0x80000000000b, 0x4, &(0x7f000000b000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f000000d000)={0x0, 0x7f}, &(0x7f0000048000), 0x0) tkill(r0, 0x1000000000016) 14:57:56 executing program 4: syz_emit_ethernet(0x4a, &(0x7f00003a7000)={@random="cd390b081bf2", @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "540300", 0x14, 0xffffff88, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:57:56 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) close(r0) 14:57:56 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c0045004, &(0x7f0000000000)) 14:57:56 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0x1, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'gre0\x00'}}, 0x1e) 14:57:56 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a58}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000080)='/dev/vga_arbiter\x00', 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(r3, 0x2202, 0x0) socket(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x401, 0x1, 0x3, 0x0, r2}, 0x2c) getegid() r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80000, 0x0) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000000)={0x1, 0x1, 0x3, 0x401, 0xffffffff}, 0xc) setsockopt$inet6_int(r6, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, &(0x7f00000002c0)=0x2, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000540)={0x0, 0x1, 0x2dfd, 0x1, 0x8000000000008000}, 0xc) ioctl$PIO_SCRNMAP(r5, 0x4b41, &(0x7f0000000100)="2910d7d157badfbbb9") setsockopt$inet6_MRT6_ADD_MFC(r6, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) getsockopt$inet6_int(r4, 0x29, 0x35, &(0x7f0000000140), &(0x7f0000000300)=0x4) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 14:57:56 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r0, &(0x7f00000000c0)='.dead\x00', &(0x7f0000000100)='+selinux\x00') 14:57:56 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x20800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f000085dff0)='/dev/sequencer2\x00', 0x10000080002, 0x0) r2 = dup2(r0, r1) read(r2, &(0x7f00004b8fab)=""/85, 0x55) 14:57:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) 14:57:57 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x2040, 0x0) acct(&(0x7f0000000000)='./file0\x00') 14:57:57 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0047fc2f07d82c99240970") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f000000b000)={&(0x7f000000f000)={0x10}, 0xc, &(0x7f00005a6ff0)={&(0x7f0000451ccc)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6}, {@in=@loopback=0x7f000001, 0x0, 0x6c}, @in6=@loopback={0x0, 0x1}, {}, {}, {}, 0x0, 0x0, 0x2, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}, 0x1}, 0x0) 14:57:57 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000005ff7)='/dev/ion\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x800001000004, 0x1013, r1, 0x0) mremap(&(0x7f0000006000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000000)) 14:57:57 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x20800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f000085dff0)='/dev/sequencer2\x00', 0x10000080002, 0x0) r2 = dup2(r0, r1) read(r2, &(0x7f00004b8fab)=""/85, 0x55) 14:57:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(cast5-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000200), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="ad56b6c504", 0x5) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000400)="1d974878779121bb3bc081a959b663", 0xf}], 0x1, &(0x7f0000000480)}, 0x0) 14:57:57 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x6}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x1c, 0x54, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1}}, 0x1c}, 0x1}, 0x0) [ 178.773020] x86/PAT: syz-executor1:10203 map pfn RAM range req write-combining for [mem 0x18ffb0000-0x18ffb3fff], got write-back 14:57:57 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x9, &(0x7f0000000240)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000140)="10000000f0000000000000000000", 0xe}]) 14:57:57 executing program 7: socketpair(0x4000000000001e, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe]}}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)}, 0x0) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000700), 0x5f2) 14:57:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f00000001c0)={0x2, 0x0, [0x40000072]}) [ 178.821989] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 178.830565] PF_BRIDGE: br_mdb_parse() with invalid attr 14:57:57 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00002c5fe8)={0xaa}) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000e4cfe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f0000013000)) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000080)=""/208) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") clone(0x0, &(0x7f0000000140), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) dup3(r1, r0, 0x0) 14:57:57 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x20800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f000085dff0)='/dev/sequencer2\x00', 0x10000080002, 0x0) r2 = dup2(r0, r1) read(r2, &(0x7f00004b8fab)=""/85, 0x55) 14:57:57 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file1\x00') [ 178.889787] x86/PAT: syz-executor1:10203 map pfn RAM range req write-combining for [mem 0x18ffb0000-0x18ffb3fff], got write-back [ 178.935476] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 178.944055] PF_BRIDGE: br_mdb_parse() with invalid attr 14:57:57 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x2, 0x4, 0x9, 0x74}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000080)="6f13", &(0x7f0000000100)=""/4096}, 0x18) 14:57:57 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x20, 0x8aff, 0x0, 0x0, {0x6}, [@nested={0x8, 0x1, [@typed={0x4, 0x0, @binary}]}]}, 0x1c}, 0x1}, 0x0) 14:57:57 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) unshare(0x20000) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 14:57:57 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000000)=0x54) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x0, 0x0, 0x0, 0xf6}}, &(0x7f0000000140)=0xb0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000100)=[@in6={0xa, 0x0, 0xffff, @dev={0xfe, 0x80}}], 0x1c) setsockopt$inet_buf(r0, 0x0, 0x60, &(0x7f00000000c0), 0x0) 14:57:57 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000480)='cgroup.procs\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000200), 0x6) 14:57:57 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x20800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f000085dff0)='/dev/sequencer2\x00', 0x10000080002, 0x0) r2 = dup2(r0, r1) read(r2, &(0x7f00004b8fab)=""/85, 0x55) 14:57:57 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) shutdown(r1, 0x1) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) shutdown(r3, 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 14:57:58 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xe, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 14:57:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") times(&(0x7f0000000100)) 14:57:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8927, &(0x7f0000000180)={'bridge0\x00', &(0x7f0000000140)=@ethtool_eee}) close(r2) close(r1) 14:57:58 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) tee(r1, r0, 0x2, 0x0) dup2(r1, r3) 14:57:58 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000480)='cgroup.procs\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000200), 0x6) 14:57:58 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='\x00', 0x3) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000000c0)={0x0, r2}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_NMI(r4, 0xae9a) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000001000/0x18000)=nil, &(0x7f0000000e00)=[@text64={0x40, &(0x7f0000000e80)="66b88c008ec8430f01d10f20a03e66d17293c4e1fc117bd2660fe590387e000066baf80cb8e42ede86ef66bafc0cb806e60000efc4c20bf7b7004800000f00180f20d835200000000f22d8", 0x4b}], 0x1, 0x0, &(0x7f0000000e40), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 179.448590] kvm: emulating exchange as write 14:57:58 executing program 4: r0 = socket$inet6(0xa, 0x40000000000002, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000040)=0xffffffffffffffff, 0x4) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f00000000c0)=0x7fff, 0x338) sendto$inet6(r0, &(0x7f0000000080), 0x1e8, 0x0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000080), 0x4) 14:57:58 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xe, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 14:57:58 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000480)='cgroup.procs\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000200), 0x6) 14:57:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000000c0)={0x0, 0x0, 0x100000000000004}) 14:57:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) shutdown(r1, 0x1) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) shutdown(r3, 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 14:58:05 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) unshare(0x20000) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 14:58:05 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x1) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) write$binfmt_elf32(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 14:58:05 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000480)='cgroup.procs\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000200), 0x6) 14:58:05 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xe, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 14:58:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000200)={0x3000, 0x5000}) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f00000004c0)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080)={0x4, 0x200, 0x4, 0x6c, 0x9d2, 0xffffffffffffff7f, 0x2, 0x273c, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r2, 0x2, 0x273, 0x3, 0x800, 0x1f}, &(0x7f0000000180)=0x14) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) statfs(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=""/93) timerfd_settime(r0, 0x1, &(0x7f0000000340)={{r3, r4+30000000}, {0x0, 0x1c9c380}}, &(0x7f0000000380)) flock(r1, 0x3) flock(r0, 0x1) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r5, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x21d) getegid() perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$netlink_NETLINK_NO_ENOBUFS(r6, 0x10e, 0x5, &(0x7f0000000040)=0x46b, 0x4) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80000, 0x0) syz_open_dev$ndb(&(0x7f0000000500)='/dev/nbd#\x00', 0x0, 0x2400) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000000)={0x1, 0x1, 0x3, 0x401, 0xffffffff}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e23, 0x3, @mcast1={0xff, 0x1, [], 0x1}, 0x8000000000005}, {0xa, 0x4e22, 0x412, @mcast1={0xff, 0x1, [], 0x1}, 0x100}, 0x8, [0x6, 0x1, 0x40000000000000, 0x8, 0x1ff, 0xfffffffffffffffc, 0x9955, 0x40]}, 0x5c) 14:58:05 executing program 3: socket$inet6(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) r2 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000040)) tkill(r2, 0x1000000000016) 14:58:05 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) shutdown(r1, 0x1) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) shutdown(r3, 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 14:58:05 executing program 0: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000180)) 14:58:05 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xe, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 14:58:06 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80}, 0x1}]}, &(0x7f0000000200)=0x10) listen(r0, 0x43) r1 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r1, 0x0) r2 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r2, &(0x7f0000000080)=""/89, 0x59, 0x0, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x709000) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000238000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) 14:58:06 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffeffffffff}, 0xa000003fe, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 187.355485] xprt_adjust_timeout: rq_timeout = 0! [ 187.383992] xprt_adjust_timeout: rq_timeout = 0! 14:58:06 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffeffffffff}, 0xa000003fe, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 187.543223] xprt_adjust_timeout: rq_timeout = 0! 14:58:06 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffeffffffff}, 0xa000003fe, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 14:58:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000380)={0x7b, 0xbff, [0x4b564d03, 0x1, 0x26f]}) [ 187.683723] xprt_adjust_timeout: rq_timeout = 0! 