./file0\x00') symlink(&(0x7f00000001c0)='.\x00', &(0x7f0000000200)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f00000005c0)='./file0/../file0/file0\x00', 0x80000000002) fchdir(r3) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x4000, 0x0) getpeername$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1020, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff1f, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:55 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, 0x0, 0x0, 0x0) 03:46:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x170f, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:55 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x170f, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:55 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}], 0x5, 0x0) 03:46:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1f00, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:55 executing program 1: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') socket$xdp(0x2c, 0x3, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x2000000, 0x0) chdir(&(0x7f0000000040)='./file0\x00') symlink(&(0x7f00000001c0)='.\x00', &(0x7f0000000200)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f00000005c0)='./file0/../file0/file0\x00', 0x80000000002) fchdir(r3) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x4000, 0x0) getpeername$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:56 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}], 0x5, 0x0) 03:46:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1f00, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:56 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x26a402) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2010, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1663.866299][T14339] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop0 03:46:56 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}], 0x5, 0x0) 03:46:56 executing program 1: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') socket$xdp(0x2c, 0x3, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x2000000, 0x0) chdir(&(0x7f0000000040)='./file0\x00') symlink(&(0x7f00000001c0)='.\x00', &(0x7f0000000200)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f00000005c0)='./file0/../file0/file0\x00', 0x80000000002) fchdir(r3) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x4000, 0x0) getpeername$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2300, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:56 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {0x0}], 0x6, 0x0) 03:46:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2010, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:56 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fcntl$getown(r0, 0x9) r3 = syz_open_procfs(r2, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000540)=ANY=[@ANYRES32=0x0, @ANYBLOB="6b000000154fcb24d50a299b158a3e873e681244479ab556e1408b354844497e955f5b2ea00e102c0c31912d337459d1dd45d3d96f34ba51211a076fcc94c7ba010000005ee38d25bebe677cdeffe4ea31b4c4ef7a2addd1dd134ec8dfee82c5b50144e6737ea0df56139bd189be3853e4dcc713dd05d2"], &(0x7f0000000200)=0x73) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000240)={r4, @in6={{0xa, 0x4e21, 0x3, @ipv4={[], [], @multicast1}, 0x7ff}}}, 0x84) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="2f040000006d64305d"], &(0x7f00000003c0)='./bus\x00', &(0x7f0000000500)='omfs\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) sysinfo(&(0x7f00000005c0)=""/195) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x20, @ipv4={[], [], @multicast1}}, r5}}, 0x30) preadv(r3, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r3, 0x0, 0x482, &(0x7f0000000300)=""/30, &(0x7f0000000340)=0x1e) 03:46:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0300000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2300, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:57 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:46:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0400000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:57 executing program 1: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') socket$xdp(0x2c, 0x3, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x2000000, 0x0) chdir(&(0x7f0000000040)='./file0\x00') symlink(&(0x7f00000001c0)='.\x00', &(0x7f0000000200)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f00000005c0)='./file0/../file0/file0\x00', 0x80000000002) fchdir(r3) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x4000, 0x0) getpeername$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:57 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f00002a3000/0x1000)=nil, 0x1000, 0x1080200, 0x4002012, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0500000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:57 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) [ 1665.189358][T14465] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop0 new:/dev/loop2 03:46:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4800, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:57 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x3, &(0x7f0000000180)={&(0x7f00000000c0)="c4a3f916b30908000052c462ed0763da65406d2ef3470fc773206747a7c4e2e5bed58f896801f566400f380a15ffefffff460f38cbed66470f3817a90f000000", {}, 0x4, &(0x7f0000000140)="c442692e30440f16a200000080c4828d924cc2fec40239ba0ac4814a58d82e400fb4a4260f000000f247afc4817e7ff4660f4e3e6565f3460f12bce332233333"}, &(0x7f0000000240)={&(0x7f00000001c0)="673666460f73d80536d37d798f0878c0490079c421ade570006440c3dfd0f3460f2dce470f98405bc403997e610dad0f2b3b", {}, 0x0, &(0x7f0000000200)="67660f129c6ee70000000f01f93642d3e3c4c3fd00f10026676545d8f0f243d9e9f36d0f00ed8f29c0969c3600000000c4c2f9224105"}, 0x8, &(0x7f0000000280)) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:57 executing program 1: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000140)={&(0x7f00003ef000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000482000/0x3000)=nil, &(0x7f00001d3000/0x4000)=nil, &(0x7f0000185000/0x3000)=nil, &(0x7f00002bb000/0x1000)=nil, &(0x7f000000e000/0x4000)=nil, &(0x7f0000027000/0x3000)=nil, &(0x7f0000dff000/0x200000)=nil, &(0x7f0000e3a000/0x2000)=nil, &(0x7f0000e50000/0x1000)=nil, &(0x7f0000000100)="91c27e646c4f7b5afacb8fff2c91c52a2bb928c61fd99b", 0x17, r1}, 0x68) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:57 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) [ 1665.450433][ T26] audit: type=1804 audit(2000000817.933:226): pid=14484 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir020043097/syzkaller.WnHYjh/36/bus" dev="sda1" ino=17567 res=1 [ 1665.514275][ T26] audit: type=1804 audit(2000000817.992:227): pid=14484 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir020043097/syzkaller.WnHYjh/36/bus" dev="sda1" ino=17567 res=1 03:46:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1665.585418][ T26] audit: type=1804 audit(2000000818.062:228): pid=14484 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir020043097/syzkaller.WnHYjh/36/bus" dev="sda1" ino=17567 res=1 03:46:58 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:58 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x400201e, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) [ 1665.694864][ T26] audit: type=1804 audit(2000000818.091:229): pid=14492 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir020043097/syzkaller.WnHYjh/36/bus" dev="sda1" ino=17567 res=1 03:46:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c00, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0600000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1665.808685][ T26] audit: type=1804 audit(2000000818.091:230): pid=14484 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir020043097/syzkaller.WnHYjh/36/bus" dev="sda1" ino=17567 res=1 03:46:58 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {0x0}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:46:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4800, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:58 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000240)=[0x8001, 0x7]) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'eql\x00', 0x0}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x57}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) timer_create(0x1, &(0x7f0000000a80)={0x0, 0x2a}, &(0x7f0000000ac0)=0x0) timer_delete(r3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r2, 0x0, 0x7ffffffff000, 0x0, 0x0, 0x0}, 0x28) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000140)={r1, 0x1, 0x6, @random="1f6712670dd6"}, 0x10) ftruncate(r0, 0x208200) r4 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r4, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000600)={{{@in=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f00000003c0)=0xe8) r7 = getuid() syz_open_dev$vbi(&(0x7f00000008c0)='/dev/vbi#\x00', 0x3, 0x2) getresgid(&(0x7f0000000740), &(0x7f00000007c0)=0x0, &(0x7f0000000800)) lsetxattr$system_posix_acl(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)='system.posix_acl_access\x00', &(0x7f0000000840)={{}, {0x1, 0x3}, [{0x2, 0x5, r5}, {0x2, 0x1, r6}, {0x2, 0x3, r7}], {0x4, 0x1}, [{0x8, 0x1, r8}], {0x10, 0x7}, {0x20, 0x3}}, 0x44, 0x2) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000900)=""/201) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x5, 0x10000, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffdf, 0xffffffffffffffff, 0x0) r9 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) r10 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) ioperm(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_CREATE_BUFS(r9, 0xc100565c, &(0x7f0000000340)={0x4, 0xff, 0x7, {0x9, @raw_data="1f1bbfd8fb508091c0a1bbe5c642c8a72830ae7ebd4577da81ba061070366bd8719c3d04c42ebb0b309ee27d1fedbdf4c3f5065f5085c9f8266ecb60c175d9515c542a0964deb88dc443604766a250cc26f653d21e017cb4aca33057a93863f2724980ba098065f10ba6dc3af0f26c49a86a4764e6c8e90a87d4b2e8256c13586300a126ce28cf957466e645ffac833f899d39b29eb3eaa9346c3b326b5f7a4731888800467e65971342aa536195d1412f43652a33aba4e1fb139298e6add9f62c35544325c21395"}}) write$UHID_CREATE(r10, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000000c0)=""/11, 0x8}, 0x120) read(r10, &(0x7f00000001c0)=""/169, 0x2d) ioctl$VT_RESIZE(r9, 0x5609, &(0x7f0000000040)={0x9, 0x8000, 0xfffffffffffffffa}) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) dup2(r11, r10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:46:58 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {0x0}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:46:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0700000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1666.404574][T14545] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop0 new:/dev/loop2 03:46:58 executing program 1: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000180)={0x4, 0x5, 0x0, 0x1, 'syz0\x00', 0x4}) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000140)=0x1) preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:46:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6800, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1666.563227][T11028] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1666.601644][T11028] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1666.622061][T11028] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1666.673290][T11028] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1666.711267][T11028] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 03:46:59 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {0x0}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:46:59 executing program 1: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000180)={0x4, 0x5, 0x0, 0x1, 'syz0\x00', 0x4}) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000140)=0x1) preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) [ 1666.719171][T11028] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1666.737219][T11028] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1666.756368][T11028] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1666.797201][T11028] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 [ 1666.990385][ T17] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 03:46:59 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:46:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c00, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1667.036278][ T17] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1667.072707][ T17] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 03:46:59 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) [ 1667.080180][ T17] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1667.093059][ T17] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1667.101320][ T17] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1667.116648][ T17] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1667.128861][ T17] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 03:46:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c00, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0900000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:46:59 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8, 0x1010, r0, 0x0) preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) [ 1667.151483][ T17] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz1 03:46:59 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:46:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed1000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6800, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:00 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:47:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7400, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:00 executing program 4: lgetxattr(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)=@known='security.apparmor\x00', &(0x7f00000001c0)=""/244, 0xf4) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r2 = fcntl$getown(r1, 0x9) setpriority(0x1, r2, 0x9) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r3, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x4}, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x48) 03:47:00 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {0x0}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:47:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed2300000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:00 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c00, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a00, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:00 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {0x0}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:47:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0eda002000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xe0ff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:00 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {0x0}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:47:01 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x13, 0x2e, 0x5, 0xb, 0xa, 0xf3, 0x5, 0x2c, 0x1}) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x7, 0x40001) timerfd_settime(r1, 0x1, &(0x7f0000000140)={{}, {0x77359400}}, &(0x7f0000000180)) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7400, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0003000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:01 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:47:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:01 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:01 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x6) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a00, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:01 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:47:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0005000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:01 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={0x0, 0x5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={r1, 0x400, 0x3, 0x8}, &(0x7f00000001c0)=0x10) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r4, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:01 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:47:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:02 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {0x0}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:47:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0006000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:02 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x400000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:02 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffe0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:02 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {0x0}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:47:02 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x40, 0x801) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xa00000, 0x0, 0x2, 0x1af2}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000180)={0x9, r1, 0x10000, 0x9}) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r4, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f00000000c0)=0x2, 0x4) 03:47:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0007000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:03 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {0x0}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:47:03 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) fsync(r0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f00000000c0)={0x6, 0x3, 0x1ff80, 0x2, 0x4, 0x401}) preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0009000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:03 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:47:03 executing program 1 (fault-call:7 fault-nth:0): open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed2010000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:03 executing program 4: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r1, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:03 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:47:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:03 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U-', 0x3}, 0x28, 0x2) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) [ 1671.418212][T14913] FAULT_INJECTION: forcing a failure. [ 1671.418212][T14913] name failslab, interval 1, probability 0, space 0, times 0 [ 1671.438234][T14913] CPU: 0 PID: 14913 Comm: syz-executor1 Not tainted 4.20.0-next-20190107 #6 [ 1671.446926][T14913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1671.456988][T14913] Call Trace: [ 1671.460300][T14913] dump_stack+0x1db/0x2d0 [ 1671.464635][T14913] ? dump_stack_print_info.cold+0x20/0x20 [ 1671.470360][T14913] should_fail.cold+0xa/0x14 [ 1671.474937][T14913] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1671.480730][T14913] ? ___might_sleep+0x1e7/0x310 [ 1671.485582][T14913] ? arch_local_save_flags+0x50/0x50 [ 1671.490876][T14913] ? add_lock_to_list.isra.0+0x450/0x450 [ 1671.496501][T14913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1671.502784][T14913] __should_failslab+0x121/0x190 [ 1671.507747][T14913] should_failslab+0x9/0x14 [ 1671.512242][T14913] __kmalloc+0x2dc/0x740 03:47:03 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) [ 1671.516473][T14913] ? __fget+0x473/0x710 [ 1671.520620][T14913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1671.526852][T14913] ? rw_copy_check_uvector+0x28c/0x330 [ 1671.532311][T14913] rw_copy_check_uvector+0x28c/0x330 [ 1671.537593][T14913] ? rcu_read_unlock_special+0x380/0x380 [ 1671.543225][T14913] import_iovec+0xc1/0x2a0 [ 1671.547638][T14913] ? dup_iter+0x260/0x260 [ 1671.551984][T14913] vfs_readv+0xf5/0x1c0 [ 1671.556138][T14913] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 1671.562201][T14913] ? kasan_check_write+0x14/0x20 [ 1671.567128][T14913] ? __mutex_unlock_slowpath+0x195/0x870 [ 1671.572774][T14913] ? __fget_light+0x2db/0x420 [ 1671.577445][T14913] ? fget_raw+0x20/0x20 [ 1671.581590][T14913] ? check_preemption_disabled+0x48/0x290 [ 1671.587282][T14913] ? __sb_end_write+0xd9/0x110 [ 1671.592032][T14913] do_preadv+0x1c4/0x280 [ 1671.596256][T14913] ? do_readv+0x300/0x300 [ 1671.600575][T14913] ? __ia32_sys_read+0xb0/0xb0 [ 1671.605335][T14913] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1671.611404][T14913] ? trace_hardirqs_off_caller+0x300/0x300 [ 1671.617201][T14913] __x64_sys_preadv+0x9a/0xf0 [ 1671.621895][T14913] do_syscall_64+0x1a3/0x800 [ 1671.626466][T14913] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1671.632069][T14913] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1671.637756][T14913] ? __switch_to_asm+0x34/0x70 [ 1671.642513][T14913] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1671.648055][T14913] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1671.653930][T14913] RIP: 0033:0x457ec9 [ 1671.657795][T14913] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1671.677371][T14913] RSP: 002b:00007fd9b353ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1671.685748][T14913] RAX: ffffffffffffffda RBX: 00007fd9b353ec90 RCX: 0000000000457ec9 [ 1671.693691][T14913] RDX: 1000000000000212 RSI: 00000000200075c0 RDI: 0000000000000007 [ 1671.701642][T14913] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1671.709608][T14913] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd9b353f6d4 03:47:04 executing program 1 (fault-call:7 fault-nth:1): open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) [ 1671.717548][T14913] R13: 00000000004c4861 R14: 00000000004d7d20 R15: 0000000000000008 03:47:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x400000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0020000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1671.967052][T14936] FAULT_INJECTION: forcing a failure. [ 1671.967052][T14936] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1671.980906][T14936] CPU: 1 PID: 14936 Comm: syz-executor1 Not tainted 4.20.0-next-20190107 #6 [ 1671.989569][T14936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1671.999604][T14936] Call Trace: [ 1672.002874][T14936] dump_stack+0x1db/0x2d0 [ 1672.007198][T14936] ? dump_stack_print_info.cold+0x20/0x20 [ 1672.012908][T14936] ? __lock_acquire+0x572/0x4a10 03:47:04 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000001c00)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0}, &(0x7f00000005c0)=0xc) fstat(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000017c0)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)=0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001980)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000001a80)=0xe8) syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x4, 0x5, &(0x7f0000000500)=[{&(0x7f0000000140)="cc0c88b02338aa811a019748c4fe58ddec196e913bb0600b00d85c6f8675c86380ecf8a3aaa1b6370200a982f15580763d320a4a4aee5f6453a4488c7f57552e422097453e396d7bc9462f0b59fc806a03c16a9598cd497446ab6a6b36d70a536af1464571c745697c5adcc818592de00da0f8b6b002294ffb0ad234d05d29848a79b8a86fa84741dc", 0x89, 0x9}, {&(0x7f0000000200)="2790f227ba0ad18a9d1b6980bda8394d6176230a66c5b5dd2709e87a8f7156a3921492caf05b211fbb7bae4d33d922681a4b8bf97511bfc640756c308029f20f7387d4fe331edd3feced1e1826b014739d58b431ae11083d8542fd1a58ac87c45e2160448d99e07ff54b42846ef26cd900e039c44e16fc65c8c44dbc2e0b29a2c688b8bc9ede2546620c4f17dfe8983b5196831bf0b5c3b681334e972a9c4a21052d2bf4e4b256a0d15d6013a4db6acf8e5f292bd82280ea71868ca2cf0328eab7571e6b8190199aff2041cc493ed406b153ff49c4d3591186e73b3b60348b81af58b39b23757bbb8eaead42957a2e7ef3e578feec47", 0xf6, 0x2f28}, {&(0x7f0000000300)="7eb86b5dd19ff19b2502bc70fcd08cc34295a6d5a241455643d1148d4dcb72fc63fb1e5f9574b2069551f71394ae24080d1f84ff02eba7bc1014fdd3ca0c12a5a95c9514e51b71480335416ae89f37b0b8791882188d85f61c7fe1a417e02dda0b0107b41e201e3277fbb47519e15830907fb3f36fbfaa574bf7478fe2", 0x7d}, {&(0x7f00000007c0)="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", 0x1000, 0xfffffffffffffffa}, {&(0x7f0000000380)="61267a0d83ee487de1e543bd23c2af204a601da9c2d46aedd211438a0d752750ac363927911a758b2222bf365027df62737a8d2a1a53d60f7565d5fbc447d23989647bb2", 0x44, 0xff}], 0x2000000, &(0x7f0000001ac0)={[{@uid={'uid', 0x3d, r3}}, {@gid={'gid', 0x3d, r4}}, {@part={'part', 0x3d, 0x7}}, {@umask={'umask', 0x3d, 0xfffffffffffffffa}}, {@part={'part', 0x3d, 0x200}}], [{@appraise_type='appraise_type=imasig'}, {@uid_lt={'uid<', r5}}, {@fowner_eq={'fowner', 0x3d, r6}}, {@fowner_lt={'fowner<', r7}}, {@appraise='appraise'}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_gt={'euid>', r8}}, {@seclabel='seclabel'}, {@appraise='appraise'}]}) preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) [ 1672.017846][T14936] should_fail.cold+0xa/0x14 [ 1672.022435][T14936] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1672.028237][T14936] ? lock_downgrade+0x910/0x910 [ 1672.033091][T14936] ? kasan_check_read+0x11/0x20 [ 1672.037933][T14936] ? rcu_read_unlock+0x16/0x60 [ 1672.042689][T14936] ? find_held_lock+0x35/0x120 [ 1672.047437][T14936] ? rcu_read_unlock+0x16/0x60 [ 1672.052207][T14936] should_fail_alloc_page+0x50/0x60 [ 1672.057391][T14936] __alloc_pages_nodemask+0x323/0xdc0 [ 1672.062749][T14936] ? lock_downgrade+0x910/0x910 [ 1672.067576][T14936] ? kasan_check_read+0x11/0x20 [ 1672.072399][T14936] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1672.078350][T14936] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1672.084044][T14936] ? ___might_sleep+0x1e7/0x310 [ 1672.088869][T14936] ? trace_hardirqs_off+0xb8/0x310 [ 1672.093962][T14936] cache_grow_begin+0x9c/0x8c0 [ 1672.098696][T14936] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1672.104906][T14936] kmem_cache_alloc+0x645/0x710 [ 1672.109753][T14936] alloc_buffer_head+0x7f/0x1b0 [ 1672.114578][T14936] ? recalc_bh_state+0x1a0/0x1a0 [ 1672.119490][T14936] alloc_page_buffers+0x1d5/0x6c0 [ 1672.124501][T14936] ? free_buffer_head+0x190/0x190 [ 1672.129497][T14936] ? __lock_acquire+0x572/0x4a10 [ 1672.134404][T14936] ? mark_held_locks+0x100/0x100 [ 1672.139312][T14936] create_empty_buffers+0xc3/0xd80 [ 1672.144399][T14936] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1672.150352][T14936] ? attach_nobh_buffers+0xa70/0xa70 [ 1672.155606][T14936] ? mark_held_locks+0x100/0x100 [ 1672.160514][T14936] ? print_usage_bug+0xd0/0xd0 [ 1672.165253][T14936] ? print_usage_bug+0xd0/0xd0 [ 1672.170001][T14936] ? __lock_acquire+0x572/0x4a10 [ 1672.174936][T14936] ? add_lock_to_list.isra.0+0x450/0x450 [ 1672.180560][T14936] create_page_buffers+0x3ae/0x610 [ 1672.185643][T14936] ? create_empty_buffers+0xd80/0xd80 [ 1672.190986][T14936] ? find_held_lock+0x35/0x120 [ 1672.195737][T14936] ? ktime_get_coarse_real_ts64+0x15a/0x3b0 [ 1672.201599][T14936] ? ktime_get_coarse_real_ts64+0x15a/0x3b0 [ 1672.207473][T14936] __block_write_begin_int+0x340/0x2010 [ 1672.212993][T14936] ? add_lock_to_list.isra.0+0x450/0x450 [ 1672.218599][T14936] ? balance_dirty_pages_ratelimited+0x6d2/0x2380 [ 1672.225061][T14936] ? ext4_inode_attach_jinode.part.0+0x150/0x150 [ 1672.231378][T14936] ? __breadahead+0x160/0x160 [ 1672.236026][T14936] ? ___might_sleep+0x1e7/0x310 [ 1672.240849][T14936] ? arch_local_save_flags+0x50/0x50 [ 1672.246109][T14936] ? lock_release+0xc40/0xc40 [ 1672.250761][T14936] ? __might_sleep+0x95/0x190 [ 1672.255407][T14936] block_page_mkwrite+0x2f0/0x410 [ 1672.260401][T14936] ? ext4_inode_attach_jinode.part.0+0x150/0x150 [ 1672.266697][T14936] ? cont_write_begin+0xa00/0xa00 [ 1672.271697][T14936] ? __down_interruptible+0x740/0x740 [ 1672.277050][T14936] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 1672.282478][T14936] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1672.288698][T14936] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1672.294388][T14936] ext4_page_mkwrite+0x10b2/0x1530 [ 1672.299485][T14936] ? ext4_change_inode_journal_flag+0x3d0/0x3d0 [ 1672.305698][T14936] ? do_wp_page+0xa58/0x16b0 [ 1672.310268][T14936] do_page_mkwrite+0x152/0x740 [ 1672.315004][T14936] ? print_bad_pte+0x6e0/0x6e0 [ 1672.319737][T14936] ? do_raw_spin_unlock+0xa0/0x330 [ 1672.324834][T14936] ? do_raw_spin_trylock+0x270/0x270 [ 1672.330091][T14936] ? __lock_acquire+0x572/0x4a10 [ 1672.335010][T14936] do_wp_page+0xa60/0x16b0 [ 1672.339396][T14936] ? lock_acquire+0x1db/0x570 [ 1672.344060][T14936] ? finish_mkwrite_fault+0x540/0x540 [ 1672.349399][T14936] ? kasan_check_write+0x14/0x20 [ 1672.354324][T14936] ? do_raw_spin_lock+0x156/0x360 [ 1672.359323][T14936] ? lock_release+0xc40/0xc40 [ 1672.363976][T14936] ? rwlock_bug.part.0+0x90/0x90 [ 1672.368897][T14936] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 1672.374677][T14936] ? add_mm_counter_fast.part.0+0x40/0x40 [ 1672.380403][T14936] __handle_mm_fault+0x2c8e/0x55a0 [ 1672.385487][T14936] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1672.391004][T14936] ? check_preemption_disabled+0x48/0x290 [ 1672.396695][T14936] ? handle_mm_fault+0x3cc/0xc80 [ 1672.401635][T14936] ? lock_downgrade+0x910/0x910 [ 1672.406456][T14936] ? kasan_check_read+0x11/0x20 [ 1672.411281][T14936] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1672.417231][T14936] ? rcu_read_unlock_special+0x380/0x380 [ 1672.422835][T14936] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1672.429046][T14936] ? check_preemption_disabled+0x48/0x290 [ 1672.434735][T14936] handle_mm_fault+0x4ec/0xc80 [ 1672.439482][T14936] ? __handle_mm_fault+0x55a0/0x55a0 [ 1672.444766][T14936] __do_page_fault+0x5da/0xd60 [ 1672.449501][T14936] ? print_usage_bug+0xd0/0xd0 [ 1672.454255][T14936] do_page_fault+0xe6/0x7d8 [ 1672.458726][T14936] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1672.464343][T14936] ? vmalloc_sync_all+0x30/0x30 [ 1672.469170][T14936] ? mark_page_accessed+0xbef/0x1ee0 [ 1672.474425][T14936] ? __might_fault+0x12b/0x1e0 [ 1672.479164][T14936] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1672.484680][T14936] page_fault+0x1e/0x30 [ 1672.488808][T14936] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 1672.495375][T14936] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 1672.514960][T14936] RSP: 0018:ffff88805aeef470 EFLAGS: 00010206 [ 1672.520992][T14936] RAX: 0000000000000000 RBX: 0000000000001000 RCX: 0000000000001000 [ 1672.528931][T14936] RDX: 0000000000001000 RSI: ffff8882154cd000 RDI: 0000000020011000 [ 1672.536873][T14936] RBP: ffff88805aeef4a8 R08: ffffed1042a99c00 R09: 0000000000000000 [ 1672.544840][T14936] R10: ffffed1042a99bff R11: ffff8882154cdfff R12: 0000000020011000 [ 1672.552781][T14936] R13: ffff8882154cd000 R14: 0000000020012000 R15: 00007ffffffff000 [ 1672.560760][T14936] ? copyout+0xe2/0x100 [ 1672.564892][T14936] copy_page_to_iter+0x433/0x1000 [ 1672.569903][T14936] ? iov_iter_fault_in_readable+0x450/0x450 [ 1672.575793][T14936] ? ___might_sleep+0x1e7/0x310 [ 1672.580626][T14936] ? arch_local_save_flags+0x50/0x50 [ 1672.585889][T14936] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1672.592103][T14936] generic_file_read_iter+0xbb1/0x2d40 [ 1672.597539][T14936] ? filemap_write_and_wait_range+0xd0/0xd0 [ 1672.603434][T14936] ? find_held_lock+0x35/0x120 [ 1672.608200][T14936] ? aa_file_perm+0x42e/0x1090 [ 1672.612946][T14936] ? lock_downgrade+0x910/0x910 [ 1672.617781][T14936] ? kasan_check_read+0x11/0x20 [ 1672.622604][T14936] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1672.628571][T14936] ? rcu_read_unlock_special+0x380/0x380 [ 1672.634179][T14936] ? aa_file_perm+0x455/0x1090 [ 1672.638915][T14936] ? add_lock_to_list.isra.0+0x450/0x450 [ 1672.644519][T14936] ? aa_path_link+0x5d0/0x5d0 [ 1672.649194][T14936] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1672.655415][T14936] ? should_fail+0x250/0xd13 [ 1672.660071][T14936] ? __might_fault+0x12b/0x1e0 [ 1672.664821][T14936] ? find_held_lock+0x35/0x120 [ 1672.669567][T14936] ? __might_fault+0x12b/0x1e0 [ 1672.674304][T14936] ? lock_acquire+0x1db/0x570 [ 1672.678956][T14936] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1672.685200][T14936] ? fsnotify+0x4f5/0xed0 [ 1672.689525][T14936] ext4_file_read_iter+0x180/0x3c0 [ 1672.694628][T14936] ? fsnotify_first_mark+0x350/0x350 [ 1672.699937][T14936] do_iter_readv_writev+0x799/0xbc0 [ 1672.705108][T14936] ? vfs_dedupe_file_range+0x780/0x780 [ 1672.710540][T14936] ? rw_verify_area+0x118/0x360 [ 1672.715369][T14936] do_iter_read+0x27c/0x660 [ 1672.719845][T14936] ? dup_iter+0x260/0x260 [ 1672.724147][T14936] vfs_readv+0x175/0x1c0 [ 1672.728363][T14936] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 1672.734411][T14936] ? kasan_check_write+0x14/0x20 [ 1672.739338][T14936] ? __mutex_unlock_slowpath+0x195/0x870 [ 1672.744945][T14936] ? __fget_light+0x2db/0x420 [ 1672.749593][T14936] ? fget_raw+0x20/0x20 [ 1672.753726][T14936] ? check_preemption_disabled+0x48/0x290 [ 1672.759438][T14936] ? __sb_end_write+0xd9/0x110 [ 1672.764175][T14936] do_preadv+0x1c4/0x280 [ 1672.768388][T14936] ? do_readv+0x300/0x300 [ 1672.772686][T14936] ? __ia32_sys_read+0xb0/0xb0 [ 1672.777423][T14936] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1672.783458][T14936] ? trace_hardirqs_off_caller+0x300/0x300 [ 1672.789250][T14936] __x64_sys_preadv+0x9a/0xf0 [ 1672.793917][T14936] do_syscall_64+0x1a3/0x800 [ 1672.798481][T14936] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1672.804082][T14936] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1672.809776][T14936] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1672.815294][T14936] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1672.821167][T14936] RIP: 0033:0x457ec9 [ 1672.825068][T14936] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1672.844661][T14936] RSP: 002b:00007fd9b355fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1672.853056][T14936] RAX: ffffffffffffffda RBX: 00007fd9b355fc90 RCX: 0000000000457ec9 [ 1672.860998][T14936] RDX: 1000000000000212 RSI: 00000000200075c0 RDI: 0000000000000007 [ 1672.868938][T14936] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1672.876896][T14936] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd9b35606d4 [ 1672.884836][T14936] R13: 00000000004c4861 R14: 00000000004d7d20 R15: 0000000000000008 03:47:05 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {0x0}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:47:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:05 executing program 1 (fault-call:7 fault-nth:2): open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed1020000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:05 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {0x0}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) [ 1673.325366][T14961] hfs: unable to parse mount options [ 1673.398780][T14972] FAULT_INJECTION: forcing a failure. [ 1673.398780][T14972] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1673.411980][T14972] CPU: 0 PID: 14972 Comm: syz-executor1 Not tainted 4.20.0-next-20190107 #6 [ 1673.420637][T14972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1673.430694][T14972] Call Trace: [ 1673.433977][T14972] dump_stack+0x1db/0x2d0 [ 1673.438331][T14972] ? dump_stack_print_info.cold+0x20/0x20 [ 1673.444045][T14972] ? print_usage_bug+0xd0/0xd0 03:47:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1673.448789][T14972] ? __lock_acquire+0x572/0x4a10 [ 1673.453704][T14972] should_fail.cold+0xa/0x14 [ 1673.458282][T14972] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1673.464074][T14972] ? lock_downgrade+0x910/0x910 [ 1673.468898][T14972] ? kasan_check_read+0x11/0x20 [ 1673.473723][T14972] ? rcu_read_unlock+0x16/0x60 [ 1673.478467][T14972] ? find_held_lock+0x35/0x120 [ 1673.483242][T14972] ? rcu_read_unlock+0x16/0x60 [ 1673.488004][T14972] should_fail_alloc_page+0x50/0x60 [ 1673.493191][T14972] __alloc_pages_nodemask+0x323/0xdc0 [ 1673.498547][T14972] ? lock_downgrade+0x910/0x910 [ 1673.503376][T14972] ? kasan_check_read+0x11/0x20 [ 1673.508211][T14972] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1673.514171][T14972] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1673.519910][T14972] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1673.526061][T14972] ? ___might_sleep+0x1e7/0x310 [ 1673.530908][T14972] ? trace_hardirqs_off+0xb8/0x310 [ 1673.536001][T14972] cache_grow_begin+0x9c/0x8c0 [ 1673.540753][T14972] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1673.546990][T14972] kmem_cache_alloc+0x645/0x710 [ 1673.551831][T14972] alloc_buffer_head+0x7f/0x1b0 [ 1673.556666][T14972] ? recalc_bh_state+0x1a0/0x1a0 [ 1673.561588][T14972] alloc_page_buffers+0x1d5/0x6c0 [ 1673.566597][T14972] ? free_buffer_head+0x190/0x190 [ 1673.571603][T14972] ? __lock_acquire+0x572/0x4a10 [ 1673.576522][T14972] ? mark_held_locks+0x100/0x100 [ 1673.581441][T14972] create_empty_buffers+0xc3/0xd80 [ 1673.586533][T14972] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1673.592504][T14972] ? attach_nobh_buffers+0xa70/0xa70 [ 1673.597769][T14972] ? mark_held_locks+0x100/0x100 [ 1673.602687][T14972] ? print_usage_bug+0xd0/0xd0 [ 1673.607447][T14972] ? print_usage_bug+0xd0/0xd0 [ 1673.612193][T14972] ? __lock_acquire+0x572/0x4a10 [ 1673.617108][T14972] ? print_usage_bug+0xd0/0xd0 [ 1673.621855][T14972] ? add_lock_to_list.isra.0+0x450/0x450 [ 1673.627476][T14972] create_page_buffers+0x3ae/0x610 [ 1673.632576][T14972] ? create_empty_buffers+0xd80/0xd80 [ 1673.637924][T14972] ? find_held_lock+0x35/0x120 [ 1673.642672][T14972] ? ktime_get_coarse_real_ts64+0x15a/0x3b0 [ 1673.648544][T14972] ? ktime_get_coarse_real_ts64+0x15a/0x3b0 [ 1673.654436][T14972] __block_write_begin_int+0x340/0x2010 [ 1673.659966][T14972] ? add_lock_to_list.isra.0+0x450/0x450 [ 1673.665597][T14972] ? ext4_inode_attach_jinode.part.0+0x150/0x150 [ 1673.671927][T14972] ? __breadahead+0x160/0x160 [ 1673.676598][T14972] ? ___might_sleep+0x1e7/0x310 [ 1673.681456][T14972] ? arch_local_save_flags+0x50/0x50 [ 1673.686748][T14972] ? lock_release+0xc40/0xc40 [ 1673.691409][T14972] ? __might_sleep+0x95/0x190 [ 1673.696062][T14972] block_page_mkwrite+0x2f0/0x410 [ 1673.701056][T14972] ? ext4_inode_attach_jinode.part.0+0x150/0x150 [ 1673.707368][T14972] ? cont_write_begin+0xa00/0xa00 [ 1673.712377][T14972] ? __down_interruptible+0x740/0x740 [ 1673.717726][T14972] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 1673.723165][T14972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1673.729381][T14972] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1673.735084][T14972] ext4_page_mkwrite+0x10b2/0x1530 [ 1673.740182][T14972] ? ext4_change_inode_journal_flag+0x3d0/0x3d0 [ 1673.746426][T14972] ? do_wp_page+0xa58/0x16b0 [ 1673.750998][T14972] do_page_mkwrite+0x152/0x740 [ 1673.755742][T14972] ? print_bad_pte+0x6e0/0x6e0 [ 1673.760491][T14972] ? do_raw_spin_unlock+0xa0/0x330 [ 1673.765591][T14972] ? do_raw_spin_trylock+0x270/0x270 [ 1673.770867][T14972] ? __lock_acquire+0x572/0x4a10 [ 1673.775790][T14972] do_wp_page+0xa60/0x16b0 [ 1673.780182][T14972] ? lock_acquire+0x1db/0x570 [ 1673.784843][T14972] ? finish_mkwrite_fault+0x540/0x540 [ 1673.790186][T14972] ? kasan_check_write+0x14/0x20 [ 1673.795101][T14972] ? do_raw_spin_lock+0x156/0x360 [ 1673.800111][T14972] ? lock_release+0xc40/0xc40 [ 1673.804769][T14972] ? rwlock_bug.part.0+0x90/0x90 [ 1673.809708][T14972] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 1673.815509][T14972] ? add_mm_counter_fast.part.0+0x40/0x40 [ 1673.821219][T14972] __handle_mm_fault+0x2c8e/0x55a0 [ 1673.826318][T14972] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1673.831856][T14972] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1673.838014][T14972] ? handle_mm_fault+0x3cc/0xc80 [ 1673.842940][T14972] ? retint_kernel+0x2d/0x2d [ 1673.847503][T14972] ? handle_mm_fault+0x46d/0xc80 [ 1673.852422][T14972] handle_mm_fault+0x4ec/0xc80 [ 1673.857200][T14972] ? __handle_mm_fault+0x55a0/0x55a0 [ 1673.862464][T14972] __do_page_fault+0x5da/0xd60 [ 1673.867236][T14972] do_page_fault+0xe6/0x7d8 [ 1673.871732][T14972] ? vmalloc_sync_all+0x30/0x30 [ 1673.876569][T14972] ? retint_kernel+0x2d/0x2d [ 1673.881146][T14972] ? __might_fault+0x12b/0x1e0 [ 1673.885892][T14972] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1673.891420][T14972] page_fault+0x1e/0x30 [ 1673.895567][T14972] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 1673.902142][T14972] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 1673.921728][T14972] RSP: 0018:ffff888089e1f470 EFLAGS: 00010206 [ 1673.927762][T14972] RAX: 0000000000000000 RBX: 0000000000001000 RCX: 0000000000001000 [ 1673.935718][T14972] RDX: 0000000000001000 RSI: ffff8882147bf000 RDI: 0000000020024000 [ 1673.943659][T14972] RBP: ffff888089e1f4a8 R08: ffffed10428f8000 R09: 0000000000000000 [ 1673.951623][T14972] R10: ffffed10428f7fff R11: ffff8882147bffff R12: 0000000020024000 [ 1673.959585][T14972] R13: ffff8882147bf000 R14: 0000000020025000 R15: 00007ffffffff000 [ 1673.967583][T14972] ? copyout+0xe2/0x100 [ 1673.971748][T14972] copy_page_to_iter+0x433/0x1000 [ 1673.976761][T14972] ? iov_iter_fault_in_readable+0x450/0x450 [ 1673.982633][T14972] ? ___might_sleep+0x1e7/0x310 [ 1673.987465][T14972] ? arch_local_save_flags+0x50/0x50 [ 1673.992754][T14972] generic_file_read_iter+0xbb1/0x2d40 [ 1673.998212][T14972] ? filemap_write_and_wait_range+0xd0/0xd0 [ 1674.004085][T14972] ? find_held_lock+0x35/0x120 [ 1674.008830][T14972] ? aa_file_perm+0x42e/0x1090 [ 1674.013579][T14972] ? lock_downgrade+0x910/0x910 [ 1674.018420][T14972] ? kasan_check_read+0x11/0x20 [ 1674.023251][T14972] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1674.029215][T14972] ? rcu_read_unlock_special+0x380/0x380 [ 1674.034833][T14972] ? aa_file_perm+0x455/0x1090 [ 1674.039584][T14972] ? add_lock_to_list.isra.0+0x450/0x450 [ 1674.045201][T14972] ? aa_path_link+0x5d0/0x5d0 [ 1674.049859][T14972] ? retint_kernel+0x2d/0x2d [ 1674.054428][T14972] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1674.060038][T14972] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1674.065651][T14972] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1674.071090][T14972] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1674.077234][T14972] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1674.083372][T14972] ? lock_acquire+0x1db/0x570 [ 1674.088034][T14972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1674.094270][T14972] ? fsnotify+0x4f5/0xed0 [ 1674.098584][T14972] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1674.104051][T14972] ext4_file_read_iter+0x180/0x3c0 [ 1674.109161][T14972] ? fsnotify_first_mark+0x350/0x350 [ 1674.114434][T14972] do_iter_readv_writev+0x799/0xbc0 [ 1674.119622][T14972] ? vfs_dedupe_file_range+0x780/0x780 [ 1674.125070][T14972] ? rw_verify_area+0x118/0x360 [ 1674.129918][T14972] do_iter_read+0x27c/0x660 [ 1674.134411][T14972] ? dup_iter+0x260/0x260 [ 1674.138731][T14972] vfs_readv+0x175/0x1c0 [ 1674.142959][T14972] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 1674.149009][T14972] ? kasan_check_write+0x14/0x20 [ 1674.153947][T14972] ? __mutex_unlock_slowpath+0x195/0x870 [ 1674.159573][T14972] ? __fget_light+0x2db/0x420 [ 1674.164234][T14972] ? fget_raw+0x20/0x20 [ 1674.168373][T14972] ? check_preemption_disabled+0x48/0x290 [ 1674.174080][T14972] ? __sb_end_write+0xd9/0x110 [ 1674.178842][T14972] do_preadv+0x1c4/0x280 [ 1674.183073][T14972] ? do_readv+0x300/0x300 [ 1674.187385][T14972] ? __ia32_sys_read+0xb0/0xb0 [ 1674.192137][T14972] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1674.198185][T14972] ? trace_hardirqs_off_caller+0x300/0x300 [ 1674.203978][T14972] __x64_sys_preadv+0x9a/0xf0 [ 1674.208642][T14972] do_syscall_64+0x1a3/0x800 [ 1674.213220][T14972] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1674.218839][T14972] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1674.224568][T14972] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1674.230101][T14972] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1674.235973][T14972] RIP: 0033:0x457ec9 [ 1674.239849][T14972] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1674.259432][T14972] RSP: 002b:00007fd9b355fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1674.267829][T14972] RAX: ffffffffffffffda RBX: 00007fd9b355fc90 RCX: 0000000000457ec9 [ 1674.275784][T14972] RDX: 1000000000000212 RSI: 00000000200075c0 RDI: 0000000000000007 [ 1674.283734][T14972] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1674.291688][T14972] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd9b35606d4 [ 1674.299638][T14972] R13: 00000000004c4861 R14: 00000000004d7d20 R15: 0000000000000008 03:47:06 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = syz_open_procfs(r1, &(0x7f00000002c0)='sessionid\x00') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0023000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:07 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {0x0}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:47:07 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:07 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_RESERVED(r0, 0x5601, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f0000000000), 0x1000000000000217, 0x0) 03:47:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed003f000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:07 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:47:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:07 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x2}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:07 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0xb613) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() r3 = syz_open_procfs(r2, &(0x7f0000000600)='net/ip_vs_stats\x00') preadv(r3, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0040000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:07 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:47:07 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) ioctl$RTC_WIE_ON(r0, 0x700f) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f00000000c0)) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0edc0ed000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:08 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x5, 0x0) 03:47:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:08 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{0x0}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:47:08 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f00000000c0)={0x2, 0x100, 0x6, {0x815b092, 0x4, 0x3c9, 0xd730}}) preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:08 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x3}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0fff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:08 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{0x0}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) 03:47:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:08 executing program 4: r0 = getgid() r1 = getegid() setregid(r0, r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffa, 0x4002011, r2, 0xfffffffffffffffa) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000140)={0xa, 0x3}) memfd_create(&(0x7f00000001c0)='vmnet0\x00', 0x6) ioctl$VIDIOC_TRY_DECODER_CMD(r2, 0xc0485661, &(0x7f00000000c0)={0x3, 0x3, @stop_pts=0x28d}) preadv(r4, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) bind$pptp(r4, &(0x7f0000000180)={0x18, 0x2, {0x3, @remote}}, 0x1e) 03:47:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:08 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{0x0}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x6, 0x0) [ 1676.717994][T15180] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop0 new:/dev/loop2 03:47:09 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x4}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:09 executing program 3 (fault-call:7 fault-nth:0): open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:09 executing program 4: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x20) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0x1, 0x2) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f0000000640)=[{&(0x7f00000001c0)=""/247, 0x28852d330ccd8b30}, {&(0x7f00000027c0)=""/137, 0x89}, {&(0x7f0000000380)=""/125, 0xfffffffffffffc6b}, {&(0x7f00000006c0)=""/145, 