14:58:06 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffeffffffff}, 0xa000003fe, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 14:58:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000200)={0x3000, 0x5000}) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f00000004c0)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080)={0x4, 0x200, 0x4, 0x6c, 0x9d2, 0xffffffffffffff7f, 0x2, 0x273c, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r2, 0x2, 0x273, 0x3, 0x800, 0x1f}, &(0x7f0000000180)=0x14) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) statfs(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=""/93) timerfd_settime(r0, 0x1, &(0x7f0000000340)={{r3, r4+30000000}, {0x0, 0x1c9c380}}, &(0x7f0000000380)) flock(r1, 0x3) flock(r0, 0x1) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r5, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x21d) getegid() perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$netlink_NETLINK_NO_ENOBUFS(r6, 0x10e, 0x5, &(0x7f0000000040)=0x46b, 0x4) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80000, 0x0) syz_open_dev$ndb(&(0x7f0000000500)='/dev/nbd#\x00', 0x0, 0x2400) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000000)={0x1, 0x1, 0x3, 0x401, 0xffffffff}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e23, 0x3, @mcast1={0xff, 0x1, [], 0x1}, 0x8000000000005}, {0xa, 0x4e22, 0x412, @mcast1={0xff, 0x1, [], 0x1}, 0x100}, 0x8, [0x6, 0x1, 0x40000000000000, 0x8, 0x1ff, 0xfffffffffffffffc, 0x9955, 0x40]}, 0x5c) [ 187.851116] xprt_adjust_timeout: rq_timeout = 0! 14:58:07 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) unshare(0x20000) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 14:58:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000db4000)={0x10}, 0xc, &(0x7f00006bcff0)={&(0x7f000013e000)=@ipv6_newroute={0x2c, 0x18, 0x301, 0x0, 0x0, {0xa}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x6}, @RTA_ENCAP={0x8, 0x16, @nested={0x4, 0x4}}]}, 0x2c}, 0x1}, 0x0) 14:58:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='user.)'], &(0x7f0000000100)="0000000201000000000000010400000000000000", 0x14, 0x0) clone(0x0, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000340)) flistxattr(r1, &(0x7f0000000240)=""/235, 0xffffffffffffffac) 14:58:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) shutdown(r1, 0x1) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) shutdown(r3, 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 14:58:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000200)={0x3000, 0x5000}) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f00000004c0)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080)={0x4, 0x200, 0x4, 0x6c, 0x9d2, 0xffffffffffffff7f, 0x2, 0x273c, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r2, 0x2, 0x273, 0x3, 0x800, 0x1f}, &(0x7f0000000180)=0x14) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) statfs(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=""/93) timerfd_settime(r0, 0x1, &(0x7f0000000340)={{r3, r4+30000000}, {0x0, 0x1c9c380}}, &(0x7f0000000380)) flock(r1, 0x3) flock(r0, 0x1) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r5, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x21d) getegid() perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$netlink_NETLINK_NO_ENOBUFS(r6, 0x10e, 0x5, &(0x7f0000000040)=0x46b, 0x4) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80000, 0x0) syz_open_dev$ndb(&(0x7f0000000500)='/dev/nbd#\x00', 0x0, 0x2400) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000000)={0x1, 0x1, 0x3, 0x401, 0xffffffff}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e23, 0x3, @mcast1={0xff, 0x1, [], 0x1}, 0x8000000000005}, {0xa, 0x4e22, 0x412, @mcast1={0xff, 0x1, [], 0x1}, 0x100}, 0x8, [0x6, 0x1, 0x40000000000000, 0x8, 0x1ff, 0xfffffffffffffffc, 0x9955, 0x40]}, 0x5c) [ 188.163841] netlink: 'syz-executor1': attribute type 21 has an invalid length. [ 188.173067] netlink: 'syz-executor1': attribute type 4 has an invalid length. 14:58:07 executing program 3: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000111ff0)={0x0, 0x1c, &(0x7f0000519fa8)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14}}, 0x4}]}, &(0x7f0000f91ffc)=0xf9) bpf$PROG_LOAD(0x5, &(0x7f0000f85000)={0x1, 0x5, &(0x7f0000519fa8)=@framed={{0x18}, [@alu={0x5, 0x0, 0xd, 0x71}], {0x95}}, &(0x7f0000d63000)="73597a6b618f6c65000d", 0x80000000009, 0x1000, &(0x7f0000f72000)=""/4096}, 0x48) 14:58:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0xfffffffffff7ffbe, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000100)) 14:58:07 executing program 1: mlock(&(0x7f0000002000/0x3000)=nil, 0x3000) munmap(&(0x7f0000001000/0x2000)=nil, 0x2000) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, &(0x7f00000001c0), 0x20, 0x2) 14:58:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000200)={0x3000, 0x5000}) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f00000004c0)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080)={0x4, 0x200, 0x4, 0x6c, 0x9d2, 0xffffffffffffff7f, 0x2, 0x273c, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r2, 0x2, 0x273, 0x3, 0x800, 0x1f}, &(0x7f0000000180)=0x14) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) statfs(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=""/93) timerfd_settime(r0, 0x1, &(0x7f0000000340)={{r3, r4+30000000}, {0x0, 0x1c9c380}}, &(0x7f0000000380)) flock(r1, 0x3) flock(r0, 0x1) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r5, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x21d) getegid() perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$netlink_NETLINK_NO_ENOBUFS(r6, 0x10e, 0x5, &(0x7f0000000040)=0x46b, 0x4) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80000, 0x0) syz_open_dev$ndb(&(0x7f0000000500)='/dev/nbd#\x00', 0x0, 0x2400) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000000)={0x1, 0x1, 0x3, 0x401, 0xffffffff}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e23, 0x3, @mcast1={0xff, 0x1, [], 0x1}, 0x8000000000005}, {0xa, 0x4e22, 0x412, @mcast1={0xff, 0x1, [], 0x1}, 0x100}, 0x8, [0x6, 0x1, 0x40000000000000, 0x8, 0x1ff, 0xfffffffffffffffc, 0x9955, 0x40]}, 0x5c) 14:58:07 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x200000000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) write$vnet(r0, &(0x7f0000000180)={0x1, {&(0x7f0000001640)=""/194, 0xc2, &(0x7f0000000000)=""/10, 0x0, 0x2}}, 0x68) 14:58:07 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f00000002c0)=0x62e0, 0x4) 14:58:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='user.)'], &(0x7f0000000100)="0000000201000000000000010400000000000000", 0x14, 0x0) clone(0x0, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000340)) flistxattr(r1, &(0x7f0000000240)=""/235, 0xffffffffffffffac) 14:58:07 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) unshare(0x20000) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 14:58:07 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c03) 14:58:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f00000000c0)="295ee1311f16f477671070") getsockopt$inet6_tcp_buf(r0, 0x6, 0x1b, &(0x7f00000001c0)=""/187, &(0x7f0000000040)=0xbb) 14:58:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000)=0x7, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) poll(&(0x7f00000001c0)=[{r1}], 0x1, 0x48000) sendmsg$inet_sctp(r1, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000100)='^', 0x1}], 0x1, &(0x7f0000000300)}, 0x0) 14:58:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x19fd, 0x124) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x8, 0x4) 14:58:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=@getsa={0x28, 0x12, 0x1, 0x0, 0x0, {@in6=@dev={0xfe, 0x80}}}, 0x28}, 0x1}, 0x0) [ 188.594545] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:58:07 executing program 3: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_pwait(r0, &(0x7f0000000100)=[{}], 0x1, 0x7fffffff, &(0x7f0000000140), 0x8) epoll_wait(r0, &(0x7f0000000180)=[{}], 0x1, 0x80000001) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x40002017}) timerfd_settime(r2, 0x0, &(0x7f00000002c0)={{}, {0x0, 0x989680}}, &(0x7f0000000300)) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0xb26a, &(0x7f00000000c0), 0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 14:58:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='user.)'], &(0x7f0000000100)="0000000201000000000000010400000000000000", 0x14, 0x0) clone(0x0, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000340)) flistxattr(r1, &(0x7f0000000240)=""/235, 0xffffffffffffffac) 14:58:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000540)=@deltaction={0x18, 0x30, 0x209, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 14:58:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)=@setlink={0x28, 0x13, 0x709, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IF_NETNSID={0x8, 0x2e}]}, 0x28}, 0x1}, 0x0) 14:58:07 executing program 4: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) pwrite64(r1, &(0x7f0000000280), 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0xad5) close(r0) 14:58:07 executing program 6: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="130000004f0007031dfffd946fa2830020200a", 0x13}], 0x1}, 0x0) 14:58:07 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x5452, &(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) close(r0) 14:58:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000016b000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5ad400000000000000000000000000000", 0x18) 14:58:07 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) 14:58:07 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/user\x00') ioctl$sock_FIOSETOWN(r0, 0xb702, &(0x7f0000000440)) 14:58:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='user.)'], &(0x7f0000000100)="0000000201000000000000010400000000000000", 0x14, 0x0) clone(0x0, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000340)) flistxattr(r1, &(0x7f0000000240)=""/235, 0xffffffffffffffac) 14:58:07 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$evdev(r1, &(0x7f0000000240)=[{}], 0x18) 14:58:07 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x5452, &(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) close(r0) 14:58:08 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x5452, &(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) close(r0) 14:58:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") statx(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x400, 0x0, &(0x7f0000000080)) 14:58:08 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = socket$pppoe(0x18, 0x1, 0x0) r6 = dup2(r2, r5) syz_kvm_setup_cpu$x86(r6, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000480)="b95d030000b800800000ba000000000f302e0f890038000066ba4000b840f90000efc4814d5863ab3e8197fd4300008fbc0000673667674d0fc79bc2c1f8640f323e400f0766baa000b000eeb9a5030000b89e4a0000ba000000000f30", 0x5d}], 0x1, 0x0, &(0x7f0000000500), 0x0) 14:58:08 executing program 3: r0 = socket(0x11, 0x3, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) recvfrom$packet(r0, &(0x7f00000004c0)=""/233, 0xe9, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) ioctl(r3, 0x4000008912, &(0x7f0000000000)="2957e1311f16f477671070") unshare(0x0) ioctl$LOOP_SET_DIRECT_IO(r2, 0x5451, 0x0) sendto$inet(r1, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) ioctl$sock_bt(r0, 0x8907, &(0x7f0000000140)) 14:58:08 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0), 0x14) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000080)=0x8000000, 0x4) getsockopt$inet6_buf(r2, 0x29, 0x6, &(0x7f00000000c0)=""/177, &(0x7f0000000180)=0x19f) close(r0) 14:58:08 executing program 6: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3}, 0x8, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070") msgrcv(r0, &(0x7f0000000780)={0x0, ""/4096}, 0x1008, 0x8000000000000000, 0x0) 14:58:08 executing program 7: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000000)={0x1f}, 0x8) listen(r0, 0x0) 14:58:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000100)=[@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, @in6={0xa, 0x0, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x38) connect$inet(r0, &(0x7f00000000c0)={0x2}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}], 0x200000000000014b) 14:58:08 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x5452, &(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) close(r0) 14:58:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca945f64009400050028925aa8000000000000008000f0fffeffe809000000fff5dd0000000a0001000a0a0c00410400000000fcff", 0x58}], 0x1) 14:58:08 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/rt6_stats\x00') sendfile(r0, r0, &(0x7f00000003c0)=0x41, 0x4) 14:58:08 executing program 6: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregset(0x4201, r1, 0x0, &(0x7f0000000000)={&(0x7f0000002280)=""/4096, 0xd7}) 14:58:08 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000040)="295ee1311f16f477671070") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/uts\x00') ioctl$VT_RELDISP(r1, 0xb701) 14:58:08 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20141042, 0x0) r3 = dup(r2) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x4080, 0x0) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 14:58:08 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000804000)) keyctl$invalidate(0x15, 0x0) 14:58:08 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000014, &(0x7f0000000040)=0x80000000001, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendmmsg(r1, &(0x7f0000007540)=[{{0x0, 0x0, &(0x7f00000065c0)=[{&(0x7f0000006240)="03", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000006840)=[{&(0x7f0000006600)='Z', 0x1}], 0x1, &(0x7f0000006880)}}], 0x2, 0x0) 14:58:08 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00003ce000)='}\x00', 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f762070") mmap(&(0x7f00002e4000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) name_to_handle_at(r0, &(0x7f00002e4000)="2e2f66696c65ffff", &(0x7f0000000000)={0xc}, &(0x7f0000001ffc), 0x1400) 14:58:08 executing program 7: openat$mixer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mixer\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = epoll_create1(0x0) epoll_wait(r2, &(0x7f0000000000)=[{}], 