0x91}, {&(0x7f00000017c0)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/125, 0x70}], 0x6, 0x0) 03:47:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000100000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1677.173078][T15215] FAULT_INJECTION: forcing a failure. [ 1677.173078][T15215] name failslab, interval 1, probability 0, space 0, times 0 [ 1677.220679][T15215] CPU: 1 PID: 15215 Comm: syz-executor3 Not tainted 4.20.0-next-20190107 #6 [ 1677.229357][T15215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1677.239398][T15215] Call Trace: [ 1677.242686][T15215] dump_stack+0x1db/0x2d0 [ 1677.247010][T15215] ? dump_stack_print_info.cold+0x20/0x20 [ 1677.252734][T15215] should_fail.cold+0xa/0x14 [ 1677.257318][T15215] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1677.263131][T15215] ? ___might_sleep+0x1e7/0x310 03:47:09 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x5}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) [ 1677.267998][T15215] ? arch_local_save_flags+0x50/0x50 [ 1677.273271][T15215] ? add_lock_to_list.isra.0+0x450/0x450 [ 1677.278895][T15215] ? retint_kernel+0x2d/0x2d [ 1677.283480][T15215] __should_failslab+0x121/0x190 [ 1677.288409][T15215] should_failslab+0x9/0x14 [ 1677.292910][T15215] __kmalloc+0x2dc/0x740 [ 1677.297124][T15215] ? __fget+0x473/0x710 [ 1677.301268][T15215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1677.307498][T15215] ? rw_copy_check_uvector+0x28c/0x330 [ 1677.312943][T15215] rw_copy_check_uvector+0x28c/0x330 [ 1677.318232][T15215] ? rcu_read_unlock_special+0x380/0x380 [ 1677.323870][T15215] import_iovec+0xc1/0x2a0 [ 1677.328257][T15215] ? dup_iter+0x260/0x260 [ 1677.332585][T15215] vfs_readv+0xf5/0x1c0 [ 1677.336730][T15215] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 1677.342772][T15215] ? __fget_light+0x2db/0x420 [ 1677.347419][T15215] ? fget_raw+0x20/0x20 [ 1677.351549][T15215] ? fput+0x20/0x1a0 [ 1677.355428][T15215] do_preadv+0x1c4/0x280 [ 1677.359651][T15215] ? do_readv+0x300/0x300 [ 1677.363975][T15215] ? __ia32_sys_read+0xb0/0xb0 [ 1677.368718][T15215] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1677.374765][T15215] ? trace_hardirqs_off_caller+0x300/0x300 [ 1677.380542][T15215] __x64_sys_preadv+0x9a/0xf0 [ 1677.385212][T15215] do_syscall_64+0x1a3/0x800 [ 1677.389784][T15215] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1677.395409][T15215] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1677.401120][T15215] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1677.406645][T15215] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1677.412516][T15215] RIP: 0033:0x457ec9 [ 1677.416405][T15215] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1677.435991][T15215] RSP: 002b:00007f2799d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1677.444372][T15215] RAX: ffffffffffffffda RBX: 00007f2799d6ac90 RCX: 0000000000457ec9 [ 1677.452334][T15215] RDX: 1000000000000212 RSI: 00000000200075c0 RDI: 0000000000000006 [ 1677.460281][T15215] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1677.468242][T15215] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2799d6b6d4 [ 1677.476190][T15215] R13: 00000000004c4861 R14: 00000000004d7d20 R15: 0000000000000007 03:47:09 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) ioctl$KVM_ASSIGN_SET_MSIX_NR(r2, 0x4008ae73, &(0x7f0000000100)={0x5, 0x9}) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x480, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f00000002c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000200), r4, r3}}, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f00000003c0)=0xc) r6 = syz_open_procfs(r5, &(0x7f0000000540)='\x81\xba_\xacm\x86&\xc6\x80') preadv(r6, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x29, 0x1, &(0x7f00000001c0), 0x4) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000300)=""/54) 03:47:10 executing program 3 (fault-call:7 fault-nth:1): open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000100000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:10 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0)={0x7ff, 0x4, 0x3ff, 0x101, 0x80000001}, 0x14) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) [ 1677.935504][T15236] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop0 03:47:10 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:10 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x6}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:10 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000200000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x170f0000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:11 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x14103e, 0x40) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)) r2 = getpgid(0x0) r3 = syz_open_procfs(r2, &(0x7f00000002c0)='mountinfo\x00') openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x450502, 0x0) preadv(r3, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffffffffffea1}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192, 0x2e3}], 0x1000000000000212, 0x0) 03:47:11 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x2}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000300000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x170f0000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:11 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x8}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:11 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) mknod(&(0x7f00000000c0)='./bus\x00', 0x800, 0x6) r1 = open(&(0x7f0000000080)='.\x00', 0x545000, 0x40003) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f00000001c0)={&(0x7f0000000180)=[0x800, 0x7fffffff, 0xa1c5, 0x4, 0x9, 0x6, 0x5, 0x5], 0x8, 0x7, 0x5, 0x3, 0x5be, 0x1, {0xffffffffffffffc0, 0x6, 0x0, 0x4, 0x4, 0x0, 0x9, 0x6, 0x100, 0x8001, 0x1000, 0x6, 0x9, 0xffc7, "7ef2cab2c22296f191d259fb65e63ac6510951a639df7a8cf4326bc007d5f50b"}}) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r3, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r2, 0xc0285628, &(0x7f0000000280)={0x0, 0x0, 0x6, [], &(0x7f0000000240)=0x9}) 03:47:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1f000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:11 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x6}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1f000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000500000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:11 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x9}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:11 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ftruncate(r0, 0x208200) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f00000000c0)=""/87) r5 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r5, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r6, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:12 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x8}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) [ 1679.699774][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000600000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20100000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20100000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:12 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:12 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xa}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) [ 1680.211674][T15415] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop2 03:47:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x23000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000700000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x23000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:12 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x10}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000900000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:13 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x8000, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000002c0)={0x7, 0x4d, 0x1}, 0x7) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/221) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000000c0)={0x0, 0x8200, 0x1f, 0x1000, 0x0}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000240)={0x6, 0x8004, 0x5, 0xfffffffffffffffc, r3}, 0x10) ioctl$TIOCNXCL(r0, 0x540d) 03:47:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1680.815475][ T26] audit: type=1804 audit(2000000833.165:231): pid=15475 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir020043097/syzkaller.WnHYjh/64/bus" dev="sda1" ino=17840 res=1 03:47:13 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xb}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000002000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:13 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x162}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1681.024080][ T26] audit: type=1804 audit(2000000833.373:232): pid=15475 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir020043097/syzkaller.WnHYjh/64/bus" dev="sda1" ino=17840 res=1 03:47:13 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r2 = fcntl$getown(r1, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f00000000c0)={{0x6, 0x5, 0xfffffffffffffff7, 0x5, '\x00', 0xffffffffffff4d18}, 0x6, 0x0, 0x2, r2, 0x8, 0x101, 'syz1\x00', &(0x7f00000007c0)=['#GPL\x00', '/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b', 'keyring}bdev\x00', '\x00', '/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b', '/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b', 'losecuritynodev!\x00', '/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b'], 0x3d8, [], [0xff, 0x100000001, 0x3, 0x28]}) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x400201f, r0, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r3, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) [ 1681.089392][ T26] audit: type=1804 audit(2000000833.373:233): pid=15483 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir020043097/syzkaller.WnHYjh/64/bus" dev="sda1" ino=17840 res=1 03:47:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1681.217869][ T26] audit: type=1804 audit(2000000833.373:234): pid=15475 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir020043097/syzkaller.WnHYjh/64/bus" dev="sda1" ino=17840 res=1 [ 1681.305974][T15510] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop0 new:/dev/loop5 03:47:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000102000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:13 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f00000000c0)=0x6, 0x4) preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:13 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x2a0}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x48000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x48000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:14 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:14 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xc}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000002300000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:14 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x5d8}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:14 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r1, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}, {&(0x7f00000000c0)=""/247, 0xf7}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/204, 0xcc}, {&(0x7f0000007500)=""/192, 0xc0}], 0x2f1, 0x0) 03:47:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000003f00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x68000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:15 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x600}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:15 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) mprotect(&(0x7f000046d000/0x1000)=nil, 0x1000, 0x1000009) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000240)={0x5, {0x5, 0xffff, 0xfffffffffffffe01, 0x101, 0x4, 0x35}}) r1 = gettid() ftruncate(r0, 0x8) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') prctl$PR_GET_CHILD_SUBREAPER(0x25) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=0x0, &(0x7f0000000100)=0x4) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000140)={r5, 0x7fffffff, 0xafe}, 0x8) fstat(r0, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000006c0)='./bus\x00', &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000740), &(0x7f0000000dc0)=0x0, &(0x7f0000000e00)) lstat(&(0x7f00000035c0)='./bus\x00', &(0x7f0000003600)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000003680)='./bus/file0\x00', &(0x7f00000036c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000003740)='./bus\x00', &(0x7f0000003780)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$midi(&(0x7f0000005100)='/dev/midi#\x00', 0x880000000000, 0x200) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000003800)={0x0, 0x0, 0x0}, &(0x7f0000003840)=0xc) sendmmsg$unix(r0, &(0x7f0000005140)=[{&(0x7f00000002c0)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000340)="2dc19569f9dc98fc3bea0765b8a971b1571405b88fdabca28a6b88f3585c49e90d06850a8f60033c1b9fdfe436faf847544820", 0x33}, {&(0x7f0000000500)="dfe2fe1d4ceb183023bb3ef5e95e4010672c465921ced53b056be5b8095eda73d766717a346c49e9834a4dcacba1da52ff37830babf8d13249ca179594ee47cea94364b640ff1b7ca5f39dc3648338180d553150e3f1aba6e2318eecbf91aae10789783d0321b71f17db14f11acd952fa6b83be57303da5417ce16e42ec8d30feff08264f9306ac652b1acaac40145b6dd6e6a9f91f5f9b1ed20a622ec6b2e5f307505db670f73b14c79d1257ec9cb68fedbd0d53641e22bf45a84a7d42bda9db64c3621d6a17be4ac73543d07bca2b21799bd99a28c5fd6ede8a6", 0xdb}, {&(0x7f0000000600)="4ffe4c088760570973b29af039bea782f6532348766a5c1b058297afbb7add2dc8d3ebf1393ab43dc9952e209443fe10d8edf8f5bf232dc83edfa8636cf9ba442c388a90ba8ebff1dbf3b7cab65038dd5efc16292e9ebd2ec6a492cf776b59ae6e4b7af840f43e3d031ccbf9c19153e48947b8aa10ca063d38136e0d56dd21d14f1732e4d1e71898c21a20391216", 0x8e}, {&(0x7f0000000380)="1e5c44ee0a22517a7779bde7", 0xc}], 0x4, &(0x7f0000000e40)=[@cred={0x20, 0x1, 0x2, r1, r6, r7}, @cred={0x20, 0x1, 0x2, r1, r8, r9}], 0x40, 0x20000000}, {&(0x7f0000000e80)=@file={0x1, './bus\x00'}, 0x6e, &(0x7f0000003500)=[{&(0x7f0000000f00)="2d1dc2ecfa4aab0bf4d37a6be23b10574609ba07ab77501d58db7ad01c033723677fcfabffcbc21231ca33cdd5aad2c6c982cad8b3c3fa7f97861123a8a92ada13d323e3796f5e7dd672bdbe261fb97286e8659a8ed458fe13d5240162b321c535c67ac2f4789a4da40edebb08c7b81b9f", 0x71}, {&(0x7f0000000f80)="92168a108da0d5fc75e90e718796971fd97437fb642041e15c7fc0692ab6c75db61f6e5bcead023f3c61e1b744783df3b5eed4c78506f11c75b628e485cebf22766b3bfdc2c788b3c8532e9ec22ca27b9d7193274dc39cbf735cd6a924f4de802963b37f4c979e3590bc5604f8e8d373df2cd45fbee2fcd5a0a88541ca1d9fd5e7a67db4075eefcc6e673baf4c4e2a8a1597d86d1a0c52a3af8de55e61b082bc1d6510fdbda07e3e6c27f1edc5b0a84bfca4283e3dfefe", 0xb7}, {&(0x7f0000001040)="6367996d5a37ba737c0f8c02f0b297a013d1a19a57001a96efeed91c2ee64e8246e12649f5fa84f4540bf02bb0c57ac8d2d10b43810727eeaa45e6ba8fe38fb2b26dcebc27d1cb672a353d", 0x4b}, {&(0x7f00000010c0)="3dfe1adb63150bf1d2989922bf481ab3293dbcfa63c1d04c5da20a661bf86340f2346cb85eeadaf525f4fe16bf3ba6bd84689a6c47ff07fde491e18b923c562afad4b23f0db36d7c513d0fcdcd3932e161379ea8970321e1b9a08e5f200f54f0a3fca48e5335bee4be6176228ca374bf06e0d489e8cacfeb0ca247f499d1f9d88aadc6e285", 0x85}, {&(0x7f0000001180)="26621ef772ef8668a70df2e4461cf3caebf31a8474459166aaaf6e7487a1d9caf3f6be0ad88eae027c63caa870559d297979317d4e530efb0a758c08c96b324a95579fc70d3da4c2bea0342616b8ab14846fe2e45c4e03e8bcbef373ffe936f0442f0049de6b9692008b1f18dac64a2c7e780b0221618aace6c6d61aed9d68269c8e7a5cff71aca23010c4e45e2deebeb5cc1730a9d16cc35c5417cfce86a44abcbc1fe0d9d9b7895faca7f3a0c38568c97df312ece43c0871a52ecf32c1c1fc75", 0xc1}, {&(0x7f0000001280)="9a70f75ff1b2ef52dfa26aff93dc4d9d6ea236a8ca70a9263e2f23fa56f09cf37f62f1b06f6365cf451a9274042cbd45cf8fe2b021e897180126bd85dae06acdfb8bee6e8eb3914bb045db9e2c625fe0bffaa24fbbd6acb510e998913c7f1a6848110404c3805893686522032da7750aa177c33fbfd268c29043c97d564dd9f05f4a28afa390b65625684019f1130ca725fc09122af94f81744042c0ab5dddfdf1aef1b275a21c552381a55355542dbdea5da903baf178e5c8831146d1a7b649011fc9c6f74a2e708747d52299199d065ff023434343e2667fb62e0854a4bbf14cd7b7bb46a2353e19c380293e11c7100c899e3152317db23621cbad5673c3dacc7bc7ccba2413fc8c59938c64a0b41c6567f5355e0c8e5268ea943c972cff0de5885660e6876a0ce70f7c819c6056b8ebe3a2e4e5dc1cc4b9200fb86903427d80754d6719bb55de170923a117bc6bfc0951b5e84341f29ffe1dc12cdb3c2f2d1af2dc04865a7e44b931cb5132cbde3b789c01a801670facc9274ae065a4ca02ae1536ca1f935c508c602fd51f9d4272c15923b35c69723c0e4d29677c0f0b7e96ab65b1201cde969d680b2eb3c6e2524282159c62e416a4f7fd4c994a145f054b985f25668599e83b65ad8abf0324049d101ad43b8352f7dbb9926a7a39e0aa4403b3e1e3776af81e2acab3783789173f4fc07479391635284fb3c5583f5aa67ba21c9ebd71495878804e49256276e43c5628ae92913e009af480301adefcb38d110a264523f1ec8056a94909af5ca8de524cb2b4fe5738928b59383dbc413091a26c01908ccfbd873e88d9355c152f61bd7ebe0d478b87a0d9069921f543066c00b1a79b3294d142691d550829d99dd0509aa7742f80bd73dd2b2142cfbe5d9d694d700c673755c75b9c4e0c22ea999290c658b3b7ac5e7749e509b6896b3dfeafc8b266eeb42281e9ec56c9dbf0ca7839fa2087cdd2ef7f36fa47adce2f2a634787d81dba787f0919007a41c01f007c0fd71ff8ce472a2c04e303d899f3844fc6bfbd64f2d978601cd3837e86e006a74e16dddb33f9de3861eb761056357ac531023516968f3ab6cda3091a86fc440325a6d790365711db8ac720f1dcac7803051d1ff8c101c5486f171a4ab8e55ba4b1554d69278970a2ae5ffeedc4a0a980960d9255ea3d70fc13b4984a04cd4db92fd4bf320e3f05df52ebdf4cf936e1ab288939e2204418e134656a39d512a86e62360fb42984fcbcd6a6b5810736bf2626b0812ede3b68cdf05ec8819987a9403f4d324c282bf075d61405524f9f6b0fdff8e0130896c4679bebfcc62186748fb3980bf4588eb3404316c892f9090abc543e817b06118b214b882c128b09a7c664f089402d6741a754fa651e0bc3cd16b3d9f6b3541fd48a5bda03a11a0cb5de73791c27d62fe8c68a844f93890477b20c0036fab9c99747438f9f3df2a877fddace641a2d3a86380366ed1d798b48dd634a0c5c2a1e92778815872316e049881ed959a24ab9dd7fdada91532a622a5e579338c5d320a89b6d61d73676dbdff9400a86cc6c1f65bfafd80dd7a4aa49f0d6ce91307b66b7862d9c1142c3dd7238d3d61cca2020de0d626480493689a0ba78887b32a51604526620af64deb0141172d965808517cef427289b85c3c9184cad41debe1ce5b32ffeb04961677e01288d9e05279f90369d6d340cf20928f274405a333d882ad01d5e981ff16c97d95a57fbb2b0fbc485684c6ccafbd1e8a71013d5fcf177822e9d43a3068809a4555ddc0b8dae5fb2961e7064908d0c580a65a625df0bdcf9b0d2b2e04d2b83537db1ac2d8803cca949cd418b3c6d6c1d0bbf85b3eb1f92ad43a0397da7ae3c790857b48243dba3554b975a8ced20179a300f48db3e4b7bc219fa535e581733300a7875346e6bbfb2580986e4722d6bf1a111fb76201c5ba6d63363b9f293d4e9ae6e96ad5ec7878d42414d4e8eedee3ce17755f2cfddcbe6684d247cae382e912d510fc6f2a3bc16b9b3b2650e73048831ab1e052e4fbef513e1a9c0739f52118348216c73ecfd21c5061adefd4398482929b1c681256bb8726b03d86ee205b29654ab500e5dc284e7a7c3131a27272bbeff0bd92a91eb649275c615ee63827a28e75e4621251c68f705b149f5562874b43556bc1f9544241a31096d2bb21381e7bdfdb21937998f3af4e87a7347358d0fd1ef2ea88e1557ca94556e9ec77714e470af0ff41986d354989b9f9cb271098fbc31ab3598fb78dfa6715e2e082ccc78a3886503157a6388a37ea3f1e11cabe21778ab2e283556fa9c99252165d5e3ef7bdf5f904d56e2dfd99950d66b1f1cc611b9a30989e61a04cb57d471a4cd37c4ff51ae941996a9654327b6cfd99b58f084e4478cc6c365b12614899b844fe48171b5a5d19b6f24b5c3bab798174a9b025916b29def53b5a7f3a32b20c0200a81fc00cd91a1464ac5d4d08421a46ba56c0fdd2682b473c7d74dc77378f9d73c3d31d87159afa8b958b99e619ab22c9bc7d6283c053e0bcf97f6b5fbaa5cd4299d41d35be4bf257bc28866166035da05f6271831f0a2626aad998d076bdfde0ee866cda1dea4539abf1701206a6fb01e25f845ab006c9bb470983ba227a557c7676cc8be59954a9296500b01eb3b6136311fc86770df0e2b353b84cccf7434995c8f4400affad17e233c28d5928e82e1a2742fcb7f22fa9a83185641ff13e528747a93fc7fadde31b15f5744f4883ffd470ddb90fa10dcb0a3b8a17fcd030aa6d165b953b34b781c6e370b87b70676f0f57ce8d5c12c424557187cac4a6c01f80a9906757a257c96f7f54131180ffc0182d6eecfab5d87af98ea507ebd503698f77bd5cfca3fca2c7a89b3d5e77d8108e75b3607c117a5bc9b017a1101edc3afe3e8429c29035fd0d6b1d4b23e43a5fe534e085481507797e6c560d4f865e7705aa178278eb326491170aca82e930b9c0df43ff832ca08e610852cef83edead905833e67d01cd493ba22e130f850190bfcbd28e7549eb965c4a0bd36b4febc48f42fd2e29f096e49201eb6f8140401446a4bbeec8fc5519c1379aac69d0aa36651518323e406f64e331eb7f2f4701d74e4a626c9957b25bed723bd864d2155b7a1cf72dea575746554225b9361e9aeedbd4a11e77ce9a173b9075d2dec8dea656cd5dc7823180f211ef06953186a89c80ac33c0ffe613f81614ec9b2d5e647c101d48583e94206edf2bfa0205859a8261ddcc361958ea47b538f134e5a3662037a9d0007a2303b5a8055b812294c89c509f99bdf8b7db807c379ddf5735f4d26fb531c99f6c79b3d6bb6498179640a547f37c7fadb017afe97d9e325a106d048cee66599a7db8460a0afe7c7a2b088b1af2ec043a5dbec6b896f1d8c8ccd79b64dd0190da779197ced2bb71d6b8e04b2700c60c38401731be2ad2622d7f212eaab38ec9c90e36011b3149914364d28c85f96fd838f7fba67e76ec0df974c3785e0ac657f5edf0dbb0ee225a9c1ae5887d76937e2bdb4a1aaa1d9ef2a0796830a7d014ac0e24e68c5afe1ddefbb6f6e8cda9ca05b9b1db3923975326867fd93fe439dc0bcbcdd93f0e0b993be3b14e48ecedc648094c5f3aaa5943f6e2363ff7a8cd62f77ac0eab13b35e16cb55d127587f6272c233e4759273fd02037e2b45945e0f6f15050814affc04aaf6056f61d0fdea22c7f67e773327bc3507d1affc02d05507923aa62ef4874aafcba2230eb8a404ed26b14c981f621ac1e9b565606b9af2caea4604acc31d5e215bcf32cbcc0555259a5e1f1100414dffaf8353ff5f53e833ee76ab4b858c8f5554b5e38f20deeb301f6699c97097e0041d0120262e4c9dfdcea064137589c89eb82fb15834420994b91e1844d25ccc19d9a77ef74cb6aa4cd6ec2cfdc1c957d1032e09daee553beeda8634ea7b3f59a77af95ed5c0de5dc08461916ce6b0f16727d8847278a469675537e29b6a149e40e0e091cc855d41ba09f6092b47cd0128a158d150bcc49dbeac604e81641b108b02593f36932d5cda96db43059483dc511b6e08f34f589b1f6d77448a75fec6b780dd4c3162a4836d0b0afd6b6af3c8dc8e607ad51ade93b79c21df2181839b980a0105268855a50b8f56eda718751b2cea363e2b696535d25667ff0c6f3cfb5394ba1c58c62022ef1c62f95c7db78bcf78148da77f961be30ef0f0aae25f70b5f75b862c5d064384d8fbeafa691f7fa7a6ce89d2d65c0ce1a3aa8dcf9de4a6542b85a968a5055c173c33379432fd13ea8468ac306858166dd1d86048e06fef79a9f641f3852642d77fbee6459d90d86edec822273456dce14f041cf9535570d0ff73100a53250ae9c635459ea94d3947018f3818a4ef942478be97b4cc20bc2c2f37dbdccdbe0e5ea0fac8133045f8004771c7cc102fcdb876b48ed53f0ab645b819010636ed1858dc4a0a356b2f9185f395c1da003e080302d1fda811fe333600f15ff462f00e0b63aaccf2d5e09a66eedb295da6ebc8683f74cc801b16781eab167bd28978d44bd75f7baf0974e7f158041bec56b043eae69ad92c843aed92a128109078d59dae1eb51ee4322c0f3b581b693ed062f36a3525940a5c84e1685d0c2ef56cc827f628a85650edfb0502245e51756efb2af6755b4538d67ffdc36dd8670b84508c05e37d23e6d470c5442f8c8561d17057613e188756dc7d94f66ffeee5173d254ab82b41791821cf329ffb1cb454d5cb9c407de7a17fa766712ef808784cf4e3c6b10a4bc597d23f1bf5a3912c93109ace9e4d4e444528aed73faa64788ab6ef0521a082075853072dd1e3d8b79ab9f546e90bee67549096f72658462473842f912fa0bfc44751226d48fd1421bb800aeba6cb22c300de56c9cbf2e12bd8a03c65e4382796104f867948db309cb2a259742c21be9f1adcf2b68cfa5367e91d91e4ff4e306431f4c167cf21bfe2a6e0b8c3acffdd7a068cdc5193d5d42f293766d83c023cdad8077b1cc9e9c37975ba29a7e5e27b4c68ce84f9abd40b7189690ea46596eb7c3f0624f76d7fb7fe7a2a0349bf5d32706454525bd9fb5b9e36815f52f5d2912f1765b253bc4f9d1c4ae7fb4f7550f84b47628711fafa81a714aa973f5f83f73ac150d60eb7a9bb1efdde5bc0d4371ec9cc86d9c9bb59c2c97f074e12ba7ca1982d42bf8cb3b1dcd7cde87504057360174caf60071512f47de9eb6891aa4d55c90c3825171029d9d0737cd6671d091c0c865313e560b6aae10d9c75f4eb535c55c7506e6b40e87fa23ed58bb3c12d257b86bba3d20ad8eba40b9437d738dcc5154213e551ffd918036bd9add2120f18b18425283176d5210601b7c17f0e49befac810234b4f566bae9dd5cdeadf78da3e8c3f9965ce21a6ec1102fed71dddad7bd3a74daa89fd92d0dc8d97ad0e1329b3bfddef4f09ee78bf8bc404e525014b8593254817dd809f389455c7f2b55f1346f7657c48248f2ef3d8dd576dc9fac6071b07c2b957d001e886c75a0e9513d774a2c12d0cec4e2a7354069eb9f8b6757c10c8eb1cb273bfdfe0847d520442f21f600692268ca2a6e404f3332d2f46ec88390be2000231c74953b587a90f91fed56062a9540f289226c56733877158ceb3deb57f0998f1d34df1986b144229a7918e76379e05a560fa692ddabd5453348dde8dd985b5e390866e00eb20d3273429a5e91b1baa360d8b878b6acd72c1c36002a692712e9af6ec960c93783a211cbfd92ed9ff4e2082344eca4ba212f71efa7e12a8d2310ece699e6a8", 0x1000}, {&(0x7f0000002280)="c7cc848d66dca94dd557bfe7e7286eb4e875bb88145ae70c9c12fa03497a1d5027b42127f86ebeda1bfb8700b3df404e229eb5e62723631e7f8a4adf2854d5045473ec5aff16e8d63418b51957bcf958080068ac7c88a7c944ca49d57504e073b26d9c06324b5080e01f6613fe7733495721985125a5e6629bef1cc0032b88e278233eac01decfa93d8ebf3eaf", 0x8d}, {&(0x7f0000002340)="6dcc0264671610dca379ff5212817ce80229b4aa88f2a636bcb52454fab2580f3c1c4e44e02fb5fd27d3ee2de21d020c46a712d4e94fe98aa518a71c692957e38e03051daf03b35841671086df287d69ede59b3169bf337d97bf4891c018ecb8686e410478a2ae7cdd2b109da7e0cdf4872a5b621e4b3bb1cb2ca0dd641c007cde1ceec3e285da3acd0c1459c40848603f00b70e0c2bc73a1dfd2d761b395fb93fd336235bac63259404d9e3de60d7cef10b62ae7c83067e8d409b7acd9931b0db12ae6135a7b6c10342e18e93279d", 0xcf}, {&(0x7f0000002440)="fe46a16d268f553c878924c754f42b0ca0f187af2459746a64c29229cd257ec697f016a8edd952d97cf237e0cb3542e9d3bad7965bcfc8c6fa34de989fb047b8f9153435daf283d8b9683db10ce440c336425c531ae234babe6c291af78830321cb76649f9e06c67222260b51171d4ca38d1f4ea7206ff3b53ff96f92376d1e50a2fb2eff53c7baebd83bf563e0a542bd1f222034f50b177d9ce42043b86328155a57e59fc058c83beed487d26003c651338fa7aa974ba310cae90724f73bf797a80749d293a138684cb069c356596402b20351f1477a8e75ef7ae9fdc70853d6524c3508f6c49d9f07d9d008f49bd99ec8d3ba094f264272744ed7d27f97d60a0143ddef58b18c329c8b602dc85a1aecd12a08979c3a24f40d00442177ba94d34995f45893f55fb6b18a2d378efc433adbe1479c76d649cb9a4460ce420a82f44d3d1c06c90e87ddf52f1d7f0a8b1af64759ddcff1ebdccae2e6c1e25bf52ddc9688eacd4fb019acebce45d644eaac984425c4dab95cf8827264ee998899413773aafc393b094be79034e09c99142d3497145c3cb98b57a00d0053c3e403309d559e5c93a0b06d6cbd4809b1377a280c535d4335723d87bb0a10b4a896ca84e39fc88e3054f8d614d76d8e755de77c497298328f56aa1230c63f38305224b327295e0689cab37f0781e109a5844dec741dec672cc6c975a76985e6af4177318fb0bd876525f1e05058c61edfa06156b23829a1719c3972d1ceed0ff631b8558bdd93d68c397c0d0c65b0963fb574fdf708f46c36b1e432ede497879a169fb26e12a421af755ad0017863e78bdc0325690797b878170d2c90b737a8e03e3ecaff506e2c46b555a4456d3f6c11351ccf3ce5017b2064865665c61e6b182e21541b99aea4a27fd6e4c7b5f06191eda7368ce4fd10b935b768ff3589beeba10493be87ea620b64e716fe33e8212207e03694b31acffab6ec5c543f5ee782444aabf372c7ece13c38bfb9d11571cbb5e37e1202ee6fbea058ae061e46ffb5e26c381f44919796471185fa7ccba318d5a4d1c2594992fb94e2210bebb224b218ac5346cbf37c27759ef5648be15846b307c8651f58681eb0c912bb395feb061b97f90eb9820c3512d4a1cf8228a0665f95cb179f2f851e06b7e1ec774fae6d48195b40334e0d52fb5f834ac7c4908c25e02e8b31dcad70c5c7cd545040366713a20d26bce5870129934fc92c2765614a492b9c1968f5c870da49a145b150e3cbd9e008c2e96a1f25b43d07efe345ea14615c200cd14b2b78b9a28f1c16bea39c70ab73c9f0f3e9c7cd956e1e42f8b966bbfadb1865aa63e731b209d505da7d2725cccd1d9de81faac089381275253c6ce0d2e0194792a63e34bb321ecfaefa55071ae1bd0f27aac7ec403e4afee398ca1fa0df23a0de5121aeb192fad08f871c06323750a5ed33ac025ede43f5736c2c30a8b6941f38fe54fd4a0f753099ef1137fb683dad98bd0786ddfa28c7d538ed87d16b96fc0152ef3515680eba69028b02cce465a5b94fd175cf73cd70e522ab248d693c9a6ad41c70f6ecd0ae73d1f3677fdf38c941c372b618161a6f1fd6c86a5445505e57134aac650ea63c1d9729afd4f93fffe52f347dd6bf51ebe11668b9d0f90d2f102c0358a221af678d5c89d6df7ed43e70b07658cb1ae303929aa6c1e9a30b72790af6f45e4ca5c73326f831ab5b3934bc6fb99b872f3941171f89e662a1de98ce5c9601265f467d9d535dc10c6c9ecdea028d22fc612270519ca19b83ffeeddb85d5220eb75b7f9ea849d5dde38c995ac3348389cf58b1bf2877752aaf55220a0941008568e3d3b87b7b6d8342b7e80f0652704a72b14e6fc4fc28f49fe569d5c3905b59cfc31287db7a525a7260d3e825864653f9233a1c33eb76cc5163df8914e31f281bb25f232fddf0e6b596cb8c1e06311d572de28e526d9cbcc8f3790e7f28c85715175f5652b6ec1691dc75c9379f7ec6bf73756926d3ce4b76428b51debe7266a5dff0049392fb40a04371a721b7b86a369f63ff3b34cb852114b71af468833ad1b6b296aa63cb3e896988283a2ae36bd8a640b288d7023ddc4c43f0d2d3a033cccd09a24e2e969ff259b48b7e400d31916428c67b1c4b9e1094dd9f962cc2fa21887e123fe0d4d0f5df0d2c7702af79ef9c8b0b351409838e6ae63f983650a4271fb558919bd342fc8934a304b64a94069035277e49889c85d7311373ea9e246b5eac3e15156ed7106fd7e38141545f3d7fb24b147c74604dac6db8fa40726082a62b338ef44f99415cc1b2c4d4090d0d5b0996e6f3e77b50f6895a716ddad115ab37817f66ed523fa3cc05dff896a7f9a194b3e52b3402d0009d8bf72bf0d546aa190691d6ff9c91d09d204ef61a69a37dee432f46dbd2d46aea1ee9e8c627374086a11e71abc878ada8d35120c9059c77a7b00231090f948f4efa5ce4f134563b68192422d452d0db4a95e41ab10b29eb8c1b08dacba52fc54ab64cb4cb304b88ddfe8e1889428b547ce9a6fbb874a951c1a7bdabfe6f01ac069edbe74793434b10be7bb82fbe3722b5ad3a31eec298bc3126503001fe5fe615196d64c9b0886e6a0b5d5a594f6572b6d23b451965369364c5082eceadd5fe4b5db9a44f0cbbbd1d5b94ea5958ece60631ec7dca42b8346554aa031ffeee6466caf4c45a71f0e113841153772a33390690ade2b84d83641afc7ea85b8d37a9788f953a51656b0b296f2e3885a663a4e8c3123e7eeaf881c74df107a251ff705ab2046e1f361b02a01e20202c90689ff608241a061e551acfd90fba2e74bcf2bb28fc1a77df1cfccefa67ee489aec0959869adaabb0a8cba48eedf36e4b955c2c2954568057eb1af01fae041b6ce8a16d6b6e041e01cfaf871833599eab56436f70512a368a2a5be76c0a88ea88d88ad440c8bf521f3a83fe98957ef60b0a7a128781db65bb90a25e8055e7cff457147293597b955a14b134e527a8f96ae443114cfffe403bedb4a5a3a5dcffc38de22ac35f681d3fa946c8526f9d6de8c2d3269f673c22f1626d8df7f07e451b8722076b803f586002260892ce99effd02654c797a4b0624ab2fa33011ec7f6cfc0f8dfad1ea998fe51d563deca398d252d15ce203849e019023b4554240a1e4aec1231e870d7c2c9125988612079c7d87f2fa6876ffeb1cca8c9c4e3ffc0d6d1888f79a2093c17181b0b0b3269bf1199a8a9450b18baff25bc2d13665ed8fff1c327c7b206fc023d5d95d206589d6efd7d3bf5654352c56425650a589df221659ff17c1901b30d201d20cea9e13977e1827843125baf4a95ba39d23ba6ad1c6e7550ff7a233e68fa71cbd675a208cffb9a2cbbe4825abe1e2f1b0c3feb1eb85be602cb848b872e98caf5b624ea44c006f938006aaa7fc618bb905440b9e5ca40a778061d156ffbaae9394de27f27da5029d3c74cf49efe1cf6c3165ec28e9556fb83888bf94b03db70ff5ab5fdf9a546a486c479f21f7544c0278eb2746fb85b959024960cec75635f5785e58613f8f48148b18e3e17e6d0da4a9aada8a32cfb68d82a74b2e4d6f80e4881af69a89451691188dd571f92c7caa20deebac4255bd834da68e3075a873220fc33d083e8f7076e580e93fa5db2675f87d40921a3e8fcedbe4705b548171112f6060b754de08152713db08fa4ccfd0cd73d9e7ae848771ad1f0cd06b9c74ff318b1628b56623147f644d238ad1a9983b6b6b768d75a0260e39c366267a906a0ae31c9c5d42c82dd07ee27e429d45741c65ea392d248b44d449c6fdc737e48a519bc201aa661e1dff013c37128f5c0c14e9c5f6e6d5b9743196ef65a404930452590de692cd9881053786ffcf9ef15cb39b885ea22837950bccb0bc61a09b1555e788952ebd58dff86a8583c029c4c3ed68dd9e7dc7b250800c573c42819316367843c98734350307fdf25252f89f23159a0776078654a48bea776e00de49d3e80c81847e95261a66512b2d3105cc27775204deeded5094956c8d656c3600bffc0b85dc10a130893752e45c771e0e0d606e5d6e256c6700b047a79c797bfd7f83f30ecb01490e1cc25faabcc2c65e46359778a628d1999f8f9fd30d4660ab06b8a1f542656448607d636fefbd68d1e10f94c23eb3b641dfee619a12514470515ebb7982b7454b1076f904baa622da82ad0c0593c891bc2e14a13523c6b9ab1a746f0a51f6a077853279bb9b4786f643c7500af96b512dc5394df0f9e95b4e4cbf013fd45f12bbb89cb673ac1eed5aa0596086e4393835d941cac0853d6ebc59a1145a5b438064eec54f56471d11edc57b23a02d1ff6ed6d8bc691a38f0a0894cf7479a2cb72cfc1eb2a0c6fc24ce1c2bf0f527d0938ee2863c71ff28467fb4486d0b4436e3502dcac784d0cd279dbaa69d695b7acc72fb331828031cbf80396285609e6b33cfd808d85b8a0c8f6261e5e6f9f5120bfcc5cc3508f1f6436e86e09739fb73599487e1f79df78e96dd5a483f9340f80f5332444edbec3712e7a0041704c171dbccb69f3ca69945f21143dc538a327063fb7f82f82c96f571b210c0dc435bbfaeba63b9362c4bff46f52e785e0e598c797c785bef5e0e116d8f00127e3ed673b347ffe441bcc32962fcf6bb2aa3b6cf8ea57900263b33ae40377ab3c1c61304b585634db7d01d2149a7ad143660b4030fdf49684b5b5fa4cb0163f1e890a33fbb877f3a511c661428167bb2f57d31cca0208da8d9be76e105e6236aa48a4813a6218e792e94adf1b482ae8ac646f320b218682e804b48f8d668f1223ada01cece1ca36b024d5d32a6a1b18312fcd116d08e0886a05f3b97f12ca0e2be0f41ee646da33aeee7ec125305d60c00e528ca4862eddeaaddf4bafea2cd2af08d544b1b17f6a76284a35e17f3cda6f9fdf718384bc7bb09a66e3105ca09831d403a471155b7958d93e8c35b56257a3856a5e8c938a36db66700b1fa0750a897b224afc0ff744e82ee59d4ae7b90095ea22a11e7c146e5fde2d1e7607812e262c2cf2b244fbcd89061e5a5cbe8525b841b02ac108876bd510a0c78cbfb4ef404db801e1a782270f3f50fd8143f3dd9029827584287eb041950bb0bc90ce26bd6e2c322f86bba5910148055b6affbc96302ddeba703c59b2536e884dd8a2ccfc07bfb2b270104bd23f4bd2a17a2c0b36c3dabf13da4f56fd42c865de33ffeb8caad298833ccaccb37774b60660d4891e7d5dfd57d56f3dfacde102292074e4317451c0c2a662da5638b9b1c58b9596a944c0810be165b0edf75a162de4166430788593ae81044901693b2fda377bff07d12523643e711fcae8f9a2c21d236cca433da0f7d412aaafbbdf5a78f544f904bd8ba3402f343b32a7f156ccc4e7fb71e1013f5de9e50838c9738d3f8b444666ca543332693c2a4f537575767eca93e9edfcab1568441acd9ad09536dea73acf25e67f99a82d411cef2166d572441bc17e91bdaa0427c2cc0dc7a1df8cfc81d1f8db251d8616bd08453b2c08d3153bd8f760783710a417d7b3268222c8a9e5320848efb0a6069500873a9882b8ba4a9440f7d5788bcdf467c3a30ae645ee2e435fc79d9b8b1758679be5841568967ed1c2ff98606fbc022744adfd4b54092148a0a65ce248284bde0bc84618559eb8434a61ad63d61716d5c2cb848149fc4794fd8af39b8f0a6f4ef523ba41a445a6dffcef0c6a3e711f0d48a91ed3207ee47a1ccfe12625b2fd578e068f45a5c8f302d9013c55bf9aab647cdcd2d5099e569a505385c41965", 0x1000}, {&(0x7f0000003440)="ad84eae023761a696ec5488ee395048ddfaa2ad8d56d19534b893ea09e1f813ea5f035ace930b5f270e28f90ec166f028d6b4e8e73da05e41faf3abe7286a1fa2b3ea961ba22adfeeb8e6918539fc426a098ea8ef8ce7d89222281be7b7928777bb242d7b8e932eb0a299733ce15d55185bbdb76954b7416b67bfef63b0e897273609bb46cac9d6f92f6235630a859afa140ee14252caffea1b9089cc96e", 0x9e}], 0xa, &(0x7f0000003880)=[@cred={0x20, 0x1, 0x2, r1, r10, r11}, @rights={0x20, 0x1, 0x1, [r4, r3, r0, r4]}, @cred={0x20, 0x1, 0x2, r1, r12, r13}], 0x60, 0x4}, {&(0x7f0000003900)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000003b40)=[{&(0x7f0000003980)="20e30206c96367ffdecd87bb65df2a47408dd304baadad7dfd30a2c84e459fb156f4435e504a4edb60981ee57aa5eeed4095b012c4cc1fbd61585930358ae5bc06247d9920c6aa5014876ac9eda721ec02311ef8a643a3f3399b1616b422e1bb7a34378ac5d94913f80db291e911880e196ba3d1c574eb05f6b85a2e209157ca06d4608025b8081c511453ec97353ea57895b07d3a1439ee95dbaa13044ffe240f77d8c9acb4a0227b19efc47fd2530e71f70300d3889482c5c260227c8ff41473f481ff55a694d8fba80eefa6ae78", 0xcf}, {&(0x7f0000003a80)="319947", 0x3}, {&(0x7f0000003ac0)="cb47c192b195ff2623d55ab69edba3b19bec962848694d4f0029bfdab0d5df14fe575920b9927fbb9970bfe235d045496e431453b33201cd59147f911038b25c22990f2b010bbf27374cf71175dabbf5271c03c34632bfbb80", 0x59}], 0x3, 0x0, 0x0, 0x40000}, {&(0x7f0000003b80)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000003c80)=[{&(0x7f0000003c00)="ea6fad6f319c9a332e62ce8c2436108be896ffb66949fd98714bec64c28a5bc87aacdb3b4731d2e4c6efec223b35070373d729e55a87b9e9425e7b1ac77a7ffbfa34bedbe4ed926206e8a2fa963beab60e1ff2ac59024790bdb4a7bae33c9107fec8d1dad85f8e2ec6380bd2cc874632f8964526dd179d2e5bc67c6905", 0x7d}], 0x1}, {&(0x7f0000003cc0)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000005080)=[{&(0x7f0000003d40)="cbeff2783b6330074c5b44", 0xb}, {&(0x7f0000003d80)="4be77cb02787caf01872fa0b36d5b7de44fec7dcddf6800d31397e96c283484e9255a259f6b26eab6009f168199d818e0f9ec50df8710f4a29e27118fa94883d2468636744e5eccd1e75084cb4255a642ffc", 0x52}, {&(0x7f0000003e00)="d08ee1c7aa40fa5b4bc8f58b8b9912c0a4691983b31dad0bb80020a66b23fb9ba5df3412ef2fa4ea1ad09d5b451a", 0x2e}, {&(0x7f0000003e40)="fa66b648168554d62a17ab03172fcc355989b8446175ac14348bd391294a62c42277c0bb20d7cfbd04690707102f0ebe00de994545ec923c7287b79d60674f2ee69cfd6e8ab25aab5bc8a7e56eafffa40b74cd12fba4447a5aed8e46bc7ebcbe708e3ad6254fbf45d804781ea9bc6c54abb9ee539e61afbe690f920ae02b6f18304380821b9f48dcf89af8c47c2c2d619c03dfad4da41f3b25b5035476a0a589ab202fac536d5b41559c5d044da659c93b", 0xb1}, {&(0x7f0000003f00)="cc528a962c76a28292470d4d18a322258b8007a1420027de6c94008ca4ae26eabdcade65bb", 0x25}, {&(0x7f0000003f40)="d17b35ccac31926297d622a3b515458cb459ed7079482d810b76cdc54b80db40dbe2ded076247e803343f79e4cd26bb55999a3a2eaacc2d8e126b155e2e93ee34f0f40410f157edf606538f347f34754c944", 0x52}, {&(0x7f0000003fc0)="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", 0x1000}, {&(0x7f0000004fc0)="ef25ed5a5cda108b4e9c4d856bb29dd3e032f82646f4610b9b164b021ed3e1e8c1c349915e859316406f2dc062f29a4c41c9c81d9d98e521e6ede2c2f1dac664e35d2291c31535080cd687c459d07416b267f5130d2cf504cf3492dac4a5dafe71b8bdd77b3db87ec0dc10e9066ec0295931da7bcf84952435467e68d1c07eafe0f8816c65d3f2b7ce5d92c6c21ae0854aeed6c1346c5068ae0ff428", 0x9c}], 0x8, &(0x7f0000005100), 0x0, 0x111a45a68ff1b6dc}], 0x5, 0x800) preadv(r4, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, &(0x7f0000000280)={0x5, 0x7, 0x2b12}) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000180)={r5, @in6={{0xa, 0x4e23, 0xffff, @ipv4={[], [], @multicast1}, 0x8}}, 0x200, 0x1}, 0x90) write$binfmt_elf64(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x45e) 03:47:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000004000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x68000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:15 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xd}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0edffffff8c00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:15 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) sendmsg$unix(r0, &(0x7f0000000180)={&(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x800}, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x74000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:15 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x3f00}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed000002a000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x74000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:16 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000000c0)=""/1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000edc000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:16 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xe}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:16 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x6201}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0edfffffff400000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:16 executing program 4: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xb}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:16 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xf}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:16 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xd805}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0edfffffff500000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0edfffffff600000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa0020000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:17 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x620020}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:17 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x10}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0edfffffdf900000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:17 executing program 4: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x9}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:17 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x630020}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0edfffffffb00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa0020000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xe0ffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:18 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x640020}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0edfffffdfc00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf4ffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:18 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x11}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf5ffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:18 executing program 4: 03:47:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf4ffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:18 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x740020}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0edfffffdfd00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:18 executing program 4: 03:47:18 executing program 4: 03:47:18 executing program 4: 03:47:19 executing program 4: 03:47:19 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x750020}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:19 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x12}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed00000fff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:19 executing program 4: 03:47:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf5ffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:19 executing program 4: 03:47:19 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xf0ff7f}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0edf9fdffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:19 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x13}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:19 executing program 4: 03:47:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf9fdffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:19 executing program 4: 03:47:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:19 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xf0ffff}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:19 executing program 4: 03:47:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0edfcfdffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:19 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x14}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:20 executing program 4: 03:47:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf9fdffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0edfdfdffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:20 executing program 4: 03:47:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:20 executing program 4: 03:47:20 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x1000000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed8cffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:20 executing program 4: 03:47:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1688.442885][T16070] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop5 03:47:20 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x15}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:20 executing program 4: 03:47:20 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x2000000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0edf4ffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:20 executing program 4: 03:47:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:21 executing program 4: 03:47:21 executing program 4: 03:47:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0edf5ffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:21 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x16}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:21 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r1 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x7, 0xa502) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000280)={0x4, &(0x7f0000000200)=[{0x12, 0x265ba646}, {0x3, 0x3}, {0x1, 0xff}, {0x3, 0x3}]}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x70, 0x0, 0x8, 0x8, 0x1, 0x0, 0x0, 0x40303, 0x0, 0x0, 0x8000, 0x8001, 0x7, 0x0, 0xb3, 0x100000000, 0x3e, 0x0, 0x0, 0x6, 0x1e3, 0x0, 0x8000, 0x0, 0x8e, 0xfffffffffffffffd, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x652f, 0x6, 0xfffffffffffffff8, 0x0, 0x1ff, 0x0, 0x0, 0x200, 0x0, @perf_bp={0x0}, 0x10, 0x3, 0x1, 0x9, 0x0, 0x0, 0x4}, 0x0, 0x9, 0xffffffffffffffff, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000240), 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000740)={'filter\x00', 0x7, 0x4, 0x4a0, 0x280, 0x0, 0x280, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @mac=@local, @multicast2, @multicast2, 0x4}}}, {{@arp={@broadcast, @remote, 0xffffffff, 0x0, @empty, {[0xff, 0xff, 0xff, 0x0, 0xff]}, @mac=@remote, {[0xff, 0xff, 0xff]}, 0x1, 0x9, 0x7ff, 0x8, 0xffff, 0x6, 'veth0_to_bond\x00', 'eql\x00', {0xff}, {}, 0x0, 0x8}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @empty, @broadcast, @broadcast, 0x2}}}, {{@uncond, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0x7, 0x100000001}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000580)="786bc38667d326046a5296458bc9d0aaf379140e64488ca63d6fbc7c62ca0a01d109a49f848d91592a1026c00f6023b9aac3fe802e1efea0deb296696e623f84ea6cf1aee5757100feaab2f9166e2648f75f9991055745fe4519cacc6ff51bc05e281ec794ac98afb5575c1e71f72045c8deb3036c1da7e573948a5dcc1c457997164e3f032db4262f804dd4d9609cc9f1f51cd995893076baec38dff5d218d4459fb4d6c9a9d23199da4c31806f390b9c49ef4d36d1bac7fc813a69f7665100131f30414078") write$binfmt_elf32(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000000000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed471718d8943a11d37dbb346aecaf54c732bc635c7a8ede"], 0xed) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 03:47:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:21 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x6000000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdf9, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0edf6ffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0edfbffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdf9, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:22 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x8000000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:22 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x17}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:22 executing program 4: r0 = memfd_create(&(0x7f0000000000)='/dy\xbdv/autofs\x00', 0x20) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) unshare(0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) open$dir(0x0, 0x80004, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xd, 0x0, 0x7fffffffe, &(0x7f0000000840)={0xffffffffffffffff}) r3 = openat$cgroup_ro(r2, &(0x7f0000000600)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000540)={'syzkaller0\x00\x00\x05\x00', 0x1}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) socketpair(0x1, 0x80003, 0x1, &(0x7f0000000480)) r5 = creat(&(0x7f0000000100)='./bus\x00', 0x1) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x401) ftruncate(r5, 0x2008200) ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000200)) r6 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) sendfile(r5, r6, &(0x7f0000d83ff8), 0x8000fffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ioctl$GIO_FONT(r7, 0x4b60, &(0x7f0000000280)=""/93) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000b40)=ANY=[]}}, 0x0) ioctl$BLKTRACETEARDOWN(r7, 0x1276, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x400000000000091, 0x0) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000240)='syz0\x00') ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000600)=""/113) 03:47:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0edffffffffa0020000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:22 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x10000000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1690.710367][T16231] device lo entered promiscuous mode 03:47:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:23 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x18}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) [ 1690.921932][ T26] audit: type=1804 audit(2000000843.191:235): pid=16245 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir020043097/syzkaller.WnHYjh/93/bus" dev="sda1" ino=17585 res=1 03:47:23 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x20006200}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) [ 1690.978845][ T26] audit: type=1800 audit(2000000843.221:236): pid=16245 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="bus" dev="sda1" ino=17585 res=0 [ 1691.019675][ T26] audit: type=1804 audit(2000000843.271:237): pid=16255 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir020043097/syzkaller.WnHYjh/93/bus" dev="sda1" ino=17585 res=1 03:47:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff97, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:23 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x20006300}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) [ 1691.546322][ T26] audit: type=1804 audit(2000000843.816:238): pid=16287 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir020043097/syzkaller.WnHYjh/93/bus" dev="sda1" ino=17585 