0x1, 0x6a8d) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000cd8ff4)) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000007000)) r4 = dup2(r3, r1) ioctl$UFFDIO_UNREGISTER(r0, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) write$fuse(r4, &(0x7f0000000080)={0x12, 0x0, 0x0, @fuse_notify_poll_wakeup_out={0x8}}, 0x12) ioctl$RTC_ALM_SET(r4, 0x40247007, &(0x7f0000000040)={0x0, 0x35, 0x0, 0x5}) 14:58:08 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00007fe000/0x3000)=nil, 0x3000, 0x0, 0x108132, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000080), 0x5, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 14:58:08 executing program 6: syz_emit_ethernet(0x6e, &(0x7f0000101000)={@random="cd390b081bf2", @random="03e1b7df0128", [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x32, 0x0, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}, [], "802a08000000006b"}}}}}}}, 0x0) [ 190.026981] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000045) [ 190.034496] FAT-fs (loop0): Filesystem has been set read-only 14:58:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000002640)=@ipv6_newroute={0x2c, 0x18, 0x9, 0x0, 0x0, {0xa}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x4}, @RTA_ENCAP={0x8, 0x16, @typed={0x4, 0x4, @binary}}]}, 0x2c}, 0x1}, 0x0) 14:58:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x3b, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 14:58:09 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000180), 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001480)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}}) sigaltstack(&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000400)) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000b80)="24000000100007031dfffd946fa2830020200a0009000300001c85df4d8a04ebe56da47e280000000b0affffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0be730719bc38f936eb0ea812807d6d23", 0x5c}], 0x1}, 0x0) 14:58:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4030ae7b, &(0x7f0000000000)={0x0, 0x0, [0x80ffff]}) 14:58:09 executing program 6: r0 = socket(0x10, 0x802, 0x0) ioctl$sock_ifreq(r0, 0x8947, &(0x7f0000000000)={'bond0\x00', @ifru_map={0x10000}}) 14:58:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000461fa8)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(seed))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)="649c47ad46390dc86dae79fa409d4d54", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa}}}, 0x30) io_setup(0x800000100000005, &(0x7f0000f69000)=0x0) io_submit(r3, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3b03996ff05abb1e8b1c24b50898d8f", 0x10}]) 14:58:09 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x100000002, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x20, 0x0, 0x0, 0x980}, {0x6}]}, 0x10) sendto$inet6(r1, &(0x7f0000000100), 0x0, 0x4008000, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) [ 190.557346] netlink: 'syz-executor3': attribute type 21 has an invalid length. [ 190.569762] netlink: 'syz-executor3': attribute type 4 has an invalid length. 14:58:09 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x800008800000001) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0x6}, 0x2c) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x2c) 14:58:09 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x3, &(0x7f0000c91000)=ANY=[@ANYBLOB="850000002f00000027000000000022009500000000000000"], &(0x7f0000000000)="f4206cd55d3174fccd51d063ca3dda5cbf5a01cc7ea92c43b604ffc53727d2d60f55ddeb757cf36a8457125ab48bcbcce4011a423df186cc8d8e6e9a66b1a0a6035a2fc0578cf5aad8b3a24a9c646a37eb26c6212ffc9658f152194b880765d169d550beb059984a10c2", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r1, r2, 0x5}, 0x10) dup2(r2, r1) 14:58:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0x5, &(0x7f0000000000)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x19}], {0x95}}, &(0x7f00000000c0)='GPL\x00', 0xe6, 0xfb, &(0x7f0000000300)=""/251}, 0x48) 14:58:09 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000707ff0)={0x0, 0x10, &(0x7f0000f3eff0)=[@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}]}, &(0x7f000045c000)=0x10) shutdown(r1, 0x2000000000000002) 14:58:09 executing program 2: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0}) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, &(0x7f00000001c0)={r1}, &(0x7f0000000100), 0x8) mmap(&(0x7f00001bd000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) [ 190.631418] netlink: 4 bytes leftover after parsing attributes in process `syz-executor5'. [ 190.654180] netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. 14:58:09 executing program 6: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x8002, 0x0, 0x0, 0x0, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x145300, 0x0) umount2(&(0x7f0000000100)='./file0\x00', 0x9) 14:58:09 executing program 7: openat$mixer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mixer\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = epoll_create1(0x0) epoll_wait(r2, &(0x7f0000000000)=[{}], 0x1, 0x6a8d) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000cd8ff4)) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000007000)) r4 = dup2(r3, r1) ioctl$UFFDIO_UNREGISTER(r0, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) write$fuse(r4, &(0x7f0000000080)={0x12, 0x0, 0x0, @fuse_notify_poll_wakeup_out={0x8}}, 0x12) ioctl$RTC_ALM_SET(r4, 0x40247007, &(0x7f0000000040)={0x0, 0x35, 0x0, 0x5}) 14:58:09 executing program 5: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f00000001c0), 0x8f) 14:58:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f0000018ff4)={0x10}, 0xc, &(0x7f0000013ff1)={&(0x7f0000000180)={0x1c, 0x28, 0x1, 0x0, 0x0, {0x1}, [@generic="7b6c6e6603"]}, 0x1c}, 0x1}, 0x0) 14:58:09 executing program 3: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x8004e23, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x32}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) sendmsg(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001680)}, 0x0) 14:58:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f0000018ff4)={0x10}, 0xc, &(0x7f0000013ff1)={&(0x7f0000000180)={0x1c, 0x28, 0x1, 0x0, 0x0, {0x1}, [@generic="7b6c6e6603"]}, 0x1c}, 0x1}, 0x0) 14:58:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000040)) 14:58:09 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x80000000003, 0x0) ioctl(r1, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x80011, r0, 0x0) madvise(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x3) 14:58:09 executing program 4: r0 = epoll_create(0x6) r1 = epoll_create(0x46c) r2 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000c7f000)) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000140)="025cc83d6d345f8f762070") epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000d5dff4)) 14:58:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000040)) 14:58:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f0000018ff4)={0x10}, 0xc, &(0x7f0000013ff1)={&(0x7f0000000180)={0x1c, 0x28, 0x1, 0x0, 0x0, {0x1}, [@generic="7b6c6e6603"]}, 0x1c}, 0x1}, 0x0) 14:58:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000a5f000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000000620000024d564b0000000001"]) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x40]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:58:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000008000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r2, 0x0) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f0000001040)=ANY=[@ANYBLOB="060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:58:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f0000018ff4)={0x10}, 0xc, &(0x7f0000013ff1)={&(0x7f0000000180)={0x1c, 0x28, 0x1, 0x0, 0x0, {0x1}, [@generic="7b6c6e6603"]}, 0x1c}, 0x1}, 0x0) [ 191.236610] *** Guest State *** [ 191.240109] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 191.249072] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 191.257969] CR3 = 0x0000000000000000 [ 191.261765] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 191.267826] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 191.273839] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 191.280556] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 191.288596] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 191.296600] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 191.304630] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 191.312646] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 191.320678] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 191.328684] GDTR: limit=0x00000000, base=0x0000000000000000 [ 191.336697] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 191.344703] IDTR: limit=0x00000000, base=0x0000000000000000 [ 191.352731] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 191.360744] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 191.367190] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 191.374687] Interruptibility = 00000000 ActivityState = 00000000 [ 191.380970] *** Host State *** [ 191.384221] RIP = 0xffffffff811f4664 RSP = 0xffff8801ba907350 [ 191.390248] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 191.396694] FSBase=00007fc14091d700 GSBase=ffff8801dae00000 TRBase=fffffe0000003000 [ 191.404538] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 191.410467] CR0=0000000080050033 CR3=00000001cef41000 CR4=00000000001426f0 [ 191.417538] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87a01380 [ 191.424244] EFER = 0x0000000000000d01 PAT = 0x0000000000000000 [ 191.430332] *** Control State *** [ 191.433805] PinBased=0000003f CPUBased=b5a06dfa SecondaryExec=000000c2 [ 191.440512] EntryControls=0000d1ff ExitControls=0023efff [ 191.445993] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 191.453047] VMEntry: intr_info=800000c6 errcode=00000000 ilen=00000000 [ 191.459735] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 191.466338] reason=80000021 qualification=0000000000000000 [ 191.472694] IDTVectoring: info=00000000 errcode=00000000 [ 191.478191] TSC Offset = 0xffffff96b11c6d51 [ 191.482541] TPR Threshold = 0x00 [ 191.485961] EPT pointer = 0x000000019375301e 14:58:10 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x400000000006, 0x0, 0x0, 0x2, 0x0, 0x70bd2d}, 0x10}, 0x1}, 0x0) 14:58:10 executing program 2: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0}) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, &(0x7f00000001c0)={r1}, &(0x7f0000000100), 0x8) mmap(&(0x7f00001bd000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) 14:58:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000040)) 14:58:10 executing program 7: openat$mixer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mixer\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = epoll_create1(0x0) epoll_wait(r2, &(0x7f0000000000)=[{}], 0x1, 0x6a8d) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000cd8ff4)) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000007000)) r4 = dup2(r3, r1) ioctl$UFFDIO_UNREGISTER(r0, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) write$fuse(r4, &(0x7f0000000080)={0x12, 0x0, 0x0, @fuse_notify_poll_wakeup_out={0x8}}, 0x12) ioctl$RTC_ALM_SET(r4, 0x40247007, &(0x7f0000000040)={0x0, 0x35, 0x0, 0x5}) 14:58:10 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f00004f7000/0x4000)=nil, 0x4000}, 0x5}) 14:58:10 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) write$fuse(r0, &(0x7f0000000080)={0x18, 0x1, 0x0, @fuse_bmap_out}, 0x18) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0), 0x7b) 14:58:10 executing program 4: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') unshare(0x400) pselect6(0x40, &(0x7f0000f33fc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f0000000040), &(0x7f0000349000), &(0x7f0000f14000)={&(0x7f00000000c0), 0x8}) 14:58:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x588, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, &(0x7f0000000000), &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0xd, 0x0, 0x0, 'nr0\x00', 'ip6gretap0\x00', 'syzkaller1\x00', 'ip6gretap0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x100, 0x180, 0x1b0, [@time={'time\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1177bc2cb1875933}}}, @helper={'helper\x00', 0x28, {{0x0, 'tftp-20000\x00'}}}]}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'irlan0\x00', 'lo\x00', 'teql0\x00', 'team_slave_1\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'teql0\x00', 'irlan0\x00', 'bridge_slave_1\x00', 'bridge0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x1c8, 0x248, 0x290, [@comment={'comment\x00', 0x100}, @vlan={'vlan\x00', 0x8}]}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz0\x00'}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}]}, 0x600) 14:58:10 executing program 6: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregset(0x4204, r1, 0x1, &(0x7f0000000080)={&(0x7f0000003100)=""/4096, 0xaa0}) 14:58:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000040)) [ 191.896366] xt_time: unknown flags 0x30 14:58:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x30, 0x119, 0x0, 0x0, {0x3}, [@nested={0xc, 0xb501, [@typed={0x8, 0x1, @binary='U'}]}]}, 0x20}, 0x1}, 0x0) 14:58:10 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x200000000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000013ff1)={&(0x7f0000000040)={0x20, 0x29, 0x1, 0x0, 0x0, {0x1}, [@typed={0xc, 0x1, @u64}]}, 0x20}, 0x1}, 0x0) 