res=1 03:47:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff4, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1691.731467][ T26] audit: type=1804 audit(2000000843.816:239): pid=16287 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir020043097/syzkaller.WnHYjh/93/bus" dev="sda1" ino=17585 res=1 [ 1691.858866][ T26] audit: type=1800 audit(2000000843.816:240): pid=16287 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="bus" dev="sda1" ino=17585 res=0 [ 1691.975808][ T26] audit: type=1804 audit(2000000843.895:241): pid=16287 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir020043097/syzkaller.WnHYjh/93/bus" dev="sda1" ino=17585 res=1 [ 1692.672233][T16224] Y­4`Ò˜: renamed from lo 03:47:25 executing program 4: fcntl$setflags(0xffffffffffffffff, 0x2, 0xfffffffffffffffe) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$setperm(0x5, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) mq_timedsend(r0, &(0x7f0000000040)="79fab1dbd170d8a44bb955a4f924f0a75a22093d93fa7e6d72ed180948d777506085358bed1f8a1061e0ed6278d3f4f40392dd0d278bcf8dcad101050805579f92d4281c005c6f1fb41ae01c1c428e7ac9dd2fd15cccbac2b494fbe834926876977393f5e52ea52296f203030b15a9d0c6", 0x71, 0x80, &(0x7f00000000c0)={0x0, 0x1c9c380}) write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000100)={0x7, [0x5, 0xa2, 0x101, 0xffffffff, 0x3, 0x6, 0x400]}, 0x12) rename(0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='net/fib_trie\x00') preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1, 0x1f000000) 03:47:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed00000000c0ed0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:25 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x20006400}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:25 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x19}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff5, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff97, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffe0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000100004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:25 executing program 4: fcntl$setflags(0xffffffffffffffff, 0x2, 0xfffffffffffffffe) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$setperm(0x5, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) mq_timedsend(r0, &(0x7f0000000040)="79fab1dbd170d8a44bb955a4f924f0a75a22093d93fa7e6d72ed180948d777506085358bed1f8a1061e0ed6278d3f4f40392dd0d278bcf8dcad101050805579f92d4281c005c6f1fb41ae01c1c428e7ac9dd2fd15cccbac2b494fbe834926876977393f5e52ea52296f203030b15a9d0c6", 0x71, 0x80, &(0x7f00000000c0)={0x0, 0x1c9c380}) write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000100)={0x7, [0x5, 0xa2, 0x101, 0xffffffff, 0x3, 0x6, 0x400]}, 0x12) rename(0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='net/fib_trie\x00') preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1, 0x1f000000) 03:47:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffb, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:25 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x20007400}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0xffffffffffffffe5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x99, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x9, @vbi={0x9, 0x2, 0x7, 0x36775559, [0x8], [0x72, 0xe6e4], 0x2}}) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r1, &(0x7f0000007e00), 0x4d2, 0x4008000) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000)=0x5, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 03:47:25 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x1a}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff4, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000400004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff5, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0edffffffffffff0700004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:26 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x20007500}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:26 executing program 4: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x19}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:26 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x1b}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000001000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2a0ffffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffb, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:27 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x22100, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0xc4e, 0x410000) dup3(r1, r2, 0x80000) rmdir(&(0x7f0000000240)='./file0//ile0\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{&(0x7f0000000040)=@ax25={{0x3, @bcast}, [@null, @netrom, @bcast, @bcast, @bcast, @null, @bcast, @default]}, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/110, 0x6e}], 0x1, &(0x7f0000000280)=""/103, 0x67}, 0xffffffffffff0000}, {{&(0x7f0000000440)=@nfc, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/211, 0xd3}, {&(0x7f00000005c0)=""/187, 0xbb}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000200)=""/31, 0x1f}, {&(0x7f00000004c0)=""/112, 0x70}, {&(0x7f0000000340)=""/45, 0x2d}], 0x6}}, {{&(0x7f0000000900)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000001d40)=[{&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000980)=""/4, 0x4}, {&(0x7f00000009c0)=""/18, 0x12}, {&(0x7f0000000a00)=""/91, 0x5b}, {&(0x7f0000000a80)=""/35, 0x23}, {&(0x7f0000000ac0)=""/233, 0xe9}, {&(0x7f0000000bc0)=""/222, 0xde}, {&(0x7f0000000cc0)=""/4096, 0x1000}, {&(0x7f0000001cc0)=""/128, 0x80}], 0x9, &(0x7f0000001e00)=""/4096, 0x1000}, 0xbeb}, {{0x0, 0x0, &(0x7f0000002e40)=[{&(0x7f0000002e00)=""/28, 0x1c}], 0x1, &(0x7f0000002e80)=""/214, 0xd6}, 0x9}, {{&(0x7f0000002f80)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000003440)=[{&(0x7f0000003000)=""/180, 0xb4}, {&(0x7f00000030c0)=""/10, 0xa}, {&(0x7f0000003100)=""/212, 0xd4}, {&(0x7f0000003200)=""/25, 0x19}, {&(0x7f0000003240)=""/227, 0xe3}, {&(0x7f0000003340)=""/55, 0x37}, {&(0x7f0000003380)=""/131, 0x83}], 0x7, &(0x7f00000034c0)=""/12, 0xc}, 0x4}, {{&(0x7f0000003500)=@ipx, 0x80, &(0x7f0000003940)=[{&(0x7f0000003580)=""/211, 0xd3}, {&(0x7f0000003680)=""/92, 0x5c}, {&(0x7f0000003700)=""/198, 0xc6}, {&(0x7f0000003800)=""/113, 0x71}], 0x4, &(0x7f00000039c0)=""/115, 0x73}, 0x5}, {{&(0x7f0000003a40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000003c40)=[{&(0x7f0000003ac0)=""/98, 0x62}, {&(0x7f0000003b40)=""/231, 0xe7}], 0x2, &(0x7f0000003c80)=""/213, 0xd5}, 0x5}, {{&(0x7f0000003d80)=@x25={0x9, @remote}, 0x80, &(0x7f00000041c0)=[{&(0x7f0000003e00)=""/162, 0xa2}, {&(0x7f0000003ec0)=""/124, 0x7c}, {&(0x7f0000003f40)=""/160, 0xa0}, {&(0x7f0000004000)=""/202, 0xca}, {&(0x7f0000004100)=""/63, 0x3f}, {&(0x7f0000004140)=""/90, 0x5a}], 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000005900)=[{&(0x7f0000004240)=""/204, 0xcc}, {&(0x7f0000004340)=""/182, 0xb6}, {0x0}, {&(0x7f0000004500)=""/65, 0x41}, {&(0x7f0000004580)=""/235, 0xeb}, {&(0x7f0000004680)=""/69, 0x45}, {&(0x7f0000004700)=""/44, 0x2c}, {&(0x7f0000004740)=""/4096, 0x1000}, {&(0x7f0000005740)=""/153, 0x99}, {&(0x7f0000005800)=""/225, 0xe1}], 0xa, &(0x7f00000059c0)=""/9, 0x9}, 0xff}], 0x9, 0x40, &(0x7f0000005c40)={0x77359400}) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f0000005d80)={'filter\x00', 0x0, 0x4, 0x99, [], 0x2, &(0x7f0000005c80)=[{}, {}], &(0x7f0000005cc0)=""/153}, &(0x7f0000005e00)=0x78) getpriority(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0xcaadd77e18fd608) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140)='dec ', 0x0) 03:47:27 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x3f000000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x30000, 0x0) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) fanotify_init(0x4, 0x1000) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @initdev, 0x3f}, 0x1c) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast2, 0x9}, 0x1c) 03:47:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000002004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:27 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x62010000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:27 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='ip6_vti0\x00') r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x9) 03:47:27 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x1c}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:28 executing program 4: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x1b}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000003004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:28 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x1d}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2a0ffffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000005004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:29 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x7ffff000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000006004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:29 executing program 4: r0 = accept(0xffffffffffffffff, &(0x7f0000000440)=@ethernet={0x0, @broadcast}, &(0x7f0000000300)=0x80) r1 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) write$sndseq(r1, &(0x7f00000004c0)=[{0x200, 0x0, 0x101, 0xfffffffffffffffc, @time, {0x0, 0x6}, {0x9, 0xc47}, @note={0x3, 0x7ff, 0x7fffffff, 0x5, 0x6}}, {0x2, 0x1, 0xffffffffffff6b6c, 0x4, @tick=0x100000001, {0x3, 0x4}, {0x40, 0x5}, @queue={0x0, {0x5, 0x5}}}, {0x6, 0x9, 0x1, 0xffffffffffff0001, @tick=0x7fff, {0xfffffffffffffffc, 0x7fff}, {0xc9, 0xb700}, @addr={0x3, 0x9}}, {0x130a, 0x800, 0x0, 0x2, @tick=0x80, {0x2}, {0xffff}, @raw8={"5722e3bd7bb200f0e16b351f"}}, {0x9, 0x4, 0xffff, 0x7ff, @tick=0x3, {0x0, 0x3}, {0x5, 0xfffffffffffffff8}, @result={0xfffffffffffffffc, 0x80000000}}, {0xabc, 0x4, 0x3, 0x5, @time={r2, r3+10000000}, {0x0, 0x4f}, {0x5, 0x3ff}, @ext={0x41, &(0x7f0000000240)="887cdf6b556b29e4a8d3b3cfb7b34a54d303b92054b15ff92ec639052d789bcaaf30739a65752be266461b338a95f41b38b9d970b11edadeac1acd85265de21545"}}, {0x6000000000000000, 0x7, 0x3f, 0x4, @tick=0x9, {0x5c0b, 0x60000}, {0x3f, 0x401}, @addr={0xfffffffffffffffc, 0xfffffffffffff66d}}], 0x150) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x40046109, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000340), &(0x7f00000002c0)=0x4) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000003c0)=0xe8) mount$9p_xen(&(0x7f0000000000)='/dev/cec#\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x4000, &(0x7f0000000740)={'trans=xen,', {[{@aname={'aname', 0x3d, '/dev/cec#\x00'}}, {@afid={'afid', 0x3d, 0x400000}}, {@access_user='access=user'}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/cec#\x00'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@euid_eq={'euid', 0x3d, r4}}]}}) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f00000000c0)={0x2c, 0xc, 0x4, 0x2000000, {}, {0x0, 0xc, 0x3, 0x6, 0x80, 0x0, "340992c3"}, 0x5, 0x3, @userptr=0x46e, 0x4}) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000140)=0x8, 0x4) 03:47:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000007004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:29 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x1e}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:29 executing program 4: r0 = accept(0xffffffffffffffff, &(0x7f0000000440)=@ethernet={0x0, @broadcast}, &(0x7f0000000300)=0x80) r1 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) write$sndseq(r1, &(0x7f00000004c0)=[{0x200, 0x0, 0x101, 0xfffffffffffffffc, @time, {0x0, 0x6}, {0x9, 0xc47}, @note={0x3, 0x7ff, 0x7fffffff, 0x5, 0x6}}, {0x2, 0x1, 0xffffffffffff6b6c, 0x4, @tick=0x100000001, {0x3, 0x4}, {0x40, 0x5}, @queue={0x0, {0x5, 0x5}}}, {0x6, 0x9, 0x1, 0xffffffffffff0001, @tick=0x7fff, {0xfffffffffffffffc, 0x7fff}, {0xc9, 0xb700}, @addr={0x3, 0x9}}, {0x130a, 0x800, 0x0, 0x2, @tick=0x80, {0x2}, {0xffff}, @raw8={"5722e3bd7bb200f0e16b351f"}}, {0x9, 0x4, 0xffff, 0x7ff, @tick=0x3, {0x0, 0x3}, {0x5, 0xfffffffffffffff8}, @result={0xfffffffffffffffc, 0x80000000}}, {0xabc, 0x4, 0x3, 0x5, @time={r2, r3+10000000}, {0x0, 0x4f}, {0x5, 0x3ff}, @ext={0x41, &(0x7f0000000240)="887cdf6b556b29e4a8d3b3cfb7b34a54d303b92054b15ff92ec639052d789bcaaf30739a65752be266461b338a95f41b38b9d970b11edadeac1acd85265de21545"}}, {0x6000000000000000, 0x7, 0x3f, 0x4, @tick=0x9, {0x5c0b, 0x60000}, {0x3f, 0x401}, @addr={0xfffffffffffffffc, 0xfffffffffffff66d}}], 0x150) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x40046109, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000340), &(0x7f00000002c0)=0x4) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000003c0)=0xe8) mount$9p_xen(&(0x7f0000000000)='/dev/cec#\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x4000, &(0x7f0000000740)={'trans=xen,', {[{@aname={'aname', 0x3d, '/dev/cec#\x00'}}, {@afid={'afid', 0x3d, 0x400000}}, {@access_user='access=user'}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/cec#\x00'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@euid_eq={'euid', 0x3d, r4}}]}}) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f00000000c0)={0x2c, 0xc, 0x4, 0x2000000, {}, {0x0, 0xc, 0x3, 0x6, 0x80, 0x0, "340992c3"}, 0x5, 0x3, @userptr=0x46e, 0x4}) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000140)=0x8, 0x4) 03:47:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:29 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xa0020000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:29 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bind$bt_sco(r0, &(0x7f0000000280)={0x1f, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}, 0x8) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f0000000040)=0x4e, 0x400, 0x4) listen(r0, 0x0) r1 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000080)) r2 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x8, 0x8000) ioctl$BLKGETSIZE64(r2, 0x80081272, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 03:47:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000009004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x4f) sendmsg$netlink(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="00a592ec1c0000000000000080000000"], 0x10}, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x80000, 0x282000) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x3fb, 0x100000000, 0x5, 0x3, 0x80000000}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000180)={r2, 0x200}, &(0x7f00000001c0)=0x8) r3 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x3ff, 0x101003) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000040)=0x4000, 0x4) 03:47:30 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xd8050000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:30 executing program 4: ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffffff}) fcntl$notify(r0, 0x402, 0x1) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x35, 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f0000000140)={{0x7, 0x9}, 'port1\x00', 0x10, 0x1002, 0x2d, 0x2, 0x5, 0x71e, 0xf4, 0x0, 0x6, 0x5}) ioctl$int_out(r1, 0x80045700, &(0x7f0000000080)) 03:47:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0edd2f873574f257e0a004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:30 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x21}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x8400, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f00000001c0)=&(0x7f0000000180)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7888d060000000000011d400300000000006506000001ed00002704000000ffffffad460000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000"], 0x0}, 0x48) 03:47:30 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xfffff000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:30 executing program 4: r0 = syz_open_dev$mice(0x0, 0x0, 0x101080) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f0000000040)={0x3d, 0x3231564e, 0x401, 0x401, 0x3, @stepwise={{0x0, 0x6}, {0x0, 0x1}, {0x9}}}) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) socketpair(0x1e, 0xffffffffffffffff, 0xff, &(0x7f0000000500)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000080)) close(r6) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x33c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r7, 0x84, 0x6d, &(0x7f00000001c0)={0x0, 0xdc, "88c8c54e4c01353841b1d5a412a285246a7958bfedfad15008c7252f38b7068424a33e722729ffc9b08920b57943f32e0f16eae8084c3d962f8ee9e663396e20f8f3432ee42d940af8f31a419a459a660ee9d0f735936e29650deb220f4c72c3218ed6d09ebb4192c29d47ead760b7acab98eb8e168c21ce336308e282ed566d6cd4ea76b628e6498ce6ceb2b983cf866361368e7d5e54435674b078d39458619dd067ada8dba2820d1fbdb90eef0fb600ce21e82b558e28b885087d3bfd2b670daad8941f66f9473166f0253817559d8b92dbffb14224311aaf095b"}, &(0x7f0000000100)=0xe4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e21, @local}}, 0x80000000, 0x3}, &(0x7f0000000380)=0x90) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f00000003c0)={r8, 0x4, 0x100000001, 0xc7c, 0x0, 0x3f, 0x9, 0x101, {r9, @in={{0x2, 0x4e22, @empty}}, 0x12b, 0x7, 0x9, 0x9, 0x3}}, &(0x7f0000000480)=0xb0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffffc, 0x3, 0xdb}, 0x2c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r10) setsockopt$sock_attach_bpf(r11, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r11, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, 0x0) 03:47:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:31 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x2a0ffffffff}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:31 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x22}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000020004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:31 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xffffffff000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000001020004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000023004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:32 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x4000, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x7fff) socket$caif_seqpacket(0x25, 0x5, 0x3) 03:47:32 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x23}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:32 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x7ffffffff000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed000000000000003f004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000180)={@remote}, 0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001bc0)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20000, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000040)={0xe, 0x0, 0xe09c, 0x3}) setsockopt$inet6_mreq(r0, 0x29, 0x4000000001c, &(0x7f00000001c0)={@remote, r1}, 0x14) 03:47:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1700.244699][T16877] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop0 03:47:32 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x62002000000000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000040004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x900000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:32 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000c40)) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="00b6fc663019d9476a25"], 0x1}}, 0xfffffffffffffffe) linkat(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x1000) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:47:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:32 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x24}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa00000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:33 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x63002000000000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0edffffffffffffff7f004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:33 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x25}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa7e254f5773f8d2, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:33 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x64002000000000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000080004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:34 executing program 4: clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x1c0) ioctl$VIDIOC_ENUMAUDOUT(r2, 0xc0345642, &(0x7f0000000080)={0x704d, "4e454261fd3f34f85d96791c3b5fc734bb9a09750c749775db19a263652ca432", 0x1, 0x1}) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0xb, 0x1, "c2073db5d620b6a503b2da95b4e4cf11a53267ba9dda9cb3f59b1ee81947ca781095b80820cc7c61135ac681ee509591392eb72e62562c998d30f3e03b3b34f2", "c0902160a52d8fe73be2d40f912fa6b9d56a510412ef03e43576d1eb61add4b9", [0xfff, 0x2000]}) setsockopt$inet_buf(r0, 0x0, 0x60, &(0x7f0000000180)="75573ff5f13accae58780ec7ee392f1f070d950a364d1f31125efc5c271221dd2f981863aba1c835713b1243b32e1a8d8383e4377546d697af0be62dcc44f8a647528b20b86f9bc0", 0x48) 03:47:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x170f000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:34 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x74002000000000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed00000000ffffff8c004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:34 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x26}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000300)={0x1, 0x7, 0xbd9, 0x39be, 0x67, 0x200}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000a40)) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f00000002c0)={0xd7a, 0x5, 0xd24, 0x200}, 0x10) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000140)=0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000280)=0xe8) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) r4 = dup2(r3, r2) flock(r4, 0x5) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) r5 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) socket$netlink(0x10, 0x3, 0x2) bind$inet(r5, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x2, &(0x7f00000001c0)) sendto$inet(r5, &(0x7f0000000280), 0x0, 0x200007fd, 0x0, 0x0) setsockopt$sock_int(r5, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280), &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f0000000100), 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB="30000000b746b663d173d48b", @ANYRES16=r7, @ANYBLOB="00012bbd7000fedbdf2501000000000000000c41007f64636173742d6c696e6b0000"], 0x30}}, 0x1) ioctl$TIOCGSID(r6, 0x5429, &(0x7f0000000200)=0x0) r9 = syz_open_procfs(r8, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r5, r9, &(0x7f0000000080), 0x80000003) 03:47:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1f00000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:34 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x75002000000000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0a7e254f5773f8d2004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:34 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x27}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:34 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x20000000ff) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2}) syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000000)={r2}) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000080)="40a82cee9a58c4f79523794fc4fa7e4d54ecd4b000a8076983dd1022293a31c5145bba17c37b8d99aa04d6f017d090953e0b3e6508c91a1292d5f11e05b574e60cb4f12abced23aaa0d62d", 0x4b}, {&(0x7f0000000100)="2d1a415329e8413d173f7eb71f047f63c9537fa239b68b2b22b2f5313a693982b37a98837a58ee0dcafe3a361b0016c1e11da6314bfbfad117cdd0c08d3e8f0f40859b5c22cd1bc028453d55d382722c850f2dd133ab8f16de1c2d1f918b1dfd6ab9", 0x62}, {&(0x7f0000000180)="ed604b97e689ca13ffa59316d1efa67dec60d504a8e88d8f843a544e8d58224afad3c8703b36c6bae887003f23eccfda0d62271756c807a2e4519778781c233789654468c6cc7b08ed95557f766345305984d9286923bc0c6d5ee8578d7c49e08d1fba0cb828489f13988602bc022a0c8a56035be2ff38c2e033cf6d9980b13557cab816ac82c44ba0682765499d5f", 0x8f}], 0x3, 0x9) 03:47:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed00000000fffffff4004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:35 