14:58:10 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x2b, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 14:58:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x588, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, &(0x7f0000000000), &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0xd, 0x0, 0x0, 'nr0\x00', 'ip6gretap0\x00', 'syzkaller1\x00', 'ip6gretap0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x100, 0x180, 0x1b0, [@time={'time\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1177bc2cb1875933}}}, @helper={'helper\x00', 0x28, {{0x0, 'tftp-20000\x00'}}}]}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'irlan0\x00', 'lo\x00', 'teql0\x00', 'team_slave_1\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'teql0\x00', 'irlan0\x00', 'bridge_slave_1\x00', 'bridge0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x1c8, 0x248, 0x290, [@comment={'comment\x00', 0x100}, @vlan={'vlan\x00', 0x8}]}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz0\x00'}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}]}, 0x600) [ 191.939479] device bridge_slave_1 left promiscuous mode [ 191.945151] bridge0: port 2(bridge_slave_1) entered disabled state 14:58:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x3, &(0x7f00008f9000)=""/12, &(0x7f0000000000)=0xc) 14:58:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000440)={&(0x7f0000000600)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0x18, r1, 0x200000000000101, 0x0, 0x0, {0x3}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}]}, 0x18}, 0x1}, 0x0) [ 192.046797] device bridge_slave_0 left promiscuous mode [ 192.052472] bridge0: port 1(bridge_slave_0) entered disabled state 14:58:10 executing program 4: r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f762070") r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x200, 0x0) preadv(r1, &(0x7f00000022c0)=[{&(0x7f0000000080)}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000001240)=""/4096, 0x1000}], 0x3, 0x0) [ 192.232318] team0 (unregistering): Port device team_slave_1 removed [ 192.259525] team0 (unregistering): Port device team_slave_0 removed [ 192.285346] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 192.312780] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 192.380476] bond0 (unregistering): Released all slaves [ 192.441146] xt_time: unknown flags 0x30 14:58:11 executing program 2: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0}) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, &(0x7f00000001c0)={r1}, &(0x7f0000000100), 0x8) mmap(&(0x7f00001bd000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) 14:58:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000380)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet6_group_source_req(r2, 0x29, 0x37, &(0x7f00000001c0)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}}}, 0x108) close(r2) close(r1) 14:58:11 executing program 7: openat$mixer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mixer\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = epoll_create1(0x0) epoll_wait(r2, &(0x7f0000000000)=[{}], 0x1, 0x6a8d) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000cd8ff4)) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000007000)) r4 = dup2(r3, r1) ioctl$UFFDIO_UNREGISTER(r0, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) write$fuse(r4, &(0x7f0000000080)={0x12, 0x0, 0x0, @fuse_notify_poll_wakeup_out={0x8}}, 0x12) ioctl$RTC_ALM_SET(r4, 0x40247007, &(0x7f0000000040)={0x0, 0x35, 0x0, 0x5}) 14:58:11 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x14040004) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000000)=0xffffffffffff0001, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) sendto$inet6(r2, &(0x7f00000007fa)="97", 0x1, 0x0, &(0x7f00006f9000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 14:58:11 executing program 5: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'sit0\x00', 0x20003005}) 14:58:11 executing program 4: r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f762070") r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x200, 0x0) preadv(r1, &(0x7f00000022c0)=[{&(0x7f0000000080)}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000001240)=""/4096, 0x1000}], 0x3, 0x0) 14:58:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x588, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, &(0x7f0000000000), &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0xd, 0x0, 0x0, 'nr0\x00', 'ip6gretap0\x00', 'syzkaller1\x00', 'ip6gretap0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x100, 0x180, 0x1b0, [@time={'time\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1177bc2cb1875933}}}, @helper={'helper\x00', 0x28, {{0x0, 'tftp-20000\x00'}}}]}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'irlan0\x00', 'lo\x00', 'teql0\x00', 'team_slave_1\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'teql0\x00', 'irlan0\x00', 'bridge_slave_1\x00', 'bridge0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x1c8, 0x248, 0x290, [@comment={'comment\x00', 0x100}, @vlan={'vlan\x00', 0x8}]}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz0\x00'}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}]}, 0x600) [ 192.798166] IPVS: ftp: loaded support on port[0] = 21 [ 192.800578] xt_time: unknown flags 0x30 [ 192.930490] device lo entered promiscuous mode [ 192.946365] IPVS: ftp: loaded support on port[0] = 21 [ 193.565130] IPVS: ftp: loaded support on port[0] = 21 [ 194.096788] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.103209] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.114446] device bridge_slave_0 entered promiscuous mode [ 194.152866] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.159333] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.167156] device bridge_slave_1 entered promiscuous mode [ 194.204840] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 194.245738] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 194.357835] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 194.397910] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 194.570274] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 194.577690] team0: Port device team_slave_0 added [ 194.613879] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 194.622077] team0: Port device team_slave_1 added [ 194.659370] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.701345] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.741440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.781478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.148290] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.154721] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.161406] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.167790] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.176944] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 195.935171] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.970838] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.048696] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 196.124990] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 196.131210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.138317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.213365] 8021q: adding VLAN 0 to HW filter on device team0 14:58:15 executing program 6: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f"], 0x1) fcntl$setstatus(r0, 0x4, 0x4000) io_setup(0x2, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f00000000c0)=[&(0x7f0000000080)={0x0, 0x0, 0x8, 0x1, 0x0, r0, &(0x7f0000000040)='a', 0x1}]) 14:58:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f762070") r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x200, 0x0) preadv(r1, &(0x7f00000022c0)=[{&(0x7f0000000080)}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000001240)=""/4096, 0x1000}], 0x3, 0x0) 14:58:15 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x588, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, &(0x7f0000000000), &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0xd, 0x0, 0x0, 'nr0\x00', 'ip6gretap0\x00', 'syzkaller1\x00', 'ip6gretap0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x100, 0x180, 0x1b0, [@time={'time\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1177bc2cb1875933}}}, @helper={'helper\x00', 0x28, {{0x0, 'tftp-20000\x00'}}}]}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'irlan0\x00', 'lo\x00', 'teql0\x00', 'team_slave_1\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'teql0\x00', 'irlan0\x00', 'bridge_slave_1\x00', 'bridge0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x1c8, 0x248, 0x290, [@comment={'comment\x00', 0x100}, @vlan={'vlan\x00', 0x8}]}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz0\x00'}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}]}, 0x600) 14:58:15 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xcd, &(0x7f0000000000), 0x10) 14:58:15 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0xb4}], 0x1) dup3(r1, r0, 0x0) 14:58:15 executing program 2: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0}) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, &(0x7f00000001c0)={r1}, &(0x7f0000000100), 0x8) mmap(&(0x7f00001bd000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) 14:58:15 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x33, 0x0, @dev={0xac, 0x14, 0x14}, @remote={0xac, 0x14, 0x223, 0xbb}, {[@rr={0xffffff94, 0x3}]}}, @icmp=@timestamp_reply={0xe}}}}}, &(0x7f0000000100)) 14:58:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r1, &(0x7f0000000280)="df", 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='openpromfs\x00', 0x101000, &(0x7f0000000300)) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x50022, &(0x7f0000000540)=ANY=[]) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 196.706010] serio: Serial port pts0 14:58:15 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={@mcast1={0xff, 0x1, [], 0x1}}, 0x14) 14:58:15 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) ioctl(r0, 0x6, &(0x7f0000000180)) 14:58:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f762070") r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x200, 0x0) preadv(r1, &(0x7f00000022c0)=[{&(0x7f0000000080)}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000001240)=""/4096, 0x1000}], 0x3, 0x0) [ 196.748859] xt_time: unknown flags 0x30 [ 196.754710] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 14:58:15 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f00000000c0)=0x10d060000) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000100)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x384c8, &(0x7f00000004c0)}, &(0x7f0000000500)="abc0b501df7e", &(0x7f0000000600)=""/4096, 0x0, 0x0, 0x0, &(0x7f0000001600)}) [ 196.857839] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 196.878917] program syz-executor5 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 196.908369] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 14:58:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r1, &(0x7f0000000280)="df", 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='openpromfs\x00', 0x101000, &(0x7f0000000300)) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x50022, &(0x7f0000000540)=ANY=[]) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:58:15 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x4, 0x4, 0xf728}, 0xdd) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000040), &(0x7f00000001c0)=""/110}, 0x18) 14:58:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f00000000c0), &(0x7f0000000100)) 14:58:15 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000d08ff7)='/dev/sg#\x00', 0x0, 0x81) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1004000000016) close(r1) 14:58:15 executing program 5: nanosleep(&(0x7f0000000100)={0x77359400}, &(0x7f0000000080)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f0000000140)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000004, 0x8031, 0xffffffffffffffff, 0x0) io_setup(0x7, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f00000001c0)) [ 197.054869] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 14:58:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r1, &(0x7f0000000280)="df", 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='openpromfs\x00', 0x101000, &(0x7f0000000300)) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x50022, &(0x7f0000000540)=ANY=[]) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:58:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x1, 0x0, 0x0, {0x3}, [@FOU_ATTR_PORT={0x8, 0x2}]}, 0x1c}, 0x1}, 0x0) [ 197.158774] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 197.181904] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 197.191618] netlink: 'syz-executor3': attribute type 2 has an invalid length. 14:58:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r1, &(0x7f0000000280)="df", 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='openpromfs\x00', 0x101000, &(0x7f0000000300)) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x50022, &(0x7f0000000540)=ANY=[]) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 197.281839] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 197.506601] serio: Serial port pts1 14:58:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000000000), 0x2) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000080)) 14:58:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe004, 0x1, &(0x7f0000000380)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000340)=ANY=[]) init_module(&(0x7f0000000240)='vboxnet0[/usersecurity#vmnet0ppp1\\-\x00', 0x24, &(0x7f0000000340)='vboxnet0[/usersecurity#vmnet0ppp1\\-\x00') mount$bpf(0x0, &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='bpf\x00', 0x2201001, &(0x7f0000000300)={[{@mode={'mode', 0x3d, [0x36, 0x30, 0x33]}, 0x2c}, {@mode={'mode', 0x3d, [0x32]}, 0x2c}, {@mode={'mode', 0x3d, [0x37, 0x35, 0x37, 0x36, 0x34, 0x36]}, 0x2c}]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) readv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/22, 0x16}], 0x1) getdents64(r0, &(0x7f0000000080)=""/59, 0x3b) 14:58:16 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) accept4$inet6(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x1c, 0x800) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000000100)={0x800000000000000, 0x0, 0x1000, 0x0, 0x0, 0x8}) r2 = accept4$inet6(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c, 0x80800) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='lo\x00'}) r3 = syz_open_dev$audion(&(0x7f0000000440)='/dev/audio#\x00', 0x80000000, 0x10000000006) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000380)={r4, @remote={0xac, 0x14, 0x14, 0xbb}, @multicast2=0xe0000002}, 0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x7, 0x20}, &(0x7f0000000280)=0xc) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000002c0)={r5, 0x4}, &(0x7f0000000300)=0x8) r6 = getpid() capset(&(0x7f00000003c0)={0x20080522, r6}, &(0x7f0000000400)={0xffffffff, 0x4, 0x1, 0x7fffffff, 0xfffffffffffffffe, 0x100000000}) 14:58:16 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x80) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000080)={0x5, 0x20, 0x9, 'queue1\x00', 0x4}) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x1000009, 0x2032, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000040)={0x20}) sendfile(r0, r1, &(0x7f0000d83ff8), 0xffff) 14:58:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x60, &(0x7f0000000080)=ANY=[@ANYBLOB='mdf,\x00\x00\x00\x00\x00']) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000100)=[{0xb873, 0x8, 0x80000000, 0x3}, {0x5, 0x6, 0x0, 0x24aa}, {0x4, 0x40, 0x4, 0x4}, {0x7, 0xf841, 0x7fffffff, 0x2}, {0xfffffffffffffffc, 0xb29e, 0x8, 0xe54}, {0x2867, 0x5, 0x5, 0x20004}, {0x122, 0x9, 0x7, 0xa72}]}) 14:58:16 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x9, @empty, 0x7fff}, @in={0x2, 0x4e23, @broadcast=0xffffffff}, @in={0x2, 0x4e21, @loopback=0x7f000001}, @in={0x2, 0x4e21, @broadcast=0xffffffff}, @in6={0xa, 0x4e20, 0x6, @mcast1={0xff, 0x1, [], 0x1}, 0x7}], 0x68) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(r1, r1) r2 = open(&(0x7f0000000000)='./file0\x00', 0x26100, 0x20) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000040)={0x3, 0x0, 0x34, 'queue0\x00', 0x1}) setresuid(r1, r1, 0x0) 14:58:16 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x2}, 0x1c) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x7f, 0x4000) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000080)={0x0, 0xc, [0x8000, 0x81, 0xaa]}) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) 14:58:16 executing program 3: r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={"74650600000800000600000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0xc201}) 14:58:16 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x8102, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000040)={@dev={0xac, 0x14, 0x14, 0xa}, @loopback=0x7f000001}, 0x8) modify_ldt$read_default(0x2, &(0x7f0000000080)=""/10, 0xa) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f00000000c0)=""/189) connect$bt_rfcomm(r0, &(0x7f0000000180)={0x1f, {0x6, 0x100000000, 0x9, 0x401, 0x8, 0x8000}, 0x7}, 0xa) sched_yield() ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0x2d) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000200)={'bcsh0\x00', {0x2, 0x4e20, @broadcast=0xffffffff}}) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x3) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000240)) ioctl$KDSETLED(r0, 0x4b32, 0x9) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000280)={0x80000001, 0x0, 0x6, 0x100000000, 0x6b80}) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f00000002c0)=""/116) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000340)={0x0, 0x7ff, 0x6, 0x7f, 0x4, 0x3, 0x1, 0xffffffffffff7a2e, {0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}}, 0x3, 0x80000001, 0x3, 0x7, 0x2}}, &(0x7f0000000400)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000440)={0x0, 0xf, "349d094af15e3ae7f49e57a6a006aa"}, &(0x7f0000000480)=0x17) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={r1, 0x3, 0x2, 0x600000000, 0x2, 0x8, 0x9, 0x1, {r2, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}, 0x51, 0x5, 0x2, 0x4, 0x6}}, &(0x7f0000000580)=0xb0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x80000000) r3 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f00000005c0), &(0x7f0000000600)=0x4) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000640)) rt_sigtimedwait(&(0x7f0000000740)={0x7}, &(0x7f0000000780), &(0x7f00000007c0)={0x0, 0x989680}, 0x8) getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f0000000800)=""/123, &(0x7f0000000880)=0x7b) bind$inet(r0, &(0x7f00000008c0)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10) ioctl$KDSKBLED(r3, 0x4b65, 0x0) write$binfmt_elf64(r0, &(0x7f0000000900)={{0x7f, 0x45, 0x4c, 0x46, 0x89, 0x9, 0x7, 0x8, 0x800d, 0x0, 0x7, 0x3, 0x1df, 0x40, 0x321, 0xd4c, 0x9, 0x38, 0x2, 0x8, 0x1, 0x6}, [{0x0, 0x33, 0x7, 0x3, 0x7f, 0x40e, 0x6, 0x3ff}], "5108afc50b53c26f6c1edb405b2122f0ff6f2bd39584f05c5da5d7226a3b3eafe1c7c4b60651c83e5d5709da", [[]]}, 0x1a4) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000ac0)) accept$unix(r0, &(0x7f0000000b00)=@abs, &(0x7f0000000b80)=0x6e) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000bc0)={0x1, 0x0, 0x40, 0x3, 0x8}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000c40)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000c00)={0xffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000c80)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x100, @loopback={0x0, 0x1}, 0x3}, {0xa, 0x4e22, 0x3, @mcast1={0xff, 0x1, [], 0x1}, 0x5}, r4, 0x8e}}, 0x48) 14:58:16 executing program 3: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) truncate(&(0x7f0000000180)='./bus\x00', 0x4000000000005) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$fiemap(r1, 0x40086602, &(0x7f0000000140)=ANY=[]) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000080)={0x4, 0x7, 0x1, 0x8, '\x00', 0x1}) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r2, 0x28200) sendfile(r0, r0, &(0x7f0000000040), 0x8000fffffffe) truncate(&(0x7f0000000140)='./bus\x00', 0x0) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x7ff, 0x40000) 14:58:16 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffffff1b207f5c5eeb86dd60634a7300163016c2896a1bff74baa9146700fe800000000000000000000000000000ff02000000000000000000000000000100000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], &(0x7f0000000000)) 14:58:16 executing program 6: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, r1) prctl$setmm(0x23, 0x1, &(0x7f0000ffb000/0x3000)=nil) setuid(r1) 14:58:17 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish-generic)\x00'}, 0x58) getpeername(r1, &(0x7f0000000140)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f00000000c0)=0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e24, @rand_addr=0xd99c}}}, &(0x7f0000000280)=0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000002c0)={r3, 0x7}, 0x8) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d66593ae164c990a0028e", 0x10) r4 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000002900)=""/4096, 0x1000}], 0x1, &(0x7f00000027c0)=""/183, 0xb7}, 0x0) 14:58:17 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x1e800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, &(0x7f0000000240)=ANY=[]) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) r0 = syz_open_dev$vcsa(&(0x7f0000000640)='/dev/vcsa#\x00', 0x3f, 0x1) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000680)=@assoc_id=0x0, &(0x7f00000006c0)=0x4) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000700)={r1, 0xe3ff}, &(0x7f0000000740)=0x8) 14:58:17 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000064e000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f00005ebff8)=0x3f) write$binfmt_misc(r1, &(0x7f00000000c0)={'syz1'}, 0x4) r3 = dup2(r1, r2) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000500)=0xe8) getsockname$packet(r3, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000600)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000001900)={'vcan0\x00', 0x0}) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000001940)={0x0, @multicast1, @remote}, &(0x7f0000001980)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000002bc0)={'team_slave_1\x00', 0x0}) getpeername$packet(r3, &(0x7f0000002c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000002c40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f00000030c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000003080)={&(0x7f0000002c80)={0x3f0, r4, 0x2, 0x70bd29, 0x25dfdbfb, {0x3}, [{{0x8, 0x1, r5}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r6}, {0xb4, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0xf4, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r11}}}]}}, {{0x8, 0x1, r12}, {0x1d8, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x34, 0x4, [{0x5, 0x9, 0x46, 0x7703}, {0x7fff, 0x6, 0x3f, 0x200}, {0x7, 0x9, 0x4, 0xb4}, {0x2, 0x5, 0x8, 0xfff}, {0x0, 0x8, 0xbc, 0x25e5cd19}, {0x101, 0x10001, 0x3, 0x838}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x40}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r13}}}]}}]}, 0x3f0}, 0x1, 0x0, 0x0, 0x4000}, 0x20000010) 14:58:17 executing program 6: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x105082) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000000)={0x1}) r2 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x0) pwritev(r2, &(0x7f0000002480)=[{&(0x7f0000000040)="e0", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) madvise(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x9) [ 198.312672] FAT-fs (loop1): invalid media value (0x00) [ 198.318085] FAT-fs (loop1): Can't find a valid FAT filesystem 14:58:17 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@swidth={'swidth', 0x3d, [0x37]}, 0x2c}]}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x1ff}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000001c0)={r1, 0x7, 0xab, "f908a4c28c65b07ad52f49692720753ea225cd6411543915a7b330a73dd2462ce4c69173bab96b551bd5493ac7789d9a7d22273af16e6d97fc1d1c68941adff415bfb1b3204f9511234b73dc7f9bb26fbc0265f3191ea04d2aa91d5ff1cf128a2dc9a5596f7fb82295717dcd12d58b24526c3eb3543420cb3cf9ae433b45581284624e2340db88f62c5d0b60bfa4605ae1daaa42822c37926a7661a1e9890b36735e3b2d3e6b3d0b2a3e4d"}, 0xb3) 14:58:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95}}, &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) r1 = dup2(r0, r0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x32, &(0x7f0000000100)="4fca84fd07d0f0f860125acaf7fc", &(0x7f0000000140)=""/50}, 0x28) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x8080, 0x0) write$binfmt_elf32(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xffff, 0x100000001, 0x1, 0x3, 0x3, 0x6, 0xffffffffffff8682, 0x86, 0x38, 0x382, 0x47, 0x7, 0x20, 0x1, 0x81, 0x8, 0x249c}, [{0x6, 0x6, 0x4, 0x5, 0xe2, 0x3, 0x1, 0x1}, {0x7474e557, 0xfffffffffffffffa, 0x8001, 0x100000000, 0x1000, 0x7, 0x7, 0xfffffffffffffff7}], "183b89200134a8f9c65b6de8b5fbf40288391941498773d619b3db4ceadc4ed61ea6afc1ea3d7dc7c653e000a220ef28c41a69e1323ff2aa40f68e58a0e6c0c783588219b1c36387aacd047571a6d2f68c028194888ba8d2307a8349607c55f47de4b0e63b8a8858e79537aa67f41dd9ea090e0d58e5e6d5968c736d8b8acde2f21042", [[], [], [], [], [], [], [], []]}, 0x8fb) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r2, 0x800455d1, &(0x7f0000000200)) [ 198.359724] FAT-fs (loop1): invalid media value (0x00) [ 198.365126] FAT-fs (loop1): Can't find a valid FAT filesystem 14:58:17 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2200, 0x0) accept4$llc(r1, 0x0, &(0x7f00000002c0), 0x800) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x2041, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f0000000200)=""/102, &(0x7f0000000100)=0x66) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0xa0a40) setsockopt$inet_buf(r3, 0x0, 0x11, &(0x7f0000000040)="f60159a6ee1ec2d0cfefa78493a2d93c86a1cc2c3e6038ce2ef57efa13190e513bf4fc478af2c1817b3646151b13c2f7e532b601ec2e3129b9ffd696b32986c117d2c226e00d0b0d373ca61b65b59045e02160a2442022ce30ae780287bc20c4b7b1297e01a8947e420836e0c3ce7cd7097bde0d5519ed60944843ec714f79", 0x7f) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$hfs(&(0x7f0000000140)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f00000016c0), 0x0, &(0x7f0000001780)={[{@creator={'creator', 0x3d, "089bc8c7"}, 0x2c}]}) 14:58:17 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x803, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f00006e1000)=0x7f) readv(r0, &(0x7f00005a6ff0)=[{&(0x7f0000597000)=""/4096, 0x1000}], 0x1) [ 198.450883] XFS (loop6): sunit and swidth must be specified together [ 198.482587] hfs: can't find a HFS filesystem on dev loop5 [ 198.485894] XFS (loop6): sunit and swidth must be specified together 14:58:17 executing program 6: request_key(&(0x7f0000002000)='asymmetric\x00', &(0x7f0000001ffb)={0x73, 0x79, 0x7a}, &(0x7f0000001fee)="3a74fac5670000002f5c0300000000000000", 