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xf0ff7f00000000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2010000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1702.866207][T17087] irq bypass consumer (token 00000000c244c9c4) registration fails: -16 [ 1702.931164][T17092] irq bypass consumer (token 0000000061805709) registration fails: -16 03:47:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x900000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:35 executing program 4: prctl$PR_MCE_KILL(0x21, 0x1, 0x2) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x404800, 0x0) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000040), 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000010c0)={&(0x7f00000000c0)=""/4096, 0x10000, 0x800, 0xc43}, 0x18) setsockopt$ax25_int(r2, 0x101, 0x0, &(0x7f0000001100)=0x1ff, 0x4) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000001140)=0x1, 0x4) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000001180)=0x0) ptrace$peek(0x1, r3, &(0x7f00000011c0)) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000001200)) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000001300)={0x2, 0x3, 0x4e10, 0x3e}, 0x10) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000001340)={{0xa, 0x4e20, 0x7, @mcast2, 0x2}, {0xa, 0x4e20, 0x0, @mcast1, 0x4}, 0x19, [0x10000, 0x4, 0x6, 0x3, 0x8, 0x3ff, 0xac, 0x9]}, 0x5c) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f00000013c0)={0x8}, 0x1) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000001400)=0x2d3a7538) fsetxattr(r2, &(0x7f0000001440)=@known='user.syz\x00', &(0x7f0000001480)='/dev/full\x00', 0xa, 0x0) ioctl$VIDIOC_S_AUDIO(r2, 0x40345622, &(0x7f00000014c0)={0x6, "5dfd21d8f9af82753395d850dc8b82b569c6741edee301b7b85615d90bbe5c1a", 0x2, 0x1}) fdatasync(r0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001500)={0x0, 0x1e, "4460be62191cff2ed2f808234e5a6930e486cbfbbca89a945b0f60df7884"}, &(0x7f0000001540)=0x26) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000001580)={r4, @in6={{0xa, 0x4e22, 0x7, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x8}}, 0x4, 0xecb, 0x204a, 0x80, 0x8}, &(0x7f0000001640)=0x98) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000001680)={'caif0\x00', {0x2, 0x4e20, @remote}}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000016c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000001700)={r1}) sendmsg$inet_sctp(r1, &(0x7f0000001900)={&(0x7f0000001740)=@in={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000001840)=[{&(0x7f0000001780)="88ceba8a3014d07df38820813d7553217d825c94aa88368949fb26bd7293b317ad1da180b1613baeafc3ece288dbe8066db4ce7d6083406afcda17c35d5fb924030539d9798e77d8889e6bb685d65ff4cf143bcb6fcf03989d565fc5425ba41af4507bbdcae8bd10ac5220d2dc6cecb2cd622b93870d5a3de17f8407ffadbaf916d549ef", 0x84}], 0x1, &(0x7f0000001880)=[@dstaddrv4={0x18, 0x84, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0xffff}, @dstaddrv6={0x20, 0x84, 0x8, @remote}, @sndrcv={0x30, 0x84, 0x1, {0xffffffff80000001, 0x0, 0x800f, 0xe78, 0x10001, 0x4f5, 0x7, 0x5, r5}}], 0x80, 0x1}, 0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000001940)={r4, 0x6}, &(0x7f0000001980)=0x8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000019c0), 0x10) ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000001a00)={r5, 0x6}, 0x8) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000001a40)={0x0, 0x80, 0x5}) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000001a80), 0x0) 03:47:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed00000000fffffff5004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:35 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) munmap(&(0x7f00002d5000/0x400000)=nil, 0x400000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f000072e000/0x4000)=nil, 0x4000}}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000000)={{&(0x7f0000333000/0x2000)=nil, 0x2000}}) 03:47:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2300000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:35 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x28}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa7e254f5773f8d2, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:35 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xf0ffff00000000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:35 executing program 4: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x27}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed00000000fffffff6004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:35 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xf0ffffff0f0000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x170f000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:36 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x29}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed00000000fffffdf9004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1f00000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4800000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:36 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x00', 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000240)) fcntl$setsig(r0, 0xa, 0x41) io_setup(0x0, &(0x7f0000000140)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) close(r0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0xfffffffffffffffe, 0x401, @mcast1}, 0x1c) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002480)='/dev/autofs\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000002500)='fou\x00') sendmsg$FOU_CMD_DEL(r3, &(0x7f00000025c0)={&(0x7f00000024c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000002580)={&(0x7f0000002540)={0x38, r4, 0x20, 0x40, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x8f}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x20048801}, 0x20000801) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0xe0ff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ptrace$setopts(0x4206, r1, 0x5, 0x100004) ioctl$VIDIOC_S_EXT_CTRLS(r5, 0xc0205648, &(0x7f00000001c0)={0xfffffff, 0x10001, 0x9, [], &(0x7f00000000c0)={0x9a0914, 0x8000, [], @p_u32=&(0x7f0000000080)=0x100000000}}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000001580)}, 0x0) 03:47:36 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xf0ffffff7f0000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed00000000fffffffb004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c00000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:36 executing program 4: r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x40000000, @mcast1, 0x1}, 0x1a) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000040)={@broadcast, @loopback=0xac141425, r1}, 0xc) 03:47:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:37 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x100000000000000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:37 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x2a}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:37 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e4, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x401, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000040)={0x3, 0x1, 0x1, 0x0, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={r2, 0x38, &(0x7f00000000c0)=[@in6={0xa, 0x4e20, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x719}, @in6={0xa, 0x4e23, 0x671, @remote, 0x9}]}, &(0x7f0000000140)=0x10) 03:47:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2010000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6800000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed00000000fffffdfc004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:37 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup2(r0, r0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x100, 0x0) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000040)=r3) sendmmsg$alg(r3, &(0x7f0000003ec0)=[{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000080)="3e4181b8f60ff6537821065100122d2fc47fe2e3faf6fd4a765f37c0d21f8e7c2dd5f0d1ca763e4e67278f8ac7f21cb1be7a348fcaa33f7b2ff7aa76d3a4e38ea4", 0x41}, {&(0x7f0000000140)="9296084bc3bd767963d41db560d0fc931beb4d8023988b021b282148884d918b2757200410243385a5b086741553b9432ceea1b1349ac43b78fee9bcf9341df0e9e8405ecf4b73c84cfee107397d742dd9a9596d16b3c719c5f386584d7abf0afe4aa78a2f525ad3d9ce", 0x6a}, {&(0x7f00000001c0)="12780deb669b3c585434c6f39b11baf96b56a5ad31481920e0cbe2e6ba5d6a34524a3b5547d4a6453eae1eb221b66a08ac8dbb6cae5733271c20fadbcb83312b03ca80ecd2b5e3a320b1a32b5dd177c1d9123c406aff279de0fce57260a84217876722f0999e83abb5589ae22ad6fb13f7bc515f8c73717a72a434a3463718fb6a6c5cb40140a81a614f700b6194f2dee790c14e4be3a430eca08f3b61242996d23079344b330cda84c198d0b788ae8231695ba3ff6124", 0xb7}, {&(0x7f0000000280)="ef1679f9d8514d345e853aad937da6f20b841ba60e544b88e1cb947aeb7056a0a90eb17cb8f4b912783a3e92064f864e837454019ed8c489a5fa4e23fbeaa1680665eaa0f43e81b443e9e3f556b653e57fb64c841407af945f14a2740cea5cc40fddbe9f9bf2767fd126c49f458ee388330742ee1bd98e22fe7c148d5d6028b07229ae5a78e5a9194c324c17", 0x8c}, {&(0x7f0000000340)="b9c28bf9b1d135c5ed3a5897c819efb484f6d971c70cdbc158ddf49996b4eadeabee824852ef3771d78d70e33643e64ce2171671fecd4e2ee3f825c876bf60b4322107273716b5005063a1db0fb9de700553b37242bf17cfbc81d815d48b3685e24bd409a2636b178b26882a9fac2ee0d6c1abfde74c2e64146352a149d8839c5d5f0fa4f527ae421efed5c48815bb0c31bafda0cd648988da52850b10a9", 0x9e}, {&(0x7f0000000400)="744ef13f2178a823a40f438a56c3c6ffb158920a616fd557a49148ce479476a4832e87322841cf0cdc9a0ae7067bead88b303dc19a68c1f2c04db653a8a6af983d0dc67b98d0106669b966226e9102abd532e94a27994dbbfca7d681a31128417666af07a8f3a5b31896dad646fc6d729290b90f68e3aed3d9a0f3d3216d247a7791ea2bc0783167050e3cb3b694b5c192a9e0b3874282ac2dd5458a7c82946a9538cddb0779dcea50a77cfb9ddc80ae0dec8b5962197f803d3557beb2da8f1431b184ea0398290bfdebd73d", 0xcc}, {&(0x7f0000000500)="6a54ac7d4cbaead33a7cc027ae4a61867bb8ec81f9fb44ebb574efc512c44a27d000a546bdf1911b9ed300156ca2760a7d3d1c", 0x33}, {&(0x7f0000000540)="4c1949299e68af409683aa08d5721bd5f3a82257f0434f65da855ed069e0418c93d831fba4f26c33e42065bbfc285f8476762d9216489d65ad6df55da6d64b15e6f0a2be55c7a1c3fe4759a6ee8a7f6f51e288a1a84c6d72f5df862029338723ec22f3b54acbd26c457a2ea66006a44529a8e89dfc8c308d99e2ec28df15ce1617780de77b14ffbe7d3233573631861d37f8038dc9ad8242991de9c8d597fb8c156581284162a3eaa43207", 0xab}, {&(0x7f0000000600)="45c1b193291d9dbe270e3c954239079d5c8f2807bad9d4fd70ad665e86eea27891c5c5f1060097818c27511621ec9cff6c842bc260ab60f76a9597449e9129ea4e482a28e4db3c668572787c49d828dd5c72f1e27e40ae0fcf4b137b5e30af5e52aa7b099b223e73f3e6c678cf7e1278d586ed7fcfaa828fef7e46b14609cd512d70f1a73b839ceecbf0cf417f7460f2500ec7", 0x93}], 0x9, &(0x7f0000000780)=[@iv={0x78, 0x117, 0x2, 0x5d, "5971df28f3fd743bd49dc14327ca667184decbbba7972eabf717758798e432a23038f591deb33395f7f844c784fe191366e2e9fe5d2e932fe614368483a7e393ab78726d1d65a0b036d80a395a9dcebda66d1670401eb1ca572d9e61bc"}], 0x78, 0x4}, {0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f0000000800)="b120be95dad06129ffc205b512e6a86e444a3b386665abc0f77405237cae28d3f31606403dfbe05acca71fded1e1d618d9cd390af72cf7153d4a3721dd12a9cacd4f86ae06d8ef36f0ea74ec2a01d9d75e05f2c82415788b57380362f2278a3563814076f2711fb4986cc1a9db27ac0fb59962ead3870786f97ce55e1931cc7bfb5e32c05927fb90d231d95104c169328bc74d715ba71c2b49aeb31518a04125bb1de3e22965687418c340d463ef1c4485902087eee7eae28f7aa6080789d49119b2049fa03acc77dc34987db596c5fbbff4c028cf293f6c776b4df78747a5fb868e17a65c42c89acb454841196dcf14f3b1b696277ac98e223e92bbeec6bc5fca9d201c3ab63f0909615e11f4cb661c4f3943abb8cd86acf4d12f4a2f418d0975e99065e04e02a74d27019f0668d707e8c12d1db84ae25b6fcc659c1105390c4a60eb7002fabac1c2c08cd13ec7da7f62c8dc9c138801309894d5181f32961d6aa4c7a35c4e32154a7f4740f8356191d3c010687dac4bf3b1091a280862164f87465f27dcda879e0785a437753a1d687a68e25e82bad35c883dc67096a353931dda10779a3f825891ce212c9261786a03178fd4c4a8a61684e80f534fc11fcca3d73a9b908909295583606d80d608e609ee39f11e6fe54e06cbb2df2efca0934ced64b2d00baddc5b425b1d3907bc05eed69cde3bd1451f38299eba204261cd882e8653586aa293f494c27087a96d548d76943891c14f233cac92960685a91a50e5303cef805184c5083811342e9ebb9ca4cfa49b65d2aa8be0d37a1273853da898f70528f1a4802a2c73d3b3814557bd14b7180e63b7afadded4d11731e38c9f205eb66c75b100f39e49e7ffc8a0da67a6dd2d08080e298950a3c3ee200854a8d9004e645e07189bd1e7ec0ade7aef1cc1505754d3f0c5e83fa682491f05eab80117e93771f0c346fc2af1726f7ab29910a2358c12cbda91943114531d97dceb438e8246e45c3e834592eb7bfcd0d46506c20e22980f03a63be2799e4c5204443cae93191a00b780e01db7a0982f2b5a995fc059ed36f68b0e5874bd7b2d7723d1b8c544a3465ee379fd02a93c86e65ea8b5743b434d320d9b9ccafa5b3a8707911534725e382b58d52a482dcc80690e110e00662fecc9f01300bf58d9292449b44a2ce764ff9defd421ede7e18879ee5e2f1e80f180c7bebce8619a6fe010f5de31f1cf4e6dc1110cf0c99c7e4d33c5e2cc1684f321a6d222e879288cd116c3f80cbe7c0ab05b518befa92bc628f115d5f7b99846b976e5016ef9f143ebc44f073153520f94b2857511e549249e67b3959d2b7139a289581b154924088ce55660b3ff83bf281659d8d52949b5ae6b9cfcab0b2e92d70e479e6e9a4d914b581bc52e9ee9aa3617894a7257b4bcb5cd6c279b314eed7688f44750b35af42c4d056b11f900dc46c8c5ac3aead536e5308fb3a67d6eeabaca46f3cc4dc3c9082abd994346fd446ca2b56e091ca002414476408334a457ad3ff70ab45945cd5fcd5673c3df0c130b480b4b3039c615df17fae69386fd2d8437c78e8f422f48af10a774b288892285755b812d6f0b07c46d868916c2b21e72aa6da4a2f64e46989e19f61ebb96d678e7ae0a331da7c7486eba939da7234eb53c3b2405011db103d0890dda1fab3dc7e4a358d4217a379ba9d9062040b709bf42915a4729162db03d88114c0aa0223a9627a1031411c5e3f48b348dbc0791e8b266fc9bc449520956449d4a0f6935aa73df2f8a7879c88067196b1c8272d96f1f5730ccbc76b9a76dce8410d2a33fb1bd851e38c323d4a6c65da8a09e0cccb7d75cf6c08e076d12d1731d35ed61ca293d0fd8de474a949d6e3080a866de0d4712de97e8a769f307868025d49d4fa50e2d1f14c254f174f9ba67b5341dcc430a965763c0edb4f48d02e9b3acd829438b67b1c591397eb62f0eb95de8edcbd6549311f84b28ca468fcbff9cbe8821eb4aca7f97ecd0c2cfb0a7af27f685ea839f68fbaec98cf7d0eb912305bf840c22eca4105d12ede3a52af22fb92c5a102b0485a08bba6e915a4890870af8f08e24cbd04e8123e4a7646076205428d0fdc2c80cb8101a2ca1e3dba6ed98f20ac7b7ec393e55a6c78a72431f2c3c57e35623ac8f744d287cbc648dcf6f4bbe6e92078cf494691516e015215a036caf810c46c809d99a675dccb0b9fd2610a7235d34e211af32200a43b6d8afcd1f29637f39d870dc7e732cd995edb8345e1f92101524d05d51ef9c631ec074ad1b56228ac62d037470c81c491ec1fe2578ae34fa120bd043914e95249a241cb58f301ac3e30dd25b7d13540387e1eda7fca4e63237790a011a15ec2a0c8b050c83d063dfce2a41d533f1329d229d061b73060398f5ccabb42be890a2d6e7e678b68bbcb1905ab333a09f413693b5d266e241b57d96a06007cefbc57655c8cf1a9dcdaa0f00ce3874f178722a3f03796c3f0fbfa776aa7616ec2dc1f3e95296398a4015587cf3285e4357c3788e43cd2d065b02201d074fe8496ea2b4580e66d6908b7578514a1d4edc922c439153a96c4f764fa346dcefaaddae7922afa54531b4cdafb445e7490e4af6695c4d0d1d4c182f93992aacb79f67f6ecf459fd072450e1916b7f347c00290e66560a8c8ff8beeef9613b83b221ad33ebf1efe41fa7c516ba01b1e968c704205602366b9839ea7d91e4ec211dab39c55de9a0f6116d506383f37a4a57a2e9c17ee032930b2ae0201f08eefb4a569788e3a696dc04bb4f91d346a38c230f74199d842fd9d19a248fb5003df80b79c4da1ef765a16e2f4fd00c8bd229b15953f6c50c0620c86bd926ee9659ca4ed061c13b41dae6b3a163c4fa4247dea525e0792492df7a759cf80e4c384420048570313a68a380728659616c2d25a3a8dba2b8fffdfce99571ce801a9a4322989f71c03990a40773fe951f74126c5295ffc50a505dfd5692dd23be9466a17f259fb41281dc9f6d3959a3fb85b645b92104c8e4b35181296d52e3bf7499f873c9e51640ee7b77658ffba73ffa3f2a455d4d890a009babec0b304ee973efe3c2999ae70e640ddbe539b7624efccabc5dfd9b1e659ef2d7592a708ce27398184ba7a99186259da0a641278103abe536f170ba1eb4d1016895027c6a848be55173cfb45d0a3d38a94b8f60ca3e52990d0f53898c19dda6d852496bd435024405dc2acb6e4021d2970b2d4b3c3c05bcc09ba081c1935f5ddfe10126a8665df00ff293d10e711bfb7ac6f22c27b5c0dc92f854a525b267cd1e75e754c80edf02cd86ab76d6682f55c6cb03323e798f1a697c978a17e4eb78941e73b30e54c7eabde369812d87fe39af93901c1d3916105ac9de69f6788a0f1f6c9a40b5a51ca3be95a16a726a980b5fe800fdde5937c6e316c2a577428380ce21d2de72f7e3411c19ef3bfc032caf40f01ebffdfe9db9d72cd0e490516bb21af83251e6f6e7267773fd64920b5af8f0de7e7b521e4ef2cd944cd1b7f7dc30292f9eff167b65e769e9131dee09a5c0e6883cc89324853dcfb93ad3d5b40d74a341857ade5c223fba2bba8c4fea037e9ceac099ce57297d8f5c7f148ded205366a3360d6c5b44f4b80af1370aa43af63ae39c51b77bac007c320107eaacf64bd44b6017bbddb5fdd49e71197f44aacc6f8da53625d59ab12b7fe0fe6d9c7435768e37dd582c0fe9e5b74df94b5325c65f47bfd67708970ec962094afb5219ddb4242f892b6a715b315f4f4e9b30e02e8f91f3f3a222d3424766704423726895f4f559cf7ef9f37be97cb53466b1d32887421f68fee6094f94b119b5454c602a06d2ce417e91653f38fdcb85f6122d0a1f5452d64d6cac2de09878c548455cdb225d30613ac6b84666977a6211a6735396b92b453f11bb8f2cc7369c27eea550adf1b88bb1071469ff695322e239c2e85adcf8e8c8da27df9db8c7d9f2eedcdad7c75b4c7b42f041c83706109ab38ac0faa8cab71018417be628c50febdba6a38b3d6007d54361fd744be75f1128e49f9664ac2b550e76c30d2828fe325dea831fb8f9796c27199f8e564b4e3f8f6f0b41a3da73195ee9d08486390f8cabb005a7616d683dd5f8a6005c3417bb174d94a4a750573eec4604538505750102feffa476e6bb028124a1c8f3dd46ac52c72e61f82897480d135df78006cd1851296746fbf52dbcc5d1c633fd33463c43850fbe96efec7b95a1bf081666c2fd81214c77ba95077c69106ac28202ea30e151bcc3225a0fba728d9b5c293df1a59526427569989d3c2352d7a91c0233a0549ee641cbb1b5894fc0eb96d04de4734debdde18c2edfdeb0019e529a1d5ae44de6ccb85542ad6bc935bdd61409be0876e3b4f098a8e1327500ab64f945b319919c8c2bc805f32c5b8031b7af1fbc141e9c88e11cde8a87784d31efc8b577e835db876ddf51c8d095a4a9fc0d6ad93c5fe2d5ae77b046cf5e53a2db75bd43b4c7a1ebe844b225e3e9d575d802631fc4b16222df05be0c35f4ea1ba2c49e85b9abcf6d8d49ad0b919c335020a8f24be320883dbc98d581c458f7f914457952203e1789ae06d26d3654d39a293c472e9856213933ed1f1a57ecf0d21f576502f3deb0b1de6aae37294fab58d132c6265d987646b11df2d808aeee7617125ea3a378beae8494d196844673e688c2d2477f007ea4b9100d2f47ee8ef9e9625644f6a0580b3133637b4b8adde236ca5f66a04129092ae9b77c74230f9c5451771b647cca7a6d1bdee7f2ee052d729a966da2bee24a7de354b7fa40c4809a0bd102f6d607f664da04a765ae57eaeab6a1a865c510b34ec92ccd0ac0d76de0021e058cc720dc7d792fc15f11d93acaa085a91e5a6a2d29484b876945e749c1c0627547a851f8868c30131aacb7f744cac3d1e2a42eef2686c31933ab3bc2a76cf731da522cc9e0960cefdfae297b804d5406fdd143bfea1c6f0f422ffad4f75e530345e6eac5e084455e069ef0435824cd6605f1de5428c526b0b94ef0744bae79737825c6d83fd9b43be61c0be5f71edf76f5cce005a97ac28e5c560da6e4bc090e8a05103c3aa8fd88c5e8ae9710502453c618edcfc5c63adfe55bf5a06439b59048f1fded2c85f972ef02bf6cc592431cb08bbe40e305b91b0b45c5ae4a74cd36c141a524162f99de07bb2c5a51e8ef444fe1b3e88393b9e257664caa85071185f54c92c80991779796407eae82e9c1277c707b1075255b62375fbc3d3310549e3bbbe795f52f3c77e2e9769ef8e07c7694e43033146416b88c68dda6c0f942ab07bd2c9cce774f93afd85438cf11453490bd27db4191dddc4d335004f13d9008ce9ebd2c039c4253f918a4d3d75b7d18b5a708caca9f917b52f1ba9308f7aa8611d45f6b9dd5d1b74dec9f111d3df95c9300638370145a7993dd16202b717000b50c568e0c7be7f9e230f037e22ceaa264ab3e432a5ac35575b5bbceee7652173276c9cb3a73fe642f90b3c7d32b5f1328be38af0a1e5d0120dd78d77e2335e6956f3942d5b59c3d617e2c4e711cbc4d373fe55e35245fe0cd95b415bca72ce6e5a7ece51be60e056d35488375e56eb1c61e55bcb2c00eebbba6dcd3fff90426a346ebe92c530d4e503c8c2fd8ca7df65d1e0564794ae636b8a76a10a9cae2724c9bdb950d190b7b67e353c85d61a1a77017707a65fb4459548745353bee17d2fbb099a55470533ded276d1aa576e7af6338cbe6754e24ab98e162659339d0c4c007a08f56fbb3ab270ae8fe5ecbc88c2b40c486f260ef", 0x1000}, {&(0x7f0000001800)="ae467d156ed4aec0ca44197d043a27bd59966d7f776dd2f9cb40ab7b8b2a28dc04e895362f30884f711fc870b9caf365f914f3bbdd570910caf1906123b7b32005ff764c9ed838ee967788bf59441e2cc36ff55e9a2ab37574e3bc9743f8946f25100a7b2a4652477c200633ac24c97c2cc565e1fbf3ffd277b2ab56c6f46163d5adbc2a75b6a3c4", 0x88}, {&(0x7f00000018c0)="ab32fdee7b12a1654216b5b16186ceefe66e199316ebd6a3a6013e3802421c941228edf2e401bbf9990f325400845e28c7fb63e2b38ed9cf6fe797f303e07a0bdd", 0x41}, {&(0x7f0000001940)="d336c81efc15934276c10fcbb0d38a9caa65a12af914236b4acec115b1c607940e805b4610af65a9f13ab5f36cb33f1405b1a9f8a077cf4a57dd93fd41f49eddb7c17e58c349ff91d69b0bd5f759526e78c14ad4fe88460c8f25cfddedce8442ccb0db43124ee5d791193cbf59eb0bbbadf9010b9d42ee2c697b68c7611970a45231223c6fa932d99b71078ce338ed22344ceee1665f503709", 0x99}, {&(0x7f0000001a00)="a491252884a6073cf51d8ff2918ba67bc98822da854a1b3bb8f82d69c99eb125aabbf584152aa9d81c3e9d75db73159f9fad53db665291c59b28ac24eba45c838b24d098bf645cf35ff4397e1d607840f3f3f583a7fabe632680f4da41e5", 0x5e}, {&(0x7f0000001a80)="cc69982b3703be3e20aeb549bf923a19c84e8176a635c22322b8da2d5fee63d9fe24c729d93d6ca8f0724170af480cfce87eaefe1f2a25", 0x37}, {&(0x7f0000001ac0)="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", 0xfc}], 0x7, &(0x7f0000001c40)=[@assoc={0x18}, @iv={0x100, 0x117, 0x2, 0xea, "da63b0ba18c3345bd8fd85e3af0eca62caceb1419d7ef2303bebc834de1f211d351c5ceb0bf88202d8bb713a47a050b4d1f1de7cbd60d5df19354e9a8b4ce4082d75e5007854c5798000262e14dbebb11a17c74da3f844a374c50c83edafbd554334bbd2f17281aad52f8dafb683dee28cd86cc69fb8f69fe0c06fd2269dca6e1186b209b04e8c51fd38f7a070ad013f4f2881d5a4db1a073c6bba9c82902bba07c047ac50109fa9ce12fd13dfdf0de60600cc8db7ae4fb0fde527192e0585ebad3ce6c50c65f6ad99d70ca1b931330ff141bccba819988c82496503193bb101b042f717b0106cd16aa0"}, @assoc={0x18, 0x117, 0x4, 0x80000000}, @iv={0x40, 0x117, 0x2, 0x25, "dda8a185fdbfbebd80daf8a28a519f10f3dcd8a76646d5fbcd364e2b6d815e6e1d3f442935"}, @assoc={0x18, 0x117, 0x4, 0x7ff}, @assoc={0x18, 0x117, 0x4, 0xffff}], 0x1a0, 0x20000081}, {0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f0000001e00)="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", 0x1000}], 0x1, &(0x7f0000002e40)=[@iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x7f}], 0x1048, 0x40801}], 0x3, 0x40) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000001, 0x30, r0, 0x0) shmget(0x3, 0x1000, 0x201, &(0x7f0000ffe000/0x1000)=nil) 03:47:37 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="f36e0f20e06635002000000f22e00f30f20f1024660fdb03b894008ed00f20d86635200000000f22d80f35650f01c90f30", 0x31}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:47:37 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x200000000000000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c00000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2300000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed00000000fffffdfd004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:37 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x600000000000000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:37 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x2b}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:37 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x640080, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [{0x20, 'posix_acl_accesssystem%nodev\x9b%{wlan1)vmnet0GPL!