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0xe) 14:58:17 executing program 1: r0 = open(&(0x7f0000000200)='./bus\x00', 0x141046, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'ip_vti0\x00', 0x3}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000300)={0x0, 0x0, 0x1, 0x0, 0x0, [{r0}]}) [ 198.538197] hfs: can't find a HFS filesystem on dev loop5 14:58:17 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070") openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000200)="7f2c8928b8a9ebe810f20322ee9d945517fb8d42a0e040e95fd6a6db2ec272947edd32e901b9339a7c6c6a5fcb4d64bd00be2e269507530f863aec2d71811e9a7e508480dcfc1d992887538dbbe62c656f", 0x51, r3) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r5, r5, r4}, &(0x7f0000000280)=""/132, 0x84, 0x0) 14:58:17 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdfffffffffff, @perf_bp={&(0x7f0000a7dfff)}, 0xa000003fe, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) fcntl$notify(r0, 0x402, 0x80000000) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x100) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000100)={0xfffffffffffff006, {0x2, 0x4e22, @multicast1=0xe0000001}, {0x2, 0x4e20, @loopback=0x7f000001}, {0x2, 0x4e20, @multicast1=0xe0000001}, 0x50, 0x42, 0x5, 0x0, 0xffff, &(0x7f0000000040)='bpq0\x00', 0x7, 0x9, 0x88a}) 14:58:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r1, 0x0, 0x8}, 0xc) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x10000, 0x2200) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000080)=0x4) 14:58:17 executing program 1: r0 = socket(0x1000000010, 0x802, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000240)=@buf={0x5c, &(0x7f00000002c0)="040babcb035e6fc949cb9503026c134eb9da704b0e38f27c699cf66a585b3273a710f5a7b5c5e5eb7cc30abd72b61ea156c4d79d2685cc03310c0a75a2b0d6eaa2ae3e489028bba28bf8851c96718b65f30153bf70d3a2dcc5cbb983"}) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000340)={@multicast1, @dev, 0x0}, &(0x7f0000000380)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'vcan0\x00', r1}) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') ioctl$KVM_ASSIGN_SET_INTX_MASK(r2, 0x4040aea4, &(0x7f0000000000)={0x100000000, 0x3, 0x1, 0x3, 0x9}) writev(r2, &(0x7f00000011c0)=[{&(0x7f0000001140)="08a2511e1c4b2dcb", 0x8}], 0x1) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000640)=""/193) getuid() socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r2, r3, r4) ioctl(r2, 0x400, &(0x7f0000000140)='z') sendmsg$nl_route(r0, &(0x7f0000490000)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00002c9ff0)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080)=0x4, 0x4) getsockopt(r0, 0x4, 0x800, &(0x7f0000000400), &(0x7f0000000440)) ioctl$KDDELIO(r2, 0x4b35, 0x8) getsockname$packet(r0, &(0x7f00000000c0), &(0x7f0000000280)=0x14) 14:58:17 executing program 6: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x0) r1 = socket$inet(0x10, 0x3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000062c0)={0xf, 0x5, &(0x7f00000001c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x1810}], {0x95}}, &(0x7f0000000240)='GPL\x00', 0x3, 0x1000, &(0x7f0000000280)=""/4096}, 0x48) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000300)="4c0000001300ff09fffefd956fa283b7000068b100000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) 14:58:17 executing program 5: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x4, 0x20000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f00000000c0)}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r0, &(0x7f0000000780)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000500)=@newae={0x220, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfe, {{@in=@dev={0xac, 0x14, 0x14, 0x1c}, 0x4d6, 0x2, 0xff}, @in6=@dev={0xfe, 0x80, [], 0x19}, 0x8000}, [@coaddr={0x14, 0xe, @in6=@mcast2={0xff, 0x2, [], 0x1}}, @sa={0xe4, 0x6, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x4e20, 0x9, 0x4e24, 0x0, 0xa, 0x20, 0xa0, 0x6c, r1, r2}, {@in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4d5, 0x6c}, @in=@broadcast=0xffffffff, {0x7, 0xffffffff, 0x5, 0x6da30c89, 0xff, 0x401, 0x1ff, 0x8001}, {0x3, 0x80000000, 0x1f, 0x9a}, {0x0, 0x8000, 0x6}, 0x70bd29, 0x3507, 0xa, 0x1}}, @extra_flags={0x8, 0x18, 0x401}, @output_mark={0x8, 0x1d, 0x9}, @replay_esn_val={0x24, 0x17, {0x2, 0x70bd2d, 0x70bd29, 0x70bd2d, 0x70bd27, 0x10000, [0x4, 0xbaf5]}}, @migrate={0xb4, 0x11, [{@in6=@loopback={0x0, 0x1}, @in6=@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x33, 0x0, 0x0, 0x34ff, 0x2, 0xa}, {@in6=@mcast1={0xff, 0x1, [], 0x1}, @in, 0xff, 0x0, 0x0, 0x0, 0xa, 0xa}, {@in=@dev={0xac, 0x14, 0x14, 0x1d}, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x7f, 0x0, 0x0, 0x3506, 0xa, 0xa}, {@in=@loopback=0x7f000001, @in=@rand_addr=0x8001, 0x6c, 0x4, 0x0, 0x3502, 0xa, 0xa}]}]}, 0x220}, 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="cf000000030000000002bf37d5ab3ed436471a02d8ebaf1993ebdf9122cb2f95bddeec4e9e1918d5586cfb2d64075b22afec87a9bc0d368432b8777d51c3b98bc69130aee32cdd491b625125"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x3000000, 0x55}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) 14:58:18 executing program 3: r0 = socket$inet6(0xa, 0x80000, 0x8008) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x5}, 0x1c) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000240)=0x54) r1 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x2000) setsockopt$packet_int(r1, 0x107, 0x1f, &(0x7f0000000180)=0x1000, 0x4) accept$unix(r0, 0x0, &(0x7f00000000c0)) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x5, 0x4) socket$inet6(0xa, 0x1, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000280)={0x0, 0x3ff, 0xfff, 0x80}, 0x10) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000100)=0x5) socket$inet6(0xa, 0x80000, 0x7fff) 14:58:18 executing program 1: mlock(&(0x7f0000002000/0x3000)=nil, 0x3000) munmap(&(0x7f0000001000/0x2000)=nil, 0x2000) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x8000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)="2763e39d629b4f1b2cda95f373db2b3a77d318ebfd4a4edabecd50832a07d5ff9b2c3651b2e1beae26fa45e4207c1ce00b04cf253950fa7abeb33ff2b5e74f3f780d1b035a5c196ae5", &(0x7f00000000c0)="25222b44d398ad42c9669ab2afb06556a259f5c64077dff5a2916bc3d72ecabda0c2dffd88f8b6f803ef82f56cb39f1f3168b776ca5e83757c626f93325443a774ea0e", 0x2}, 0x20) 14:58:18 executing program 5: r0 = gettid() ioprio_get$pid(0x2, r0) prlimit64(r0, 0xd, 0x0, &(0x7f0000000000)) 14:58:18 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x20000000000) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x5}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x4c, &(0x7f0000000040)=0x1000000, 0x4) 14:58:18 executing program 6: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x4, 0x101) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000080)) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = gettid() sched_setattr(r3, &(0x7f0000000000)={0x30, 0x0, 0x1, 0x20, 0x5, 0x7, 0x9, 0x9}, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r2, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = dup(r0) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0xb, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0x142) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000000c0)={r5, 0x3}, 0x8) 14:58:18 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="757365667265652c71756965742c6e668c2c747a3d5554432c00"]) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file1\x00', 0x400, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000080)="af8d54821f359b99d303165f197f6d401daa8fa379954a673606dafcdc07f3f2a677bfca4428b8ee62dd4ed5d24db6d733aedece61a964e9d1cb5ce048d7c46c42b708be1a6e1771b5818d8f5f3e", 0x4e}, {&(0x7f0000000180)="99c35ea4d5876ad13642f5a99e7bbd4583fdda0f280c8bed9bfdb53302bfdf7eee465fe9adb4aa37161bbfd49c1a02c31e8bf3b6eabd1212e179e752f5392005f37fa769bbb943fc72795a5ab8bec7632e084ae3daf276215e4cb57b86fdfa217e65b110cff50d639e88b6e728617936a404d9ada3e13ca2698e078521102fe9", 0x80, 0x7f}, {&(0x7f0000000300)="e7ddecdbb51031de692274cce3c0ad9557aaf738e33da393ab98ee990d91319a540c5b068dd00bcfa5dad73b9d8ab7b1ca51ce5092c65e770544573c32525a24c425d1dbd73bb182b286159b22d7cbe1415bcc24a0353898abb17db9cc4b7cf81b78f5726cff90c308d65f38ab3ec310ac8f2c2e12d84f949da70a97555c238eabdca1fbaeafb4cae6d51c1b636f114bb2eaf9d4547f1754defb1d6d629909bbef1e2758ab68c2a283251a3eeb2ce77944cc48a705f64f6cdba39c2ce84bbeafa1cdf5b0d2a33965e35e5c6f1eeb9c07e19f2eb8", 0xd4, 0xf45a}, {&(0x7f0000000200), 0x0, 0x6}, {&(0x7f0000000400)="ae1bc82e9a4bc7e8ede6842d64fcc9721586247bb3415f574908e546cd7312e57bae4d630efcc4f7ef05de4f9e5082fdba0604aee16139872c718fbbc6e2a45fdf50bc24e6e7cd3394c5eb65f4a21f3f6ab8272d7f391c9858be88d2d23b840edef2b9a672df45c579a217a8b4feeeff179a3066de8461cef4bb7a4f205b86d029840c1373650982d43d1ffb3384e9ccc4beaa5ff7e1632ee1c716b6f2dcdedcbb665b6fca3840de9a6bbb3d0d191cbea63e532d60313c53", 0xb8, 0x3}], 0x2011004, &(0x7f0000000240)={[{@utf8no='utf8=0', 0x2c}, {@uni_xlateno='uni_xlate=0', 0x2c}, {@uni_xlate='uni_xlate=1', 0x2c}]}) 14:58:18 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$inet6(0xa, 0x7, 0x80000001, &(0x7f0000000000)={0xffffffffffffffff}) connect(r0, &(0x7f0000000040)=@generic={0x0, "dfa6acd13e845f234b6e7779ba0066c16c5b1a58475f3d2bc5730d02e0866a549ddc8e46e87b3c69a56307cc1c48ade81206ce2b2599312d9808b54184ee26dec54552fb93c637e6fd5a8a672dfb6ebc5b3e87911920ccc18c95a7c90a111657b7ce380159013fa4f6787e82cf71bdc445ffa4ded3ce12106fbfaf250a0f"}, 0x80) mount$9p_fd(&(0x7f00000000c0)='vboxnet0keyring!\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7472616e732d66642c706f72743d2c7266010000002f6c77050000003d35eb8c"]) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x20000, 0x0) sendmmsg(r1, &(0x7f0000003300)=[{{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @my=0x0}, 0x80, &(0x7f0000001800)=[{&(0x7f00000003c0)="7f504f63eab2310f7e74870d42fe13be27d5e498a2d3111bdfced0cbe9cca7a1e1cc37a26bcba255825535484d53da81d869520a4ee71f49eae6972acf8198e458d8c23ccc742598945b9fd3bed8bf1415fc1734e2ed44af311775767c7f7d57af1d8710db22a920f69a0bd24f789924fe2f2135598bb8536c1b041f31e91ca45bfa4e02d07c6eb20e216df4055ebbc95a9f00faaf59cc6104eb60516c9eb04466ab696864ecd12092cdaac5a1f45353b52f69ae7e1b61608bd5d82643b4741ec73c2634e586023c22a17989", 0xcc}, {&(0x7f00000004c0)="04c2b098c10881333c92ac564eddddccfcb316890273dcfc8166dcbb6b581299ac2ef171f9cdc6bc75aa3cfe5b98069384cf20e68922d816eab93fcac0bc4ea66203cfd9ac68cecf317535a09fcce1daac55888e709647533867bd39c4960c61ab9c447338fa7999965ff6443433d14509d284c8eb477602863f7a539e0df42e040d60ba48556f20b8cc0d7f69b75686cb8247f0dd07bbbf73da8a3fa19db19cd113747421e46378971a4cb978e0ce0eab07f373e41d11bef8c4c3a2aba9f35bc9c2512d39d261f4c8dc2988dc6d5bc7cb17e4b2e66037db1e3f6f06cb", 0xdd}, {&(0x7f00000005c0)="c13c8dd3ac93e4a4cd9234285fe9f3728a065a21e05402dfabb36a16cd5ac74d227ab971c2d0ed6bcb835cc78acf74f7f538424a42b2e2d542c0d23a756060f33483caeb17e204b380f2fae55e8bdd16d6deacd3d045c7e0d72b355961096aa74b604b8d7b5ec57638404fee2dba765e2db99829873fb3cbcb8914e8e643f4f57c06370dad8fae4a5eabcacb404bc21703026ab5538acd75def1743e726abdb4d140b60bac26437ef04e9b18e862cc61dcfa835db01e3207a0303740", 0xbc}, {&(0x7f0000000680)="acb66a44f2572c8880daccda52a95b0a8b69583eb3e0ab168caf06ce196f8202c634a88f8370457e33053108e3aa5acc7b2a8b40219b146a0547878d5d37c95b9a461adce114fce7c94e7c8a5056e57c48663919ecaa5bbd6e074eee88cf3331396b0cae05894315ae8e98ff20861aed8bb169c7d6b4c0c5a06ad97e927d347ed5d3b3bf93e24a3c623ca1a4", 0x8c}, {&(0x7f0000000740)="9bc7cdffa378e976548047f085a185c78f242cd1692993db3c7fc3e34237b70b32884c1f1b6a2788b4af444c787463f167b6f25462f06a31eb90c1e7085e356a37c420c0f1301dc00f206baacbc5888637995d5bc332f3dbae20518aea882d729a0a705138a0619d95cffe5969aa8e66d9a5b072c3e0c95d0a18ed02391665d8e0626e8662bfcc81c8c2d0d31333978b6ef216ec15f5822618a68f264566c55ea4b5d40b3d7b144b5c8df4358b7083364968c1a92f99a1dce369d926ff", 0xbd}, {&(0x7f0000000800)="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", 0x1000}], 0x6, &(0x7f0000001880)=[{0x58, 0x10c, 0x200, "088b1a2871c73afd2abae82bcfe19fd46c6056eeec6d46d28088f4b2f1d30fbbc6f6359eb7ffcc3d6df27fcd39757fc106347cc33981bd24fe3ea4536ef7b4e495fa1c55d30ec8"}, {0xf8, 0x12b, 0x1000, "ad8862958cd2836635f3adb29ef20d078324999d50b3052ea2291777d30c6b1b724bc119c96df1f96195d48dfaece315f538a4cca033969472a34730249aafae2e2725482679001e058380cf1925e7d0cf4d1cb26e8915afbb6257eb0e96129f9992d8786b274b845bc1d284fe43be49dabdb313e2a070a099f8ced4d9f3cdbc38572d94872aa223dc42a38380d77e837291bbf25478a8a2d23a538e365ec31ff98665a7b5961db591b0e2020ba2fbfc65fa46a5fb28749035582f29df3406483af32dc1344181f919f895ffca2ca257e3be9286f04db5ee0f28a3110515bd63375fb7d4"}, {0x10, 0x107, 0x2}, {0x48, 0x102, 0x1f, "1b88cd7e5e23258a64d54b15dc26577ec28058960fc0c79512f5782bea4ff4a29812ad71b5c017dd4eb8ee18affc1b564aa76d83c0a4"}, {0xe8, 0x111, 0x5, "9c8fdedbdd547f95dd027b656d13f5887d6da378971af26059b381649e29e07ff1102c80be413c888cc02b212a6785780c58f207a2d08623abb307eb5f263490690b87f2748644f5061c48924ee7e7b2502fff7c93435e29f6bb9a6abecdf671d2027369f2e2837c9fea6124d71fd8581cabf9cc2c32e1e3f41d2cd40cea3e2e9606226900a01e3b98b39a101f835b5447a352e4203478d081281daa2cff3a21727d506616f6a6f6fa9fd51e03e623f2d74659ab4d9c759157a592f66b43b15e91991f03f2a279da3d082eb207b65cbf761941d0d509784c"}, {0x78, 0x10e, 0x7f, "55c5f766afb30359c7f9b3de01e575a8ce7368eb5ecfdd1bf55b0b2fca55ccca6873b73c674b51c778e83a84fc469344c270d770d568ebca5b0c29c1ee1e86c718c63ebdd70de21516f171ad47b4e4bddf1eb14e430cb159c872dd6db41b356f6a"}], 0x308, 0x4000000}, 0x5c}, {{&(0x7f0000001bc0)=@ax25={0x3, {"e015ed616a59ea"}, 0x400}, 0x80, &(0x7f0000002f40)=[{&(0x7f0000001c40)="7630a02ef30c571de0e39037cd15765583438318ca534cec071493613588137f02e5dac245807c87f5a5403436c28958d8a768435f68155566aef3bff3fbed3f7226bd14023408d956b13156a25efeb420d4e7ee7429698c5bc7737c8fc6c41299e7e2ac5f948bde0a39ac016066f0427c210f949e7540374ed4ae302aecf5cf486aaf0a10c1868a7e6108b751be6a1ef6611ff19abe927296e0b84668cd100e19b9d388254e952e95ef4952cdbee7e992695749b10fa11e92a3a6f266ba18cf60c22094fcfa3a3e37e038338040b09edf5e28860553ea035a400040654fdfc7912f94dec92c92c49f72776ef9c4ffc3a3f22a", 0xf3}, {&(0x7f0000001d40)="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", 0x1000}, {&(0x7f0000002d40)="52c94615ad716de2ee691827da334bc3ece1c1c9444b149553bd0e4c1aefad3c5990d9d6a2a15dc8f4423f1e7647463a10d9e09d4de77d4a25ab62b77887f56d59b38a3e08b87bbe7351cb9bace08cecef1bf45370e4f3db6a328dfe38c1d8a702b4a61823e56be9105a600a6567aa7e86262858bfe6a41b3020ff04746efd5ea6ee9a8889d1729ee981f7d16eafc6cab9c9fa47c83caac58ccefdaa214b5bc649f57d6097fbacbb4fa1e1b31d2e5adc", 0xb0}, {&(0x7f0000002e00)="6f0b267b35f0f44f8256729e6c56d247da9623f657904e187da52af1c1e0370188f28af8d1f47cfe499f835458f0ba6e53b9357adfc7e4fe0c0f274ff9b39c3efb6d43dc960fb7b31578c842440fb32eebe742609f865a917ce82c57d56bce661b9196bd1202a6b17096a51f6491c479db35056af0050fcea070544d33ea79b370e5238bbd1cafb39e4e728f6c080331d53e65c177dc2fedb2c02e2cd7941059f0c29fcb9c7a0ff000b490bf9ccb6fad7ac09ee787a962a19b8002dbf2efbf1017bf9a4d51ff41511792bab7434cfdc2a5afc6a6c5c052", 0xd7}, {&(0x7f0000002f00)="f4aa530d0ad4fc2b4be54e2a7999de3464bab2d73e2b6a68129c179d82ccb229", 0x20}], 0x5, &(0x7f0000002fc0)=[{0x38, 0x11a, 0x4, "c6a7e7405a8ac029bedfe9f6f75bf3f665853a52a027858196e79fbf649c9a289cca21ccc9"}, {0x20, 0x108, 0x3, "fb15881b6ebdadc2b116c0d240f8f3fd"}, {0x78, 0x0, 0xfffffffffffffffd, "bfb881908f5da6b15919130ce852694f1ddd195cbfdb180598dd25394679eaf806f8b358eb718f9d0b64efa87bd076af94cc29920b4220b59c3c40a6fb68cd515b24694f49bc240499c9c5a747531c84ed7d0bee021148a7411edc2a5e576e9d340cae8ae3"}, {0xc8, 0x117, 0x100000001, "7cdb6771eeb670b0184b7f98e6ba60f815464280708ed900f25425de5ff39644f1eb6cb45d997ca0c166be5f3b3304600d9eca647ae045479ec65a1fbed8f68ff208b45ab06194becc1dc4c7c125511a5e8a43b12f2b0f92bee1b1e9827ec68d11287cf3fbd9f438b146161f0920b9125e4d1d92f90b7ae89783d5b9d6e1ff47ca917731bb1d60e3e2b8b22b2248116d8d8f99d4b0b4b24abfd90b89c7a2e0f4a875df11b4184fc56fe554c2e88d46756d6775"}, {0xe8, 0x117, 0x6, "ec3056341012f26455aa17ce8aab2a73940d901852470496f0dde4f6d6112df13420025e35ec46ddd879d5333b5fe48c0365807ff974fe178aaa9179e8045a470e553c54bdbcfb4b6d470188657c29fdb88caa07e24203a49b92fff07e0a461e15c4f9e1cfe21e4509f585fb1cc4b40e2021d81f758cc55435d1c0ae22daffa0da1c8ecb180ba0e2130e73d4e05cc07e3955aa50dbb33c86ad8c2ddb875c72a31a9fdb5b43e9e252debca3579948258c4e63ce9de7a62c01438542416bef6fe48bf72c51f7b4bd5227c2ee3ecc72f89cca9643a004a143"}, {0xa0, 0x119, 0x4, "56deb45f7c97f40dd58003ca69b099d84f9b6c4496ef6af0edf567ebaa884dab11088f1108a30fbf667cec53910a79f68120405249992d6122036dc8e44a7e6a6c870a279c422abfc90a99605c95c9af81c37ea80f8e065aeac1cb3f83583cfde9c341998491512350d1247b72eefd0e9ff9c7cbf2c921ebf4e9177737fa49528fc4cfcabc7e7f444a96fa"}], 0x320, 0x8041}, 0x7000000000000}], 0x2, 0x24000040) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000240)={0x0, 0x9}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000002c0)={r2, 0x1}, &(0x7f0000000300)=0x8) 14:58:18 executing program 3: rt_sigaction(0x4, &(0x7f0000000200)={0x20006f}, &(0x7f0000000240), 0x8, &(0x7f0000000580)) rt_sigaction(0x400000000000007, &(0x7f0000000000)={0x402470, {0xffffffbfffbff270}}, &(0x7f0000000380), 0x8, &(0x7f0000000100)) r0 = socket$pptp(0x18, 0x1, 0x2) mmap(&(0x7f000059a000/0x4000)=nil, 0x4000, 0x800002000000, 0x4010, r0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x10040) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f00000003c0)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/icmp\x00') ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) 14:58:18 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x208840, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x401000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, r3, 0x200, 0x70bd28, 0x25dfdbfe, {0x3}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000054}, 0x20048000) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000580), 0x0) ioctl$void(r2, 0xc0045c77) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000250000090243a9f8bf46beafd45cd652a432137b64b59cd75e1fc80865e241b3fbaf64f32973a9f2a43353c4da12518d41ba38d913d83360f1721835f43565b6f5c428d2ed27a95dfcd6ebc176d1cad13853a5a9b4f71f53eda384ece6acc09ad62ccb72a696fb48995d48e2d58bd73f2065c7fd4fa545ad5b0831838e2cf74a7b440cd5e39b4e4e9f5f2b7a139fc93ce5779ff2b4e71d7d61cc7aef4ce8453b2e5b6f5b19a20e1db3818dcb120e4ad57a"]) [ 199.436649] 9pnet_virtio: no channels available for device vboxnet0keyring! [ 199.454817] FAT-fs (loop5): Unrecognized mount option "nfŒ" or missing value [ 199.461310] 9pnet_virtio: no channels available for device vboxnet0keyring! 14:58:18 executing program 1: pselect6(0x40, &(0x7f0000000040)={0x0, 0x800}, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140), 0x8}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x8, 0x2}, 0x0) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f0000000200)={[0x0, 0xf000, 0x2004, 0x1000], 0xffffffff80000000, 0x20, 0xffffffffffffffe1}) 14:58:18 executing program 3: fstat(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = request_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000240)='keyring\x00', 0xfffffffffffffff9) keyctl$get_persistent(0x16, r0, r1) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) keyctl$unlink(0x9, r2, r2) [ 199.528833] FAT-fs (loop5): Unrecognized mount option "nfŒ" or missing value 14:58:18 executing program 5: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000005300)=[{{&(0x7f0000000040)=@ethernet, 0x80, &(0x7f0000001240)=[{&(0x7f00000000c0)=""/106, 0x6a}, {&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/81, 0x51}, {&(0x7f00000011c0)=""/117, 0x75}], 0x4, &(0x7f0000001280)=""/237, 0xed, 0x20}}, {{&(0x7f0000001380)=@generic, 0x80, &(0x7f0000002600)=[{&(0x7f0000001400)=""/52, 0x34}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000002440)=""/175, 0xaf}, {&(0x7f0000002500)=""/53, 0x35}, {&(0x7f0000002540)=""/98, 0x62}, {&(0x7f00000025c0)=""/60, 0x3c}], 0x6, 0x0, 0x0, 0x80000001}, 0x8}, {{&(0x7f0000002680)=@alg, 0x80, &(0x7f0000002b40)=[{&(0x7f0000002700)=""/72, 0x48}, {&(0x7f0000002780)=""/209, 0xd1}, {&(0x7f0000002880)=""/141, 0x8d}, {&(0x7f0000002940)=""/73, 0x49}, {&(0x7f00000029c0)=""/7, 0x7}, {&(0x7f0000002a00)=""/247, 0xf7}, {&(0x7f0000002b00)=""/20, 0x14}], 0x7, 0x0, 0x0, 0x2}, 0x38ac564a}, {{0x0, 0x0, &(0x7f0000002dc0)=[{&(0x7f0000002bc0)=""/50, 0x32}, {&(0x7f0000002c00)=""/80, 0x50}, {&(0x7f0000002c80)=""/248, 0xf8}, {&(0x7f0000002d80)=""/58, 0x3a}], 0x4, 0x0, 0x0, 0x1}, 0x48}, {{&(0x7f0000002e00)=@pptp={0x0, 0x0, {0x0, @loopback}}, 0x80, &(0x7f00000040c0)=[{&(0x7f0000002e80)=""/93, 0x5d}, {&(0x7f0000002f00)=""/114, 0x72}, {&(0x7f0000002f80)=""/4096, 0x1000}, {&(0x7f0000003f80)=""/248, 0xf8}, {&(0x7f0000004080)=""/41, 0x29}], 0x5, &(0x7f0000004140)=""/138, 0x8a, 0x8}, 0x8}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000004200)=""/192, 0xc0}, {&(0x7f00000042c0)=""/148, 0x94}], 0x2, &(0x7f00000043c0)=""/97, 0x61, 0x5}, 0x6}, {{&(0x7f0000004440)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000004900)=[{&(0x7f00000044c0)=""/254, 0xfe}, {&(0x7f00000045c0)=""/160, 0xa0}, {&(0x7f0000004680)=""/163, 0xa3}, {&(0x7f0000004740)=""/72, 0x48}, {&(0x7f00000047c0)=""/153, 0x99}, {&(0x7f0000004880)=""/83, 0x53}], 0x6, &(0x7f0000004980)=""/142, 0x8e, 0x55c}, 0x2}, {{&(0x7f0000004a40)=@un=@abs, 0x80, &(0x7f0000004b80)=[{&(0x7f0000004ac0)=""/6, 0x6}, {&(0x7f0000004b00)=""/115, 0x73}], 0x2, &(0x7f0000004bc0)=""/139, 0x8b, 0x9}, 0xe5}, {{&(0x7f0000004c80)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000005000)=[{&(0x7f0000004d00)=""/163, 0xa3}, {&(0x7f0000004dc0)=""/222, 0xde}, {&(0x7f0000004ec0)=""/180, 0xb4}, {&(0x7f0000004f80)=""/116, 0x74}], 0x4, &(0x7f0000005040)=""/245, 0xf5, 0xff}, 0x80000001}, {{&(0x7f0000005140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000005240)=[{&(0x7f00000051c0)=""/73, 0x49}], 0x1, &(0x7f0000005280)=""/125, 0x7d, 0x4}, 0x5}], 0xa, 0x10040, &(0x7f0000005580)) r3 = syz_open_dev$adsp(&(0x7f00000055c0)='/dev/adsp#\x00', 0x8000, 0x400000) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000005600)={0x7, 0x2, 0x7, 0x1000, 0x80000000, 0x2e43}) lstat(&(0x7f0000005640)='./file0\x00', &(0x7f0000005680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000005700)=0x0, &(0x7f0000005740), &(0x7f0000005780)) lstat(&(0x7f00000057c0)='./file0\x00', &(0x7f0000005800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r4, r5, r6) getresuid(&(0x7f0000005880), &(0x7f00000058c0)=0x0, &(0x7f0000005900)) sendmsg$nl_netfilter(r2, &(0x7f0000006bc0)={&(0x7f0000005940)={0x10, 0x0, 0x0, 0x2813000}, 0xc, &(0x7f0000006b80)={&(0x7f0000005980)={0x11e4, 0x2, 0x6, 0x21, 0x70bd25, 0x25dfdbfc, {0xf, 0x0, 0x1}, [@generic="bf3c546c71ea1d822b9df41c31154f089e93aa14f75bfbc1da7db61d5e17b49d7774bacaf2fe9f799693dcff6bcc1527cef52fc5fc0d89566675be416b4b1c8dcf0b625cc15040fae7ee16479e447e51de0c8e2abd9f891643c11aa53d3f09cff0f402e296205b177c25f3eac2dd0e3ecbdc2105", @generic="5dd9018140844a969e59f3b1bf1e6d8b52c325d6690e119f174d20a097fde03b", @generic="a40cf628159ce3f6b196a80b354a4d8f4ae349d7d2ad8acafec35d7c04eb7a4268aeb4636c9f1c2ae512475e18fbf581556ff2f93b4649804ece2b2ad9a2701c0e2a2284bb39c4e6627304e4408f46e4df9f0fb3b24d4cab9adedd7d05bcc71c7ea14817b1591daab71708674904dbc48de3259ae22b7cded808ad54a08303dc", @nested={0x10bc, 0x58, [@generic="d5541f490a669212c8d44d2c057d969717bf35058a59779f6f6fda1f912d666f17e0091e34cd24dd32ee1a3f7d7e84eee925d08d4624e558f5ee5507c445f2da", @typed={0xc, 0x3c, @u64=0x3}, @generic="902ccb5dca6c99b568abaf5532123d5d929bfa218c0bc30efd0d9020d28fffc5f41a67ea71f1950a4677619cb2550744c56ec4ba4047e01ab9795e8cb60585001856f46d9dd5ea0fe5624b02572824a5a310c06773e1a3e981d988655843a366a45359f5ec88b5a98d4fcfd8d37137081125e399e0c866d61132f11164b18528bb51adcbc6e276c2d8e5cafbb90c3edc69a09004aea87d307b873b3cee0b1de4709898a0b94f47c42736da9f4d93c608702b0ada5df1c022f7f9497da219090d38cbcc908e8fc61e0dfa56388ccf167d9b6d04931211943e3d343ac29ebf16a0e040e44c9a41e419875a8b2a9b01af8bdd4201a3952d84ec9f034c62bf07cd5711f0c2812bd4ce12f4c8b41939bd18ef098f989773f23b8fe52ea8bdde8979b21cd307453e19dbcf7159cfe160cc77eedc3cb8ac69c2cfa29871350126c899c85e6aab04c41037d41c9c107ee7cd81abf40319d17bdca0c630eb5a8f23b4022627e3940bfd123b969b40f7f5f0ab07c83d0d626b9503d5d649244daf14b80bb7ad1e1c0baf7cab5d88a7dbfd46affe14729f9a849e746d40c09b4346ffa48680441754f4704dc5a7168dce9955ea019f3ae08a91dc0099c813f6620579f003e3169a4d8f9596b5a7856bfd2dbd3160edecd7db8043dbdb72b8ecd7d33e489633fb3db51b456b2f3ef5543ca20ba39adb2dc4657f2fc5bec2f28f08dfca1f048c5cd4affbb28f70de01b54bfae9ffdc21765afb29143d9ca36021ce31afd1d4d8240f1af10e1261aa6904bfd6234ea05abc3b07d46a1c4cc9e9b1d74d654eb69dbf6a82dd91c1b7bef7a0357af400246c2dc9e1e15b624a36963736530042fa11d7bf61e43e15920972e0418ca1611294c121052017c12138a42c60ca85f071fbe3a4f8d35c2a0e1c4eabc1ff051bfcd02671d85c53909665d6e6339102ccb0176b660c385a888353a30b9e9a6f244a2a90057fc8d5143746819ef327ddf851a5f293d5761a91a92618e2cf3576b0f91508f9342e57fc6dc6da777c62df435a1c3e99a3a263b99db45782e791df7c25ffd48c4164c3c29caac630912bad29880b73c6651ecf778ae6f9cc2f5572912774b766ae0ced73b268d74b32ed14f20c14ed43eb89b8db5ba99eb6595b00c64f6f4528a32c03a3519edea4c65e953aef819aa188a1164e36d32474db724e15da94dfc10d170b15ad57c14302f481c157365cef4b0cb62a743eff4a506f10193104a17057d4d679a477371b9d1f151b142e68c8664439f2909292730dc197fcdf4d379c5061962ccca78d83ace7c89fe45b3bd1759d6d8b64b301e7641b5e8478a41b84388814fa4fb43efd9ac14f714b710e24107dda11abd3867894e3d2e5c18eb354fe6b7aef68f24b6591e3ee8168a6332505e3aa0359f56eb574c311de58ccbbd91e4116d0fa5d509ac9e73666fc6a172980b2b2886ab33794cae615afc8c2ecfd58411f683f9ddc5bd2a94676743d0e05f543a3a31a38d3d479f01f74e0f9ebc8c32f64944d1396758a98a397f94aacfb43e99832e246f31b46d20230151d450021b767d41028632c54a59153a136688ebcc0a77bf4af0d0d3eebf45de2ce915718604952cdd55fcd7bff41e5f15614bb6166e737240e7cf6f1c16eb676d169709dd06085bc7a4469c1730f4d999eb7ba7ae2224eeac347c2fea0e8ec0b11241cb3d100b7c1fbea373a655d59964f647c68769da604c294808a3c2361060d921345283efc4950ffe74319d343e1a533ab285a95890bb69e0c6497ffeb518e180c825874416830dca1477790c1f5c333c71179c999239d69ee35390c80908d6f96f156c7e9ceec512abca8df6754ba56c27472d3c88f577fab9148593f8b7d3642334d3f1069f5b05036583379911e928f6a27e90249a5967e076a14c997cdd6ee6007ac35dca8778546f4fc8b3c89e3ab1ff02ef1bb09f59282c636b8c8589d169baa335ae4cbfa3ffa52de0072d0117de1d13ba5fc6b8bb9287cc59054377eb8e8640938d603b2435587fb5d371172f112b31e9759e0ee1fdc1088eae1785fc5d285f7d0a6ac0749b7806140226701702969fb75f6c0463aa74b7f8f5e38bfbb503ef0411e3bdd31a0a058378f6fd6f9587e1acf8edbc30da8da16b2911941830cbe876230993a4af42c36e3468d608da9efe3d8f46a1740bca6fc086611486b4f2573194e629b04b084aa57f19eb28014cc6772bc5564e60e8e8da1f5070f542dee623bbbdbbc108f7fc9c2e5bea23b26de509906d8aa251448368c454cf8b1d080f7e360994060653dd01134aff657a1129016e8133d426b5ca3c44d28863bec3e596e8e9764c73bc83cabf6d75e935a3e4d4e93b8a0743019c7bef95d98d5ac466688b892e11652cc14bfdb0133c2a18097eb7fc91ef91557b7117a7d1193a979882fbfbc0c42c56e6429204a071c857901eb7fb3b94535abde440eb3bf1ad072bbc84a568ec23ae83070e573f32121387614509a32cef20e56ce08f9df73cab904d649d3458581b828af5148d3bb652f0d7226775c38ebdd1941f56ba9135ea9a6a5d4dea152a61a009258ca8db1e1edcc77dbe2e32641d3e5b16484b2f7a852c8b0c2bc3da8ffe2d26e4628b337afc3786ef259e