+userwlan0'}], 0xa, "93ea6b9c1f80aef030b463328568622a2dc01735609fd5ea3ef346d99e0ce0de9ec7f50241a7f3d36e1e031d26b31fa4ed917989276ffa7fe9b33a128cef4032139e58eff9074d8bb315daceced3bf456d513445f1095a1d8f81cdf215f5ba3f295521216dfe2472e9f6901178e9ac643589cd2ff824678c847179bc67fc1e75dbb8c710c38980fd13"}, 0xce) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000240), &(0x7f00000002c0)=0x40) 03:47:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7400000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:38 executing program 4: openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x6, 0x800) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) r1 = accept4$unix(r0, &(0x7f0000000140)=@abs, &(0x7f0000000040)=0x6e, 0x80000) openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) dup2(r1, r1) prctl$PR_GET_THP_DISABLE(0x2a) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x3f128139, 0x8000) connect$can_bcm(r0, &(0x7f00000001c0), 0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200)={0x400, 0x2, 0x42b4bdd4, 0x0, 0x6cc, 0x1000, 0x8, 0x8, 0x3f, 0xfffffffffffffff7, 0xfffffffffffffffd}, 0xb) 03:47:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000fff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1706.015376][T17363] QAT: Invalid ioctl [ 1706.081260][T17367] QAT: Invalid ioctl 03:47:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a00000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) r2 = inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0xa0000010) inotify_rm_watch(r1, r2) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000300)=[@textreal={0x8, &(0x7f0000000000)="360fae08670f01d1b8c80e8ee0f2a566b9af0300000f320fc75ac70f019af5ffba210066ed0fc79e9c5ebaa000b80118ef", 0x31}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_CPUID2(r5, 0x4008ae90, &(0x7f0000000080)=ANY=[]) ioctl$KVM_RUN(r5, 0xae80, 0x0) process_vm_writev(0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x0) 03:47:38 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x800000000000000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:38 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x2c}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) [ 1706.363511][T17392] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop0 new:/dev/loop5 03:47:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4800000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed00000000ffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:38 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000000000000000000f0e808b84a9cd2a6149bd5bc44d76dded58bc8489c8dd6a045d976272345a8c96f14ed05abb15ddf3b8eeacdfe8a8f6a01e82c488cd6d2be9233c48c1a3801c31c248e5453f08e63eae01cd0fdcee13fbe1b338ce89824b93b6375829b00e2df187dc90547d77e382100000042bcd18133f414cd7db44d498c66da1fe008971acdde66bd4e0704d62a024de860443648ce7e4a221a6ec160ab15b4ec7ec79c108b8e0ee8f82202011e0a554ca6b1c88b134b936dd66136"]) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x2, 0x101000) r1 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x6, 0x0) syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0x6026, 0x8000) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000080)={0x5}) 03:47:38 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x1000000000000000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:38 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x2d}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:38 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) listen(r0, 0x200) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x4, 0x400000) syz_open_pts(r1, 0x4000) listen(r0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000000)={@mcast2, 0x0}, &(0x7f0000000040)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={r2, @loopback, @dev={0xac, 0x14, 0x14, 0xc}}, 0xffffffffffffff43) 03:47:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1b123c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="ab553fec94", 0x5) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup2(r2, r1) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000180)={0x0, 0x178, &(0x7f0000000080)={&(0x7f0000000100)={0x1c}, 0xffffff12}}, 0x0) recvfrom$rose(r3, &(0x7f00000013c0)=""/4096, 0x1000, 0x0, 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x4000802, 0x0) write$uinput_user_dev(r4, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r5 = request_key(&(0x7f0000000980)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='\x00', 0xfffffffffffffffe) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, &(0x7f00000008c0)=r6) keyctl$assume_authority(0x10, r5) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x0) r7 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x2, 0x0) setsockopt$inet_tcp_buf(r7, 0x6, 0x1f, &(0x7f00000000c0), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bind$alg(r6, &(0x7f0000000900)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-avx\x00'}, 0x58) write$FUSE_CREATE_OPEN(r7, &(0x7f00000002c0)={0xa0, 0x0, 0x2, {{0x1, 0x3, 0x4000000000000000, 0x800, 0x18b8, 0xffffffffffffffc0, {0x0, 0x8, 0xefd8, 0x80, 0x5, 0xfffffffffffffffc, 0xfffffffffffff862, 0x3, 0x0, 0x8900000000000, 0x2, r8, r9, 0x3, 0x3}}, {0x0, 0x3}}}, 0xa0) dup2(r7, r4) 03:47:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c00000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed000002a0ffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:39 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x3f00000000000000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) [ 1707.131676][T17455] input: syz1 as /devices/virtual/input/input25 03:47:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0007ffffffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:39 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757070637264a5723d2e2f66696c65302c6c6f7765726469726c2e2f66696c65302c776f726b6469723d2e2f66696c65315c00"]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod(&(0x7f0000000240)='./file0\x00', 0x1040, 0x0) 03:47:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6800000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1707.518546][T17493] overlayfs: unrecognized mount option "uppcrd¥r=./file0" or missing value 03:47:39 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x6201000000000000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) [ 1707.565924][T17494] overlayfs: unrecognized mount option "uppcrd¥r=./file0" or missing value 03:47:39 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x2e}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000540)) stat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.evm\x00', 0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000080)={0x0, 0x9, 0x2}) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000240)="47ed84f396109c689490c4d9740bcc4c38df6549b2a8ea2461c5f3b311911c5770d6a5dc23085dd0dfd72b669f411ad83820c3e0c44be199513d34b24968a4e35ac18d8530b19ab04713e6f95a956d4d7a678c94b3f7bc8b9d9c27d7522c32cbcd8f42682ebbde8ad19993874b4a1f45588aa6ee532d3f14846f18a7ee2bbbdbbfd4067c6409c5", 0x87, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r2, 0x6) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="10f9ffffff00c224e13e71884e290000"], 0x10) 03:47:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed7fffffffffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c00000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:40 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xd805000000000000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:40 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x2f}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0edffffffffffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7400000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xd2f873574f257e0a, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1708.483057][T17570] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop2 03:47:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf4ffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:40 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xffffffff00000000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0002000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:40 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x44, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00634040000000000000000000000000f85ba9e32a02000000000000000000000000000000000000000000000000000000000000000000001012b299f7d4c5431e43405901a4ff9927555e68dbc96f1f603f97d4227f07d06a30ba5d094f50227e8bb66de9b6e479cddc0642199cf019511c9fe29471a5508e6e550cfaeeb5301d3acf44446042cc9a63c1e9a67036feec048657221d0b8619661ee2507121f15aeed8be06447497f4cb32a915a361544feb146a704eca80a0c18077bea6d9178ed4917cadd4bc13ce48bc6dcc1435801ba1043fd61d4e3eff2e5e723a89206d4bfb9e0e"], 0x0, 0x0, 0x0}) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x300000, 0x8, 0x0, 0x20, 0x38}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0x2, 0x8001, 0x9, 0x3, r2}, 0x10) 03:47:40 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x30}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a00000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf5ffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) [ 1708.883191][T17611] binder: BINDER_SET_CONTEXT_MGR already set 03:47:41 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xffffffffa0020000}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) [ 1708.940317][T17611] binder: 17606:17611 ioctl 40046207 0 returned -16 [ 1708.974748][T17617] binder_alloc: binder_alloc_mmap_handler: 17606 20001000-20004000 already mapped failed -16 [ 1708.994015][T17611] binder: BINDER_SET_CONTEXT_MGR already set [ 1709.000666][T17611] binder: 17606:17611 ioctl 40046207 0 returned -16 [ 1709.007514][T17617] binder_alloc: 17606: binder_alloc_buf, no vma [ 1709.015617][T17617] binder: 17606:17617 transaction failed 29189/-3, size 0-0 line 3035 [ 1709.024186][T17611] binder: BINDER_SET_CONTEXT_MGR already set [ 1709.033672][ T17] binder: release 17606:17611 transaction 20 out, still active [ 1709.042122][T17611] binder: 17606:17611 ioctl 40046207 0 returned -16 [ 1709.048883][ T17] binder: undelivered TRANSACTION_COMPLETE [ 1709.055160][ T17] binder: send failed reply for transaction 20, target dead 03:47:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0003000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x0, &(0x7f0000000100)="025cc80700145f8f764070") bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000100)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003400)=[{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)="60fcd8e49326c23ff36cd727f543457c72f3bb2c6bfca9579b5b82818792b37992cd099ffccd0708d05213ae8423e64442a119244dc18f8abef538be3de1d2b8fe7fe5629797c8ea54052190e577d867189d201e9d6db89195a6d6e2a96910929602e0f8eb4334fb8b0446918d4eccef5626adc3a50cfffa0a6f0ac395c18dceda26d2620518b89421ab8686754cf62d1f310ab3902ed21fde1d8b5ced5d39a70e8f62f7e41c70b6d7eacccbc411983ab238b50f19e2cceaec97f55faad53d0a2a439085cf9a7293b6433eed5529ab36c8924f8f817192e5ae92e227d154a97bbb95c1ff7d1b2afa8ee3b2f87181f17ec9a3", 0xf2}], 0x1, &(0x7f0000000340)=[@iv={0x20, 0x117, 0x2, 0xc, "91bf32165fdab5de0294b898"}], 0x20, 0x4000000}, {0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000500)="f6742099566ac1c02fb872ee13131e76960b94d1c1ea1b8532f383d44e4b164ad7b3d7fab65dcb63b68551374de165c5477bf8ac8761e55a7d4e658f23e54a962718aa42d85ebe7c36ba16cfbbbf35dceeefc6288a9628d78c87249c0b6283dd25c20501ace81e80db7fb5da4b19739b9d873d812074617c07ea6d42c7a4d2cbad3c31c3cdc62b59b92736c31b3a11a569c6be181f7a1fe271967347b7d2e8bd0603019afc5d7b7662556a3a3777ac4c4383b77251410c468bc7b688fdbbe0b2cc77ea728b45e594c4a6b7c1d1b5729d5f90b3cca4148eed9dc7daa4a3be4660fb2fb190f38e18197c80e182aa0337ecebcf1121d608dc0d0a417c81e71832e78f8a40ae8ced1216d6eb046333c3f2ff09a70c014e34a41e6c1a0c6e63ed690b927c1232d635ca9a88562f39537cef08f8ed4ebf1f944961fa3ccbc64b1ee8b6d537295e250ce70cca6f18326b331ceab1430a0a3eb14351a3f9f9093b92e62b20336c391c45c294d336dec0f78de40a70d83b98ceb6881b4de288852c5ec7f8be83cc7f233a98ae3d97752b37ff6310ac80f53043b329c3f181118ac83dcbf71c412dd6b54098bc4f2a2809ed8eb592271796989cdc5666ba9650f63f7d09399a10730e99fe04b2528bc1c1f7087e76735a46c5995ea7eaad7c3ad96c583ce8e956bdd3fdaec71e1c6fe7b8c12e1a34be34d6c0205586fc35ed36b86d76cefcfe840ac4598b17f6f0d62c6919dc77dcbdcd956bf21c73e1b1497ebaa772b04829b4ded5939dc3258fffffbb0045153a603bf7cec8983547b5b251be1c0574608ae96c186222fe069025485c867d3448908a162bf3dda5f2a45208d129011f125fd1dc60740071730a15e70d1c5a087c36b4052e2438cbf587570a2d0b0dd7bcbe48d3f2f59a1a3fa09e19d66692240e73b62f54e1089416fca327991182968a2857c2cd8f0130607d0751cc49fe19b9e7e36ab86ddd17254474c6336b706bda542d184280bb5c31e670709c0fb318a6c1d7929382fa7b0b9cc0ce8966cad32cb2a41e138cc4b86111e34056147efda5aea86edd4e1d9039b590b69e8baaec2037c0cfd31e9bcce851a0286d301ac21280b6f65c0566d1a2bda75f2924f98e4453a83f20b1d7b13787690a5070190f10d8dd8183e9228b61ed6aa3a37947a6106a11cceb5ce0b1b1c79635fbc154f260309b0b42203f2f08480da73074b865c4d2d139a21906f37bdda8b53b951c0028ba6cd32a95181fde8e17834afa86659bf949e6db63eed2534cb6905ea9fb16d0aa0d07f2863efc157b6c6565f44f48f9469d155560c9155f8515d592cc2d6d47cd3361017ed253d35977118d5f302939ed541c86fd3072eb5b2334bec0507bdcb390c5e7f909d6aa136ff59dfad6abd72a8e57b5cd1ba8b8a312eb0588c9db80aca7d561c6b588a9e2236e0993df7619e7dc7e241de7d9e063dd99a42c403c1337ce586baf7402877ea29668eb39535d22f3c48f5b0919242e7f685732a370029e996dd87f59c25fb4c24276a8ac01f96696b07e31b140a7d1d52265d1947b654440d1ec40e2dce69ffe4fa3729051f0e43b6065cd383620df7476c00dec952391673d2bbf8ce7a4c55c635cae456429dd984167c8593eafdd8ed2849010c1c5d7f118ae73983688059d75ad641e5ca1ba16266a1485458d3ac4c8ece22997d9845cc8093205bbb9b18ee7ff93ec40cc19aa94d602f0455de841842ee767ad60eef28240bec826f942665040cc980c3a248682ba81134877492d465c2f1fe51f8e5ae239be6232a55ccaabfc881f5403d76f756463f61505b134f0b807ad995dfc5194ec02340c1e552a110415981a91405011d9270ca5e9f7ef3ea61c04df1535b4864789d615b6e4fc08cf2206cf22a7bdadf99d37bad342f51857f5a552afa1d573ff9cc2eaf6378873ae0fbeb5b3251314ef880dca2e87c76c7fbd35a2d1a6db9766cc9fdbf4c73f9e9aba9c30e9cbd187ee0370c46f0dcfacd376bd553d065e1b2a8954ba2c1980314ccb36202bd7a3dc748f254afd1f3b993602577f8c3dc65846aa448d8d9ae2f43da548ee69aabdffe20f2681986267ca7c1b9414fb38ecd52aef21ced3746c8c7fb44d03a6aad5cee52e911b72b0d3c4fa3be269b6472c7909f97e28c3e3ae923bab78192bbca4af4203d4c1b7ba325d782af56722373970f436b6c96f7cc2c14fe831e787b118d8911c742068418ae8d2549174cd2105370ae2fdb6b859ed8c397cc7dc09a38d6a5463328fb9c8d0029199fd867cca7c1e73ae25e09df7b1feac376bbf398c20f990e676a34ed3d12da0ee4cd1ed827e7fc3638b9549d01e3057b81193c4c46b6bf270e5c309732f96d03d2a9ecf8238a90647c5cf79315046548077b7bcd3b7dd4ddbcafb8c013ce503e0479b646ca9901d576c0ce9fc6ede0bc6534863c89d2b267fe0646d0210a2012a3a6c7fd0e7e9be6ff7cb46f4c5c478c280bef29379549e832dd1ab6146f01d8f7612da97c284427e6419210f25812919978424cc6d968d8e3e0b6388ac9b746442519d8885aee248be8e7345a231f1646bc280cccb0f72e57c13b2b101f0a9b79692d5793359975a436e63ce92cab46a61cb9953a4bfb91d2b7400e59f49bc5862e76a6385c728b795d7eb8474cd8ab0ed015eeb3fe0816ac32a91d1e7690659d0c8bb8b200cfbc5f394f879e5d5423908dd113d9358a6d009748c380fc44c5c9726c8784bb2f4c9869ba8057cfeb9d60d4d458c2f31463e0199126e4aa73bfad327589147b7790fc6c0331475eaf5c196fbc1788099192a229a93b169ed9b406825ef3f5f03f7c55ad52baca0ab5c9e5b23375058d6ec2f3466d916a1993a3617bdc550afa4ddf23e5aeb2c9393bc53afa1ea7d74371367c862395ca85c84809824c1ea25b441d21ccca5457ce940bd52acfc5b8867be09c957f0db0f1f4d857966fa6da2f5ff94b350871f3e80a5f6ba3d3daa4819872875b51e36938d0697d41713c5ccadb93745ef58af77daf534728ea30f13c7cafd794c921ee1ecf780180f38985c3416383433a7549236523740577ad463b2296fe55bd58262b72ad4aed5ff17749d3ba487c1ce7ac548411438a1c956e2a01627583f6479080e98b75d8917c1aba3e06c1e9e90c46cf6dea7b90db3798bd89defb21594044116d94192837d40f744fda4c06c6bb1e2c0a5acd32ce95aaa5274dc8963495b4371e8873c2aa670fa5f1db1ffad982a5df519b1edd4917d2efd80a8eeca5b2711967304ef140e930e918e7f73b25fa73bb422d7c9fcec5f154c33223789cfb6e77e137b29d27ce44546d7b5d4104cb59f88e1ce446bf974c240792c655fb2ce105b0f1c0994d4ff2e8a97ec4297c544b8bca69d1cf8e4805b5a3cf842a877044aec3e3786101628bdf510888bec923550d351624298dc04a7ce19934be6e4a8453bede8ca16d1ad2dfb0c6cde4829674c16228ca04729a3d72dba661987a66dc382a1a3fba3054e1d0b57abfe44c4d84692be85b8bc7557a12d0da396b06f772e724faf6f7598d485869d9083ab8e79da844fe11fa4c010989e1406194da47a752e1c3dd39ca4350d9f1cfa783269c55afd48f6d581b7d6a2419d1e4a121be3d299efedd94665d934a70d476822ded11207580affb18c8e2c27bcb11a0664c895d7f58afdb83b4c630c118df762367061441c6e9f6123d5ba31760b1cae26ed4fd9bef98c09bca9199f32b787508b4561ccafbfbef312483742f1604f7bf46ea03c3d3fc2dde20a359d2d58c5e7edf3ed8ba991e3826c9f907bfed9e07cc8a2549e59cac83c067ef9a663cce3d3062229eb32a72507c119c6b5248222fd7fbcf452aef6a4b30cf6509065005571361e47b8b713329eb21816e708d0f89063a6c53e13d794f154d18cb86541d73e0402ad80aa9006e949fc86aff683eb592df0310558feb71fbc35aed4429cc7e7c76ac3b74255df9cf287d523c67539ddab71d3f2b4a67fec43637982adbcbddad688d9b040a9fa8dbff0b1d197c05cfd2720e7eb49eb8d7df183d32acb7c1d86b846893b84c9b7e613e69fd7e99bf040be79e14acc599946d11e34d7e376b8b5d884e3688babcd1e87eaa799482182e2789ddcd5d19ed3cc8720dac5c16413ae232f22c314063caf3cf85668bf64e2949ed5720107d3646066b1e56731d3ea2c32672a366c9d36c2b1c8bf73d3c82c95a2167e39073b3cfa06efa35ea26619e74138789bf0cbef893468518c88a7a9cd75810b86f03d2349c7700e267094bd8ac5b37916a1556f70f5fca0a54bb128bbe7493e9b6974a7d89777f7921cd4cc15c17a075391f945e0c29363693a5b236e548aec645a3ef8e5eb10922ccfc4b9fdb5f20492776d62f444e4908726446d2c5204fb2960b01e926144774f621b6beb7601a436cd68904e8e8a21e830e4c9c2002e75a67957655c1c2185bcd162ce5a0618772a40a1da511c735fd2f62d88d498aa1dd25565f133f7bb91b4e0b04361b38ba434dfd0505f5bb4479677dc6b7776b807174e11bf78fba00568f5b6c71804ff1a8f70a734883520e25c734d82111a8141e830f9a7f26cca68f22b5a19b7da03e32df8c52f4f433d3294bef1e20e55e274b6dbb2a8d19369057ee54d8f97c1630cb518d4bf90e858ec0d005010852d1a51d2e06a9276efefa303722f852fde103570438e7b68f15e2d1b153ed14bd1b5ccb64936ad52d61324c86990cc5a8d9c43a3788cddaafe01f79bfdc7551da37b3017690c5eb7c5d09df6c9fd82712f0085a6ba6799688fe7f46ed24e7498dca707fd3484884c833c5e6484f8cc902cc3e5b8fb58f358e3f1454b310b4079cbda0b2bd0c08e1db496f50c8fb3085f5d725b5d7c50f2b024a88d28743dae6a819a77ed1f6d4e41e32ede1312946223befff38be105f8d35e9b77ef04e6f78592e64ae6e809ed06a66af7c5d22b035a95fdeacd94fd172edc1364b013ad3d9255b7d9b4cbcc92b66f1d03f4f9d29f053e78a589bd1762e5caead2c5e2c7e22d6d336414887d352541cec01de0ea7d42ed5750be6f162c443fae6277cc9ec427455c4a3cac7f89825895bccf822e2513844a51bd8138bfe2ba27a0ac6f135d42db982334e19cd5a41b0c28682fbb521bd01d91d16dd97d53b36576e9a7f2b96abb6d9bee1a613f31df877a10439e633512e4fb99f67a644adfe6a599bfa867211b19283ff6f33ddf69761e1410eb08f66bcf6c829833b5d202441e1c50fce05b64599bbb0d9ae353f59cf7ef43df29246c26d14456b0bbdccc05170ff8db56635133a56ce3476114f4e4574852d241fd9e09118a87c35b0a7a053dedf35b009b05b2d03f3285310ee96dc84561560ef11efaecb8851c2cee6bb7b47ad0644915bd458ff49b7d905e85cf52c87caae0e72d87c3d5bbbd056b46232a336b63fb98c32f4081b71609990ea7a08dd2e6569f2a28894202dbcfcdc08a2a7bc0643c7bf6f9012c702a0a524bc0a685faffaa1ea5e84d3b09a02cbefd071a28b93f417f3521ef723bff506c435769e8182c21977bf0dede7d96c9318f0da38f4e15ea35ebdf9b44cfa4cc3b5e03af0f298c03f4bd5fbda0ccd39e3ce060111cdc6608ac719be7d68ff6eb7aa3a03ae719d36e0f5beaff5623a702723bea0aca3eb87705cc732306c9defc3e192a6a9b07c46b832736eba0c4d79f45063a2f8853924c0cd8a935e14b15e10fa06f12cda1fcbb5e0d610f4c8f243655b777963c820fc0908c95e80c25d35e0f1d4acbc60f33880715b0d171f99350eef9", 0x1000}, {&(0x7f0000000380)="af732f73cd776dabdea8c3abd63de9fd5f6ebe9095adfcd47fce45e5ad7258b33b0f78ab5604dd550e95923febc37e244d5f697bf39c82be44d210d43c1d86884ddd2c17520afcd5b83ec66d8cbd25fb1236822ed786e0", 0x57}, {&(0x7f0000001500)="438f1ba5ce3587dc5366f4c52d8a5e071921c64cdc25be74296e7f3d9c1c7d8e868763feb01e2287cfde8ce0949e3ca278b94908c940d72e81d8ca026d54b00c4a9ee01989e2dad23e2a7df6d81ab762d8e2fab6fa4e69a1ed8ae9c80d1a802e29db25bec429446e", 0x68}, {&(0x7f0000001580)="4f76e19302b608bb254f40735c88b7dc452ccd1500e8e454bf8b63c9815720b7a91d1de773782cf2af67da1bab342cb65eda3ebce1af2a153459c3a26696da3aba1cb4b85ba845d251451029f071ce7cde02f56e3ab23db1132bdc595f0ac34366ed2e5ab0dd2f5375b8b90a490197a642bc62713a83fef79f3e4f89977526c083901e3bd43096a48fe602332ec4599f15dfb793bea90c90b6f0905e0e", 0x9d}, {&(0x7f0000001640)="1807977692025237bb33a01bdd7b7e8f7e0830652dd4d9acf1c89c8afbef1f67806a0d4787e1d2480984ab1ecda674c7da1c9d3f686075c06331828018aeb7fab974a95401798ef54902a10ffb6ab91b5bd556b0819468ef9d46496353", 0x5d}, {&(0x7f00000016c0)="840cdcbe4d6a87dfd4ceedb64763a3e65bef43b5323f9669cc412ba77c09f953c31bbcc4007b8c848fa7a5363890b20ab60040c4eae5b416fd7aa59393b101a0d964a31db820c9557fd061880de9bd11265be18b58a0af7f02da99a375fc4978b1c04d0b504953adc4", 0x69}, {&(0x7f0000001740)="14bd182553b37d53900694a6eab13ac9cad98e2c8e4ee235cf4aa148c2654e82119f8bd791f489b28cc32a9362e7957662a191d00dc0be6056697f4a7ab44fff1c9f64f35aed8765bb77afc5906f6eb09489d2826cd316c5f86dc09d2a1516fcf376e2bbea3faee0575c1eefce92d2884ae4f87fc4b0d5dc05d6ec32e65e44b90346863eda19fe1198919434c37f897e62625f7e48e5345ec9a35bb4ccc305bd8dc2561606a1896b44d5cd868ff3f0758526f0847afa2ce62eeb889f330d185a2954d4fbc117ccc80f9f5ba50d71817874620da8e3d0b8a3", 0xd8}, {&(0x7f0000001840)="6b104be347811d9bc9adf4e5d24794458819a914d06d95870c8707efe441615bd4ce434ef62b2dd88ea57fd64df4349d123927aa4e2f3574c242709af0ccbcf8440dc4cde6fdf790ec07cd0ac3e5fa60d5a18607b418ebda45f346ace55ad1967bd9731085e7311e70d3022ff812941b9376560daf09e0e3cae189473742eaca247d4a79b8b12b2f153fce455149f6645fdc7a9ead721a37654c087a8310ed00aed6d1c5014ca4840e5e7b4393851266a32376bc528849a49f46718f9013eac85067649a66fae1f2dd86794b6232a34f4c7c684d01adac2ad78013e9114c16", 0xdf}, {&(0x7f0000000400)="3b11bd1bfaedcaa0173995", 0xb}], 0x9, 0x0, 0x0, 0x4081}, {0x0, 0x0, &(0x7f0000002ec0)=[{&(0x7f0000001a00)="6a6ccd429d95a5a8af807de22e7d687e3a81393705bc7db15aaf361d5a861fd68ab2333ccf731a56075f5b33117be2fccbbd2123d8ca2815faeaca0024819caa6143d6c880b82cbadf5ee2dfe13f2bc2833584d681d3f5beb2586097ff976a50abeac3e3ae4fdfa6020e159ed6fd00a1", 0x70}, {&(0x7f0000001a80)="85095199", 0x4}, {&(0x7f0000001ac0)="868131a9d031200e7f416642df74432f226d2105367d", 0x16}, {&(0x7f0000001b00)="3ed790b4d6b81344923f58bd632204159cea3e26c52afcb04dfdf1c95ad6ba06473a8163956b4728a2de7591cf1ddb9afd055ce1587276d9f2ed3dfe8ccdd74a08c2b059c0d6142ef0cc645fb19d3e44cff240796293654177906815162ff3406e6a06ec6adec35ca21479b17a76f43f6b34d6924a146f9177901f29a76e7b045ed6d15925312de3df42adc64eb2984bdc92ba8840b7173cf974708cc15ff5f7080956030d477ce5812395f6dc29b1eb0cab78fd362e54141ed42042b3772a53762426c69e3b57d345ec8a23fb7a26d251b6ece341a1f9d9", 0xd8}, {&(0x7f0000001c00)="455e367d325729366888bad27cab25e3850790b91365e1de1fdda36942b45ac04e4f076e02b3df797b061f915e57e2e347a7184fa995371b9d79a49e113b222b5f8a6ee6e90ffcc0e0accdde159c2742e50f06bb15d8deb65ad7a6f02e59c14f4893ff15ee2f1899d33766227fb9d5b81e88d3051a35d3e72da33a8ec55a1fe1a42df7ef883a33521cf40141d75baff5b41e90b3042e6e18dcbe2fdf10002623d82dbe097a51d2d8f9090767f7db1c2f659b36ff8fef272739bdbf9827c5d220343f9a15cbee2bdf", 0xc8}, {&(0x7f0000001d00)="b8c5e9244bf1a0aa71410e26e1623e1f0598df6eee350e16bef98fb99748b3c45f5ef46d6291ac1f456cf00bcace751eb83a01c255095d7db35dd80e339e3df1d8173305529ecf1069ba02ca438c6fe815068d2607df50c4b2ddec300af31ac76e696635f66aaf93de36836c0c335a64027040970da6cbdc9c262b682dda50d1053610d38c7c0b7531ca975fdb66", 0x8e}, {&(0x7f0000001dc0)="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", 0x1000}, {&(0x7f0000002dc0)="01b6830679b9146c4d5211f718bfb87168d645aa6c86b8619cea3fd39ba9507e84e42f67f0d961bc0cd495264334d9b3b0063f9fb9a33cb777899a2a4d2a46123d4ad4b0ba951c9b4ea18e32b7eb18bafc81165f381023814b7f555243c31bd6660068c6698b0392a3c43d0ecacfae31e87b8ce8526cc27b3883e3fd812255bc49efa42342f29fd7876c4fd874e3f00e030dbae40dfcb1c2daaa2275501539352a3c1595093166c53f2e6db20d75149a1401", 0xb2}, {&(0x7f0000002e80)="268e17a15c83d7bfa1362ee84cffdd", 0xf}], 0x9, &(0x7f0000002f80)=ANY=[@ANYBLOB="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"], 0x138, 0x40000}, {0x0, 0x0, &(0x7f0000003240)=[{&(0x7f00000030c0)="143f159b844b0252b8859646b21338d0a95076ecacb56b", 0x17}, {&(0x7f0000003100)="a7bcc079112b80c1d3", 0x9}, {&(0x7f0000003140)="92d7ddc116332ce6663931fadb16feebf7f4d126c52c3dfbf795523a133679c92abbed5feb53ca3547c916cb29c8d3726df70fbeba71fddb28842606b81b2ec145a12a6cd82d747b8c976064c3a5eb41f405275deacfe8dac74491cde6c1bba5c79f141fe7c05f5834bd0042eea4128cb0dfffbd82a0c2796886e1186beb419ab0a799d08ced9c0c56f1067ef567370f102b816f00328442acdb88399039d016cf7d382efad8426ab641d1c16fb7891c6639aa8866e55d0ea3e5a6b1ba749cfbcb8e49cf8d058a0d25ca08c1b18773b3b56e92fd47224e96a1ef95a67f1cac0b4e787f01df", 0xe5}], 0x3, &(0x7f0000003280)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x3f4}], 0x30}, {0x0, 0x0, &(0x7f0000003380)=[{&(0x7f00000032c0)="997883f8cc8267e2ee6140baf7fe664a7b9b0944865562999974af4594ef1870cd061a5f3e6789c1d2b6378869fc8279a64ff1d0ae444367f4e44b21f46eb733e27fce4eeeb2aa5caba1f16f00bd097a116ce50c72bb1c5c11de18b6282d81da06ba0412091214", 0x67}, {&(0x7f0000003340)="4334818d2eb9968158047d72ae9941d3b23642c4b700d694", 0x18}], 0x2, &(0x7f00000033c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x4}], 0x5, 0x4) write$sndseq(0xffffffffffffffff, &(0x7f00000003c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'syz_tun\x00'}) uselib(&(0x7f0000000140)='./file0\x00') [ 1709.122389][ T17] binder: undelivered TRANSACTION_ERROR: 29189 03:47:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0004000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf9fdffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:41 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x31}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:42 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xffffffffffffffff}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x0, &(0x7f0000000100)="025cc80700145f8f764070") bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000100)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003400)=[{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)="60fcd8e49326c23ff36cd727f543457c72f3bb2c6bfca9579b5b82818792b37992cd099ffccd0708d05213ae8423e64442a119244dc18f8abef538be3de1d2b8fe7fe5629797c8ea54052190e577d867189d201e9d6db89195a6d6e2a96910929602e0f8eb4334fb8b0446918d4eccef5626adc3a50cfffa0a6f0ac395c18dceda26d2620518b89421ab8686754cf62d1f310ab3902ed21fde1d8b5ced5d39a70e8f62f7e41c70b6d7eacccbc411983ab238b50f19e2cceaec97f55faad53d0a2a439085cf9a7293b6433eed5529ab36c8924f8f817192e5ae92e227d154a97bbb95c1ff7d1b2afa8ee3b2f87181f17ec9a3", 0xf2}], 0x1, &(0x7f0000000340)=[@iv={0x20, 0x117, 0x2, 0xc, "91bf32165fdab5de0294b898"}], 0x20, 0x4000000}, {0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000000380)="af732f73cd776dabdea8c3abd63de9fd5f6ebe9095adfcd47fce45e5ad7258b33b0f78ab5604dd550e95923febc37e244d5f697bf39c82be44d210d43c1d86884ddd2c17520afcd5b83ec66d8cbd25fb1236822ed786e0", 0x57}, {&(0x7f0000001500)="438f1ba5ce3587dc5366f4c52d8a5e071921c64cdc25be74296e7f3d9c1c7d8e868763feb01e2287cfde8ce0949e3ca278b94908c940d72e81d8ca026d54b00c4a9ee01989e2dad23e2a7df6d81ab762d8e2fab6fa4e69a1ed8ae9c80d1a802e29db25bec429446e", 0x68}, {&(0x7f0000001580)="4f76e19302b608bb254f40735c88b7dc452ccd1500e8e454bf8b63c9815720b7a91d1de773782cf2af67da1bab342cb65eda3ebce1af2a153459c3a26696da3aba1cb4b85ba845d251451029f071ce7cde02f56e3ab23db1132bdc595f0ac34366ed2e5ab0dd2f5375b8b90a490197a642bc62713a83fef79f3e4f89977526c083901e3bd43096a48fe602332ec4599f15dfb793bea90c90b6f0905e0e", 0x9d}, {&(0x7f0000001640)="1807977692025237bb33a01bdd7b7e8f7e0830652dd4d9acf1c89c8afbef1f67806a0d4787e1d2480984ab1ecda674c7da1c9d3f686075c06331828018aeb7fab974a95401798ef54902a10ffb6ab91b5bd556b0819468ef9d46496353", 0x5d}, {&(0x7f00000016c0)="840cdcbe4d6a87dfd4ceedb64763a3e65bef43b5323f9669cc412ba77c09f953c31bbcc4007b8c848fa7a5363890b20ab60040c4eae5b416fd7aa59393b101a0d964a31db820c9557fd061880de9bd11265be18b58a0af7f02da99a375fc4978b1c04d0b504953adc4", 0x69}, {&(0x7f0000001740)="14bd182553b37d53900694a6eab13ac9cad98e2c8e4ee235cf4aa148c2654e82119f8bd791f489b28cc32a9362e7957662a191d00dc0be6056697f4a7ab44fff1c9f64f35aed8765bb77afc5906f6eb09489d2826cd316c5f86dc09d2a1516fcf376e2bbea3faee0575c1eefce92d2884ae4f87fc4b0d5dc05d6ec32e65e44b90346863eda19fe1198919434c37f897e62625f7e48e5345ec9a35bb4ccc305bd8dc2561606a1896b44d5cd868ff3f0758526f0847afa2ce62eeb889f330d185a2954d4fbc117ccc80f9f5ba50d71817874620da8e3d0b8a3", 0xd8}, {&(0x7f0000001840)="6b104be347811d9bc9adf4e5d24794458819a914d06d95870c8707efe441615bd4ce434ef62b2dd88ea57fd64df4349d123927aa4e2f3574c242709af0ccbcf8440dc4cde6fdf790ec07cd0ac3e5fa60d5a18607b418ebda45f346ace55ad1967bd9731085e7311e70d3022ff812941b9376560daf09e0e3cae189473742eaca247d4a79b8b12b2f153fce455149f6645fdc7a9ead721a37654c087a8310ed00aed6d1c5014ca4840e5e7b4393851266a32376bc528849a49f46718f9013eac85067649a66fae1f2dd86794b6232a34f4c7c684d01adac2ad78013e9114c16", 0xdf}, {&(0x7f0000000400)="3b11bd1bfaedcaa0173995", 0xb}], 0x9, 0x0, 0x0, 0x4081}, {0x0, 0x0, &(0x7f0000002ec0)=[{&(0x7f0000001a00)="6a6ccd429d95a5a8af807de22e7d687e3a81393705bc7db15aaf361d5a861fd68ab2333ccf731a56075f5b33117be2fccbbd2123d8ca2815faeaca0024819caa6143d6c880b82cbadf5ee2dfe13f2bc2833584d681d3f5beb2586097ff976a50abeac3e3ae4fdfa6020e159ed6fd00a1", 0x70}, {&(0x7f0000001a80)="85095199", 0x4}, {&(0x7f0000001ac0)="868131a9d031200e7f416642df74432f226d2105367d", 0x16}, {&(0x7f0000001b00)="3ed790b4d6b81344923f58bd632204159cea3e26c52afcb04dfdf1c95ad6ba06473a8163956b4728a2de7591cf1ddb9afd055ce1587276d9f2ed3dfe8ccdd74a08c2b059c0d6142ef0cc645fb19d3e44cff240796293654177906815162ff3406e6a06ec6adec35ca21479b17a76f43f6b34d6924a146f9177901f29a76e7b045ed6d15925312de3df42adc64eb2984bdc92ba8840b7173cf974708cc15ff5f7080956030d477ce5812395f6dc29b1eb0cab78fd362e54141ed42042b3772a53762426c69e3b57d345ec8a23fb7a26d251b6ece341a1f9d9", 0xd8}, {&(0x7f0000001c00)="455e367d325729366888bad27cab25e3850790b91365e1de1fdda36942b45ac04e4f076e02b3df797b061f915e57e2e347a7184fa995371b9d79a49e113b222b5f8a6ee6e90ffcc0e0accdde159c2742e50f06bb15d8deb65ad7a6f02e59c14f4893ff15ee2f1899d33766227fb9d5b81e88d3051a35d3e72da33a8ec55a1fe1a42df7ef883a33521cf40141d75baff5b41e90b3042e6e18dcbe2fdf10002623d82dbe097a51d2d8f9090767f7db1c2f659b36ff8fef272739bdbf9827c5d220343f9a15cbee2bdf", 0xc8}, {&(0x7f0000001d00)="b8c5e9244bf1a0aa71410e26e1623e1f0598df6eee350e16bef98fb99748b3c45f5ef46d6291ac1f456cf00bcace751eb83a01c255095d7db35dd80e339e3df1d8173305529ecf1069ba02ca438c6fe815068d2607df50c4b2ddec300af31ac76e696635f66aaf93de36836c0c335a64027040970da6cbdc9c262b682dda50d1053610d38c7c0b7531ca975fdb66", 0x8e}, {&(0x7f0000001dc0)="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", 0x1000}, {&(0x7f0000002dc0)="01b6830679b9146c4d5211f718bfb87168d645aa6c86b8619cea3fd39ba9507e84e42f67f0d961bc0cd495264334d9b3b0063f9fb9a33cb777899a2a4d2a46123d4ad4b0ba951c9b4ea18e32b7eb18bafc81165f381023814b7f555243c31bd6660068c6698b0392a3c43d0ecacfae31e87b8ce8526cc27b3883e3fd812255bc49efa42342f29fd7876c4fd874e3f00e030dbae40dfcb1c2daaa2275501539352a3c1595093166c53f2e6db20d75149a1401", 0xb2}, {&(0x7f0000002e80)="268e17a15c83d7bfa1362ee84cffdd", 0xf}], 0x9, &(0x7f0000002f80)=ANY=[@ANYBLOB="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"], 0x138, 0x40000}, {0x0, 0x0, &(0x7f0000003240)=[{&(0x7f00000030c0)="143f159b844b0252b8859646b21338d0a95076ecacb56b", 0x17}, {&(0x7f0000003100)="a7bcc079112b80c1d3", 0x9}, {&(0x7f0000003140)="92d7ddc116332ce6663931fadb16feebf7f4d126c52c3dfbf795523a133679c92abbed5feb53ca3547c916cb29c8d3726df70fbeba71fddb28842606b81b2ec145a12a6cd82d747b8c976064c3a5eb41f405275deacfe8dac74491cde6c1bba5c79f141fe7c05f5834bd0042eea4128cb0dfffbd82a0c2796886e1186beb419ab0a799d08ced9c0c56f1067ef567370f102b816f00328442acdb88399039d016cf7d382efad8426ab641d1c16fb7891c6639aa8866e55d0ea3e5a6b1ba749cfbcb8e49cf8d058a0d25ca08c1b18773b3b56e92fd47224e96a1ef95a67f1cac0b4e787f01df", 0xe5}], 0x3, &(0x7f0000003280)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x3f4}], 0x30}, {0x0, 0x0, &(0x7f0000003380)=[{&(0x7f00000032c0)="997883f8cc8267e2ee6140baf7fe664a7b9b0944865562999974af4594ef1870cd061a5f3e6789c1d2b6378869fc8279a64ff1d0ae444367f4e44b21f46eb733e27fce4eeeb2aa5caba1f16f00bd097a116ce50c72bb1c5c11de18b6282d81da06ba0412091214", 0x67}, {&(0x7f0000003340)="4334818d2eb9968158047d72ae9941d3b23642c4b700d694", 0x18}], 0x2, &(0x7f00000033c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x4}], 0x5, 0x4) write$sndseq(0xffffffffffffffff, &(0x7f00000003c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'syz_tun\x00'}) uselib(&(0x7f0000000140)='./file0\x00') 03:47:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0005000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:42 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0x7ffff000}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0006000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xd2f873574f257e0a, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:43 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0x32}, {&(0x7f0000000000)=""/90, 0xfffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0007000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:43 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec2}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) 03:47:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xe0ffffffffffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev_mcast\x00\xc0\x87\xeaU\x01\x1e\x14\xc9\xe3G\xdd\x1fU\xa6\x02j\x1c\xb7\xe0g\xf3\xc5w\x98\x1c\t\x94\xa1\xe8\r\x90\xd4\x9dh\xbd\xbc\x91\xfa\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0009000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e283fa28227bb3dafe9eb4eb79400000001b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90187801000d2db8e953fc883f9c754f419e963874259295a945ec867b4f224fde52268a81e1154b80f7076f1ab6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xbe, 0x10000}], 0x0, 0x0) 03:47:43 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0xfffffec4}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) [ 1711.686223][T17799] ================================================================== [ 1711.694729][T17799] BUG: KASAN: use-after-free in filemap_fault+0x25f5/0x2a00 [ 1711.702006][T17799] Read of size 8 at addr ffff88808bbe2398 by task syz-executor1/17799 [ 1711.710135][T17799] [ 1711.712437][T17799] CPU: 0 PID: 17799 Comm: syz-executor1 Not tainted 4.20.0-next-20190107 #6 [ 1711.721071][T17799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1711.731109][T17799] Call Trace: [ 1711.734369][T17799] dump_stack+0x1db/0x2d0 [ 1711.738674][T17799] ? dump_stack_print_info.cold+0x20/0x20 [ 1711.744381][T17799] ? filemap_fault+0x25f5/0x2a00 [ 1711.749292][T17799] print_address_description.cold+0x7c/0x20d [ 1711.755238][T17799] ? filemap_fault+0x25f5/0x2a00 [ 1711.760158][T17799] ? filemap_fault+0x25f5/0x2a00 [ 1711.765065][T17799] kasan_report.cold+0x1b/0x40 [ 1711.769797][T17799] ? filemap_fault+0x25f5/0x2a00 [ 1711.774712][T17799] __asan_report_load8_noabort+0x14/0x20 [ 1711.780311][T17799] filemap_fault+0x25f5/0x2a00 [ 1711.785046][T17799] ? pagecache_get_page+0x1070/0x1070 [ 1711.790390][T17799] ? __lock_is_held+0xb6/0x140 [ 1711.795124][T17799] ? lock_acquire+0x1db/0x570 [ 1711.799769][T17799] ? ext4_filemap_fault+0x7b/0xaf [ 1711.804761][T17799] ? ___might_sleep+0x1e7/0x310 [ 1711.809582][T17799] ? lock_release+0xc40/0xc40 [ 1711.814230][T17799] ? print_usage_bug+0xd0/0xd0 [ 1711.818977][T17799] ? down_read+0x8d/0x120 [ 1711.823273][T17799] ? ext4_filemap_fault+0x7b/0xaf [ 1711.828278][T17799] ? __down_interruptible+0x740/0x740 [ 1711.833625][T17799] ? __lock_acquire+0x572/0x4a10 [ 1711.838532][T17799] ext4_filemap_fault+0x83/0xaf [ 1711.843361][T17799] __do_fault+0x176/0x7b0 [ 1711.847670][T17799] ? mark_held_locks+0x100/0x100 [ 1711.852574][T17799] ? do_page_mkwrite+0x740/0x740 [ 1711.857508][T17799] ? pmd_val+0x85/0x100 [ 1711.861642][T17799] ? add_mm_counter_fast.part.0+0x40/0x40 [ 1711.867329][T17799] ? pmd_val+0x85/0x100 [ 1711.871452][T17799] ? add_mm_counter_fast.part.0+0x40/0x40 [ 1711.877141][T17799] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1711.883351][T17799] __handle_mm_fault+0x370a/0x55a0 [ 1711.888446][T17799] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1711.893978][T17799] ? check_preemption_disabled+0x48/0x290 [ 1711.899666][T17799] ? handle_mm_fault+0x3cc/0xc80 [ 1711.904580][T17799] ? lock_downgrade+0x910/0x910 [ 1711.909402][T17799] ? kasan_check_read+0x11/0x20 [ 1711.914221][T17799] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1711.920168][T17799] ? rcu_read_unlock_special+0x380/0x380 [ 1711.925767][T17799] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1711.931984][T17799] ? check_preemption_disabled+0x48/0x290 [ 1711.937681][T17799] handle_mm_fault+0x4ec/0xc80 [ 1711.942426][T17799] ? __handle_mm_fault+0x55a0/0x55a0 [ 1711.947691][T17799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1711.953901][T17799] ? vmacache_update+0x114/0x140 [ 1711.958810][T17799] __do_page_fault+0x5da/0xd60 [ 1711.963547][T17799] do_page_fault+0xe6/0x7d8 [ 1711.968021][T17799] ? vmalloc_sync_all+0x30/0x30 [ 1711.972839][T17799] ? add_lock_to_list.isra.0+0x450/0x450 [ 1711.978456][T17799] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1711.983974][T17799] page_fault+0x1e/0x30 [ 1711.988123][T17799] RIP: 0010:strncpy_from_user+0x2ba/0x4e0 [ 1711.993810][T17799] Code: 08 bf 07 00 00 00 49 83 c5 08 48 89 de e8 ae d5 dd fd 48 83 fb 07 0f 86 75 01 00 00 e8 ff d3 dd fd 48 8b 85 70 ff ff ff 31 f6 <4e> 8b 34 28 31 ff 89 b5 5c ff ff ff e8 65 d5 dd fd 8b b5 5c ff ff [ 1712.013381][T17799] RSP: 0018:ffff888057e6fc38 EFLAGS: 00010246 [ 1712.019414][T17799] RAX: 0000000020000780 RBX: 0000000000000fe0 RCX: ffffc90007d46000 [ 1712.027355][T17799] RDX: 00000000000000b0 RSI: 0000000000000000 RDI: 0000000000000007 [ 1712.035323][T17799] RBP: ffff888057e6fcf0 R08: ffff88802c8006c0 R09: ffff88821bc49080 [ 1712.043263][T17799] R10: 000000000000001c R11: ffff8880936e13ff R12: ffff8880936e0420 [ 1712.051216][T17799] R13: 0000000000000000 R14: ffff888057e6fcc8 R15: dffffc0000000000 [ 1712.059166][T17799] ? strncpy_from_user+0x2b1/0x4e0 [ 1712.064257][T17799] ? digsig_verify.cold+0x32/0x32 [ 1712.069248][T17799] ? kmem_cache_alloc+0x341/0x710 [ 1712.074253][T17799] getname_flags+0x11b/0x5b0 [ 1712.078814][T17799] getname+0x1a/0x20 [ 1712.082708][T17799] do_sys_open+0x3a5/0x7c0 [ 1712.087114][T17799] ? filp_open+0x80/0x80 [ 1712.091327][T17799] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1712.097365][T17799] ? trace_hardirqs_off_caller+0x300/0x300 [ 1712.103138][T17799] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1712.108565][T17799] __x64_sys_open+0x7e/0xc0 [ 1712.113050][T17799] do_syscall_64+0x1a3/0x800 [ 1712.117614][T17799] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1712.123216][T17799] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1712.128902][T17799] ? __switch_to_asm+0x34/0x70 [ 1712.133646][T17799] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1712.139170][T17799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1712.145028][T17799] RIP: 0033:0x457ec9 [ 1712.148892][T17799] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1712.168464][T17799] RSP: 002b:00007fd9b351dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1712.176882][T17799] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457ec9 [ 1712.184825][T17799] RDX: 0000000000000000 RSI: 000000000014103e RDI: 0000000020000780 [ 1712.192776][T17799] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1712.200717][T17799] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd9b351e6d4 [ 1712.208658][T17799] R13: 00000000004f471f R14: 00000000004d6d30 R15: 00000000ffffffff [ 1712.216633][T17799] [ 1712.218929][T17799] Allocated by task 17768: [ 1712.223313][T17799] save_stack+0x45/0xd0 [ 1712.227436][T17799] kasan_kmalloc+0xcf/0xe0 [ 1712.231818][T17799] kasan_slab_alloc+0xf/0x20 [ 1712.236376][T17799] kmem_cache_alloc+0x12d/0x710 [ 1712.241194][T17799] vm_area_alloc+0x7a/0x1d0 [ 1712.245686][T17799] mmap_region+0x93b/0x1ca0 [ 1712.250155][T17799] do_mmap+0xa09/0x1220 [ 1712.254294][T17799] vm_mmap_pgoff+0x20b/0x2b0 [ 1712.258867][T17799] ksys_mmap_pgoff+0x4f8/0x650 [ 1712.263642][T17799] __x64_sys_mmap+0xe9/0x1b0 [ 1712.268204][T17799] do_syscall_64+0x1a3/0x800 [ 1712.272775][T17799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1712.278629][T17799] [ 1712.280927][T17799] Freed by task 17768: [ 1712.284961][T17799] save_stack+0x45/0xd0 [ 1712.289084][T17799] __kasan_slab_free+0x102/0x150 [ 1712.294002][T17799] kasan_slab_free+0xe/0x10 [ 1712.298471][T17799] kmem_cache_free+0x86/0x260 [ 1712.303152][T17799] vm_area_free+0x1d/0x30 [ 1712.307447][T17799] remove_vma+0x142/0x180 [ 1712.311743][T17799] __do_munmap+0x72e/0xef0 [ 1712.316122][T17799] mmap_region+0x698/0x1ca0 [ 1712.320591][T17799] do_mmap+0xa09/0x1220 [ 1712.324722][T17799] vm_mmap_pgoff+0x20b/0x2b0 [ 1712.329313][T17799] ksys_mmap_pgoff+0x4f8/0x650 [ 1712.334044][T17799] __x64_sys_mmap+0xe9/0x1b0 [ 1712.338609][T17799] do_syscall_64+0x1a3/0x800 [ 1712.343172][T17799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1712.349025][T17799] [ 1712.351332][T17799] The buggy address belongs to the object at ffff88808bbe2358 [ 1712.351332][T17799] which belongs to the cache vm_area_struct(49:syz1) of size 200 [ 1712.366394][T17799] The buggy address is located 64 bytes inside of [ 1712.366394][T17799] 200-byte region [ffff88808bbe2358, ffff88808bbe2420) [ 1712.379546][T17799] The buggy address belongs to the page: [ 1712.385144][T17799] page:ffffea00022ef880 count:1 mapcount:0 mapping:ffff8880974ddb00 index:0xffff88808bbe2eb0 [ 1712.395255][T17799] flags: 0x1fffc0000000200(slab) [ 1712.400162][T17799] raw: 01fffc0000000200 ffffea00027e8588 ffffea00022751c8 ffff8880974ddb00 [ 1712.408713][T17799] raw: ffff88808bbe2eb0 ffff88808bbe2040 000000010000000e ffff888057ed4980 [ 1712.417259][T17799] page dumped because: kasan: bad access detected [ 1712.423634][T17799] page->mem_cgroup:ffff888057ed4980 [ 1712.428793][T17799] [ 1712.431087][T17799] Memory state around the buggy address: [ 1712.436703][T17799] ffff88808bbe2280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1712.444761][T17799] ffff88808bbe2300: fb fb fb fc fc fc fc fc fc fc fc fb fb fb fb fb [ 1712.452806][T17799] >ffff88808bbe2380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1712.460870][T17799] ^ [ 1712.465688][T17799] ffff88808bbe2400: fb fb fb fb fc fc fc fc fc fc fc fc fb fb fb fb [ 1712.473716][T17799] ffff88808bbe2480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1712.481743][T17799] ================================================================== [ 1712.489769][T17799] Disabling lock debugging due to kernel taint [ 1712.498290][T17799] Kernel panic - not syncing: panic_on_warn set ... [ 1712.504878][T17799] CPU: 0 PID: 17799 Comm: syz-executor1 Tainted: G B 4.20.0-next-20190107 #6 [ 1712.514920][T17799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1712.524970][T17799] Call Trace: [ 1712.528269][T17799] dump_stack+0x1db/0x2d0 [ 1712.532623][T17799] ? dump_stack_print_info.cold+0x20/0x20 [ 1712.538317][T17799] panic+0x2cb/0x65c [ 1712.542195][T17799] ? add_taint.cold+0x16/0x16 [ 1712.546857][T17799] ? filemap_fault+0x25f5/0x2a00 [ 1712.549369][T28304] kobject: 'loop0' (00000000ef87ba47): kobject_uevent_env [ 1712.551776][T17799] ? preempt_schedule+0x4b/0x60 [ 1712.551788][T17799] ? ___preempt_schedule+0x16/0x18 [ 1712.551803][T17799] ? trace_hardirqs_on+0xb4/0x310 [ 1712.563091][T28304] kobject: 'loop0' (00000000ef87ba47): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1712.563772][T17799] ? filemap_fault+0x25f5/0x2a00 [ 1712.563784][T17799] end_report+0x47/0x4f [ 1712.563795][T17799] ? filemap_fault+0x25f5/0x2a00 [ 1712.563807][T17799] kasan_report.cold+0xe/0x40 [ 1712.563819][T17799] ? filemap_fault+0x25f5/0x2a00 [ 1712.563837][T17799] __asan_report_load8_noabort+0x14/0x20 [ 1712.589333][ T3864] kobject: 'loop4' (000000004d9dbc22): kobject_uevent_env [ 1712.593104][T17799] filemap_fault+0x25f5/0x2a00 [ 1712.598034][ T3864] kobject: 'loop4' (000000004d9dbc22): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1712.602674][T17799] ? pagecache_get_page+0x1070/0x1070 [ 1712.602687][T17799] ? __lock_is_held+0xb6/0x140 [ 1712.602701][T17799] ? lock_acquire+0x1db/0x570 [ 1712.602711][T17799] ? ext4_filemap_fault+0x7b/0xaf [ 1712.602722][T17799] ? ___might_sleep+0x1e7/0x310 [ 1712.602736][T17799] ? lock_release+0xc40/0xc40 [ 1712.655270][ T3864] kobject: 'loop3' (0000000067dd6270): kobject_uevent_env [ 1712.659770][T17799] ? print_usage_bug+0xd0/0xd0 [ 1712.659787][T17799] ? down_read+0x8d/0x120 [ 1712.659797][T17799] ? ext4_filemap_fault+0x7b/0xaf [ 1712.659808][T17799] ? __down_interruptible+0x740/0x740 [ 1712.659818][T17799] ? __lock_acquire+0x572/0x4a10 [ 1712.659841][T17799] ext4_filemap_fault+0x83/0xaf [ 1712.659852][T17799] __do_fault+0x176/0x7b0 [ 1712.659871][T17799] ? mark_held_locks+0x100/0x100 [ 1712.659886][T17799] ? do_page_mkwrite+0x740/0x740 [ 1712.687933][ T3864] kobject: 'loop3' (0000000067dd6270): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1712.691061][T17799] ? pmd_val+0x85/0x100 [ 1712.691073][T17799] ? add_mm_counter_fast.part.0+0x40/0x40 [ 1712.691083][T17799] ? pmd_val+0x85/0x100 [ 1712.691094][T17799] ? add_mm_counter_fast.part.0+0x40/0x40 [ 1712.691106][T17799] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1712.691119][T17799] __handle_mm_fault+0x370a/0x55a0 [ 1712.691135][T17799] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1712.691152][T17799] ? check_preemption_disabled+0x48/0x290 [ 1712.716562][ T3864] kobject: 'loop5' (000000003029d104): kobject_uevent_env [ 1712.725124][T17799] ? handle_mm_fault+0x3cc/0xc80 [ 1712.725143][T17799] ? lock_downgrade+0x910/0x910 [ 1712.725153][T17799] ? kasan_check_read+0x11/0x20 [ 1712.725165][T17799] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1712.725177][T17799] ? rcu_read_unlock_special+0x380/0x380 [ 1712.725188][T17799] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1712.725201][T17799] ? check_preemption_disabled+0x48/0x290 [ 1712.725217][T17799] handle_mm_fault+0x4ec/0xc80 [ 1712.756685][ T3864] kobject: 'loop5' (000000003029d104): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1712.761694][T17799] ? __handle_mm_fault+0x55a0/0x55a0 [ 1712.761705][T17799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:47:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x28) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) munlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{}, {r1, r2/1000+30000}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000200)=0x1d, 0x4) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) mincore(&(0x7f0000ffd000/0x2000)=nil, 0x2000, &(0x7f0000000000)=""/108) 03:47:44 executing program 3: open(0x0, 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220}, {&(0x7f0000000000)=""/90, 0x11ffffec3}, {&(0x7f0000006300)=""/247}, {&(0x7f0000006400)=""/4096}, {&(0x7f0000007400)=""/204}, {&(0x7f0000007500)=""/192}], 0x1000000000000212, 0x0) [ 1712.761716][T17799] ? vmacache_update+0x114/0x140 [ 1712.761732][T17799] __do_page_fault+0x5da/0xd60 [ 1712.761749][T17799] do_page_fault+0xe6/0x7d8 [ 1712.761761][T17799] ? vmalloc_sync_all+0x30/0x30 [ 1712.761777][T17799] ? add_lock_to_list.isra.0+0x450/0x450 [ 1712.863529][T17799] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1712.869114][T17799] page_fault+0x1e/0x30 [ 1712.873297][T17799] RIP: 0010:strncpy_from_user+0x2ba/0x4e0 [ 1712.879025][T17799] Code: 08 bf 07 00 00 00 49 83 c5 08 48 89 de e8 ae d5 dd fd 48 83 fb 07 0f 86 75 01 00 00 e8 ff d3 dd fd 48 8b 85 70 ff ff ff 31 f6 <4e> 8b 34 28 31 ff 89 b5 5c ff ff ff e8 65 d5 dd fd 8b b5 5c ff ff [ 1712.898624][T17799] RSP: 0018:ffff888057e6fc38 EFLAGS: 00010246 [ 1712.904664][T17799] RAX: 0000000020000780 RBX: 0000000000000fe0 RCX: ffffc90007d46000 [ 1712.907591][T17808] kobject: 'loop0' (00000000ef87ba47): kobject_uevent_env [ 1712.912626][T17799] RDX: 00000000000000b0 RSI: 0000000000000000 RDI: 0000000000000007 [ 1712.912634][T17799] RBP: ffff888057e6fcf0 R08: ffff88802c8006c0 R09: ffff88821bc49080 [ 1712.912641][T17799] R10: 000000000000001c R11: ffff8880936e13ff R12: ffff8880936e0420 [ 1712.912648][T17799] R13: 0000000000000000 R14: ffff888057e6fcc8 R15: dffffc0000000000 [ 1712.912669][T17799] ? strncpy_from_user+0x2b1/0x4e0 [ 1712.912681][T17799] ? digsig_verify.cold+0x32/0x32 [ 1712.912692][T17799] ? kmem_cache_alloc+0x341/0x710 [ 1712.912707][T17799] getname_flags+0x11b/0x5b0 [ 1712.912718][T17799] getname+0x1a/0x20 [ 1712.912733][T17799] do_sys_open+0x3a5/0x7c0 [ 1712.921678][T17808] kobject: 'loop0' (00000000ef87ba47): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1712.927765][T17799] ? filp_open+0x80/0x80 [ 1712.927780][T17799] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1712.927792][T17799] ? trace_hardirqs_off_caller+0x300/0x300 [ 1712.927804][T17799] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1712.927816][T17799] __x64_sys_open+0x7e/0xc0 [ 1712.927828][T17799] do_syscall_64+0x1a3/0x800 [ 1712.927841][T17799] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1712.927853][T17799] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1712.927870][T17799] ? __switch_to_asm+0x34/0x70 [ 1712.927884][T17799] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1712.927900][T17799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1712.927908][T17799] RIP: 0033:0x457ec9 [ 1712.927919][T17799] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1712.927925][T17799] RSP: 002b:00007fd9b351dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1712.927935][T17799] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457ec9 [ 1712.927942][T17799] RDX: 0000000000000000 RSI: 000000000014103e RDI: 0000000020000780 [ 1712.927948][T17799] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1712.927954][T17799] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd9b351e6d4 [ 1712.927960][T17799] R13: 00000000004f471f R14: 00000000004d6d30 R15: 00000000ffffffff [ 1712.936940][T17799] Kernel Offset: disabled [ 1713.124308][T17799] Rebooting in 86400 seconds..