821a78e6b1b51feca24949a1fb9c9e27af29ca40a2c507814092a9a1a1b81c987759971be609fa446e8ad68fc5f033a3ef9ea4bc3f87fa4eafbaebf06e8c50d43f6109507c7282c1a91e09a4fb7434309d7cc649258dd8cec02fc9548af2e4f10e8806696ab8db2f093c94db67393f74e65ed11e2f49a5e283084d76b4439b54f8e09fc272c82bd61a3c6b9d4e5b77af3b49713ab50142030a0eb0b18b733d610b63e007985a8642bdc862b704c1703dd8755ee6b8ddf7aeaf127e9505eb738f2219609a20a28b00da5415d00b31e2dc113b94d1d3ca8f7dbd27d5a1f9d651a19499d25a95fca1886def0d22feab3b81483c6990a75203b7e0a76c321578c86cae5831594648788acc0f63625a8072da4dd4edd72b2a8b18b741478731423e023379898ac713d98e4642f9eb3687e1cce38f943c9b0fe51245ab514dab9b468204c8878ecb9008ff817ea10fbc2c4821ed276da57ed86ca68406f3133558fee691d1f03f0d8a4d53ebd83f478a8486eaf76265078ca5b840991a65a649e87d139bac191d6301c219a156fdd46fadc9e7d8a5745a71d04e050bbe11307679e58ee23ce5ed1a5aeadf6dde75294d04a15ec628352bf5487db26cd5d1d16f01536fcf3df0d00e60bf10e936bb018101ac37ab78ffa33c25430cc931f42497f67d872f6be97922bf06811ac45382269f3f3dc5332ce968fd2be39a81666e67f85e58707911c68126effae48c37a9a6b2ad20b4b9dacc5e6ad5b4312f004a84c1f636690ba671f681e52c4ea1eba1d48f3c533c951982b043cca4ac651fb168f4b61430f0bdff52e34b048cdad7ec59d75f110202e5be633e1b3c7a8db627eee1baca3c661e1f5a9eb51effddb8feafc3809e006c22a2f4051b9de69589d10f972d0e348e8e4b0176ea16db6f9a2b967d9c5ca2405848955d4071c48d475c60b081f948d205e0dcf4a1e72315630ca4baba72fbb8760b6ae329bb0f2722f01c2205afe6cc919fe4d06776ff01b1390aae7649bea05c2019b443321926bd7f451c5695283b4b627b680b5d3924cf32800fa5a8d09096ae7a74c2009fdb75ef0563f03aa1b53ab543ef3fe9ac0d387b3fe82636dddf5fdaa478d59f1d63113d951a31df3a25440b6ed96bb00856ff0b7c779e1761fddd7a3c85ffa2541453d5882620c0fd0effbf7f51cc2a93a9880e6c9475fe509a916551569b2babf91cfd552233fd79336c3bf6ebb8e73bdde000a861bc089f2a4d3939e5a77c503754fa30edd5b40789f6e9b6dd9351d0e070b068e164108dd8cb194af6993fb22cbd45b6dcffa12539df23d89e4cd1f0659d0388a8e26f20a67784c949ab25fe2628986593914c54fbe78395b84705833e7ebd84a30cfd024bc41e459d10f08154a7fb2177b211e5c7cdcf21ebcdf48916fb1d1d0ef43f4a9c95bd32b97d171b4a6545bc658e87d5b68db10955442fef04f4b2e3b6b2b662d6e13ffdb1a19cbf7dee977c9347f574ceaf6e4b5389ced5d864923f3151dd5839c88030b1d634e1fc7b8701ea0ecd735b67003933071a66b7a67a64b763f5f419f858acab4566bbfa17eff6bafcf6776261128c31518fb7e392b3a00242f8b753ffba96cc9ffa064c2874d2ae982504459c33bb2f01f62e3be929796d410259111ca73d73823fb6f091e9b52f0595114bc81e0c95fb261a8a09171d15fe01a41ae83251f3dac75fa69d8bf533732ed53eb5d2137e58ab03b714d86be621a1a8779eeb88a1563dab0d1f7e54a1b1417b9096d5952fa3fc602b803e78bdd464624e10632c725d9271d0736bddaf083d11408d72b1d4a0902c7e5709f066e88a305bc1f8a423004357120510e4e956a972f476c6006528a0ae60a6f945e2dcf695c0eeb9129e95a2e58357b9be95d68a18939c43e83c1f0f69b13efb96a792df6e1a09e174fb43a6e5dc96bbee64f215ab2edf3c47dc84e173e46547d82ce1cac5d74d059b61d07ee2c92127ddd1d18d1dfb5f6e94027ca840f54794ec60b60a12e1bfd8b9aac1660a7211615faa2e4e1148d09c09099e15d93eff0e7e3b2d563fa2a1297497c1a71f27776e49511377351046ef2e0aeb16954fb735eda14c12491267ffc7bafab8d258a155b641aa393b9f5145b91bf3371e1bcd786fc8c24f1a36a9d1cc2e6f66192d61371b785ef99e3171f8f179544e081ee3fc04b01e28e398c546cc5d0a9eb65516cc9d81b33d7627df57b0eb389381c5cf89b3f1e668e54702bc632165a9f5466bc870f804c2ce53801094e0832eb9e0a064b8a2c51126be40defd55533a59cef6eb61153f6895ebcb0336c91b32abea9f8a62a11b54fc8c6edcede969446f528bd1db10126689653588691520a647575b50692fbf39b6e68b80107a376ea4bc8c598efb3e396589e1e91bc0b5281db0fc8628c390225819917d374e604a1ff12ef5b97b2194c890b53d5ac617798aa1eb17608c49cacb34caedbbcdf4e152cdb489e485d65057d556231ec9a118e4cb722ab30753f35a48469eb94b4baa27aff572a7656dd38ae254a677b74479e022448e5d097a03148673d3ecdc30b3e4a59ad92f87eee367a96ae8c514f80e45db2d82b2cf335ba5050357f90718d3a09134243b654351f97c1c97ec171dc5c58584d486455c6710eeb6ac92f272f50f2d5c8e13c0efe661a43102b39df57fa8b0c8e74249af7fb457e47f26470c7244a0fb8473c94a9e5973526f32168a07b5065bc1c4b816b827782e48170ec816399f0119f63fb9d7cd532a63cc3f89911fd3b8130111ca9c436f6b66e46f67ab04b46cdaeb2ad94b512755d949cc3fd43e7538f712ab35e76c05a640af3b350a32abd9b8f9421967c62aa35ef0387645e6aa62a0faaa9fe93207be1fdde03fbb9b062cc1c4e145653c2ae44f98576124e926be73adc4cb9d763c0bc94e396e53a157808ddf6070bf135b6591eec7e2c6039bdb788a7b9a2805df992293cfcdda66f720e3c45d086efb065acc73fc4e36ff6e1993ecfdb45d98a35dd8c65b7d26f336bc904ce54eea9882d7b815e7308b03e319514e21f9d37f36fafd5fce3cbbd4bf7d6678f57715a783af955a6eea8e38142abf865a323fe55c2fb58097b08f5e10deccb9d97ad50bb788c3289a2d8206da03c9cccb50d0961e3217c91f69d", @generic="f1938308a50880e62a2200f921385a43edf7c068fc5d7bff443c2b3009f36ba5714073501bf4c919e0f65dfd18c519e0c42e8a87bd04e41aac3d927971af262f3e19c28d3f56323f0c9d093185d6c878c55856513ad8edd981b9e08a17116081c67eecf59942e3b69669f65a"]}]}, 0x11e4}, 0x1, 0x0, 0x0, 0x1}, 0x4004000) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000006c00)={0x0, 0xfff}, &(0x7f0000006c40)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000006c80)={r8, 0xfa, "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"}, &(0x7f0000006dc0)=0x102) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000006e00)=@sack_info={r8, 0x6a, 0x9317}, &(0x7f0000006e40)=0xc) connect$unix(r0, &(0x7f0000006e80)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000006f00)={0x5, 0x1ff, 0xc5, 0x7, 0x10001, 0x4}) listxattr(&(0x7f0000006f40)='./file0\x00', &(0x7f0000006f80)=""/157, 0x9d) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000007040)={r8, 0x0, 0x4}, 0x8) accept4$unix(r2, &(0x7f0000007080), &(0x7f0000007100)=0x6e, 0x80000) ioctl$KVM_SMI(r3, 0xaeb7) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000007140)=0x6, 0x4) renameat2(r3, &(0x7f0000007180)='./file0\x00', r3, &(0x7f00000071c0)='\x00', 0x6) ioctl(r3, 0x8001, &(0x7f0000007200)="0cae4db4bc3c140b8ee7df0349814d91879a4e85d139a4d63066424d4035737d3e1e87360b173a1221e10bef3cf33115b1660e0f12c02e3d805394e83ad31fa854c63b0896d0b4518305be8de0c6a15b72f261cea0a9798fd576dcf690672d4c2560da1e7640333cadfad956669ea07f81e2945cca066d") ioprio_get$uid(0x3, r7) renameat2(r3, &(0x7f0000007280)='./file0\x00', r3, &(0x7f00000072c0)='./file0\x00', 0x1) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000007300), &(0x7f0000007340)=0x40) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f0000007380)=0x2, 0x4) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f00000073c0)={0x7, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xf}}}}, 0x88) ioctl$BLKSECDISCARD(r3, 0x127d, &(0x7f0000007480)=0x2) clock_gettime(0x0, &(0x7f0000007500)={0x0, 0x0}) futex(&(0x7f00000074c0), 0x4, 0x1, &(0x7f0000007540)={r9, r10+10000000}, &(0x7f0000007580), 0x1) 14:58:18 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$inet(r0, &(0x7f0000000100)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000040)="02a746d98c9e3f074874ba9c5cf93e138af453fb3e5e6df6f437e9dfd7e95f09c24f66f00052c450ddf2f58c0733f39220f64f5383887fb147fdff6039aaf14649f00e9a", 0x3}, 0x20) 14:58:18 executing program 1: pselect6(0x40, &(0x7f0000000040)={0x0, 0x800}, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140), 0x8}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x8, 0x2}, 0x0) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f0000000200)={[0x0, 0xf000, 0x2004, 0x1000], 0xffffffff80000000, 0x20, 0xffffffffffffffe1}) 14:58:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40000, 0x0) r1 = socket(0xa, 0x1, 0x0) arch_prctl(0x1001, &(0x7f0000000080)="35792ccd9253673d21b1ec8b16cd3892358cb8edf21e841f0f79ccc5cc3e4315761d54cac2beed05fab0758da300db4b2659c668fded6ab951184829526f139a8f36da79e5e30cd0b94cd110fe15c56da80ecb3773f6e36e62f9f46428109c19fa3e9b8c6a720bd046e65b7fcfcfea9315550c973b644af3a00cc2ba66d3d438cbdb669a3c4673b0d356f6cf2fb107d6dc4a88f2c631b3e1ad4a903172a32892945cd34e3cf1438a5155fb74b600ab9133de13839aa2ce6e3d5ab520d2e3acaa7f89f380cff319f184e2b79964a43f2ca49aea88a308b86e1006d1a0d1797deb7f7eb1fb3606") socket(0x1b, 0x3, 0xffff7ffffffffff9) ioctl$sock_ifreq(r1, 0x89b3, &(0x7f00000001c0)={"7369743000000000b5c7b9026c7fc5e5", @ifru_addrs=@in={0x2, 0x0, @rand_addr}}) 14:58:18 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x1040000000032, 0xffffffffffffffff, 0x0) write$evdev(r0, &(0x7f0000000000), 0xff38) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000000)={0x5, 0x4000}) 14:58:18 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000080)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:18 executing program 1: pselect6(0x40, &(0x7f0000000040)={0x0, 0x800}, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140), 0x8}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x8, 0x2}, 0x0) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f0000000200)={[0x0, 0xf000, 0x2004, 0x1000], 0xffffffff80000000, 0x20, 0xffffffffffffffe1}) [ 199.792301] BTRFS: device fsid ecf6f2a3-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop6 14:58:18 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x10000, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x40000, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xfffffffffffffff8, 0x100) ioctl$KVM_GET_REG_LIST(r0, 0x400452c8, &(0x7f0000000040)=ANY=[]) 14:58:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f000000d8c0)=[{{0x0, 0xfffffc7c, &(0x7f0000000000)=[{&(0x7f0000000180)="1b8854a4f501480e3863f89187949ff260f5390b9a931b35687ccaa65e3837b8be5cc6244c86c10c68f4ea1137793f4a99d3075420924d3084736482f56f4993779778c86208b04e57cfbd1c9edff595a1bac18a8b01655be03ad936be46610c983aad5e1a071f5afa023ffb59c65dac001eef5ff821fbb21398e5a079530a6625b55fcbc350ec94960f28c0f03b487565f7b06e838a43869594e88462e1eeb1f7b13da9e44396ddcdbaf94fb67e4d4cd83d814eed23b3b95f9cbedc6fc3d7c5"}], 0x0, 0x0, 0xcb}}], 0x388, 0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = syz_open_dev$sndpcmp(&(0x7f0000000500)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffffe0, 0x8100) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)={0x2, {{0x2, 0x4e23, @broadcast=0xffffffff}}, 0x1, 0x2, [{{0x2, 0x4e21, @rand_addr=0x7}}, {{0x2, 0x4e21, @rand_addr=0x3ff}}]}, 0x190) lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)=@random={'trusted.', ')\x00'}, &(0x7f0000000280)='\x00', 0x1, 0x1) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000100)={0x0, r2+10000000}, &(0x7f0000000140), 0x8) connect$unix(r1, &(0x7f00000002c0)=@abs, 0xfffffe6e) r4 = accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x80000) getpeername$inet6(r4, &(0x7f0000000480)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000004c0)=0x1c) fcntl$addseals(r1, 0x409, 0x4) r5 = syz_open_dev$sndpcmp(&(0x7f0000000440)='/dev/snd/pcmC#D#p\x00', 0xfe, 0x121240) accept$alg(r5, 0x0, 0x0) r6 = creat(&(0x7f0000000540)='./file0/file0\x00', 0x3f) bind$alg(r6, &(0x7f00000003c0)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) 14:58:18 executing program 1: pselect6(0x40, &(0x7f0000000040)={0x0, 0x800}, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140), 0x8}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x8, 0x2}, 0x0) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f0000000200)={[0x0, 0xf000, 0x2004, 0x1000], 0xffffffff80000000, 0x20, 0xffffffffffffffe1}) [ 199.842513] BTRFS error (device loop6): superblock checksum mismatch [ 199.868684] BTRFS error (device loop6): open_ctree failed 14:58:18 executing program 5: r0 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) ioctl(r0, 0x0, &(0x7f0000000100)="87a170327acafc70ad3eea93c1abf131") ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000002c0)=0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000200)=0x60c, 0x8) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000180)=0x0) rt_tgsigqueueinfo(r1, r2, 0x28, &(0x7f00000001c0)={0x34, 0x1000000000000000, 0x39cd, 0x3}) rt_sigtimedwait(&(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000140)={0x77359400}, 0x8) syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x214800) [ 199.916338] BTRFS error (device loop6): superblock checksum mismatch [ 199.933828] BTRFS error (device loop6): open_ctree failed 14:58:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) poll(&(0x7f0000000040), 0x0, 0x5) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000021}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="dc000000", @ANYRES16=r2, @ANYBLOB="00032bbd7000ffdbdf250a000000080005000700000060000300080004000500000014000600fe8000000000000000000000000000bb08f40500ac14141214e9020073797a6b596c6c657230000000000000080003000100000008000400430000001400020064756d6d7930000000000000000000001c00020008000400df0b0000080002004e22000008000b0002000000080006000400000008000400020000002c000300080008004c000000080008000000000008000400fb080000080007004e2100000800080003000000080006007f000000"], 0xdc}, 0x1}, 0x40014) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000340)=@add_del={0x2, &(0x7f0000000300)='veth1_to_team\x00', 0x5}) 14:58:18 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000080)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:18 executing program 1: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) accept(r0, &(0x7f00000002c0)=@un=@abs, &(0x7f0000000340)=0x80) futex(&(0x7f0000000040), 0x82, 0x0, &(0x7f0000000000), &(0x7f0000000080), 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x400, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x90002, 0x0) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x2, 0x102) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f0000000140)="0f22a766ba2100ed66ba2100b800600000ef66baf80cb800329c83ef66bafc0cb807000000ef670f01c80f07b9690200000f32c4e1b1f894c9be00c0fe0f01196736d9fa", 0x44}], 0x1, 0x42, &(0x7f0000000200)=[@dstype3={0x7, 0xd}], 0x1) [ 200.049532] BTRFS error (device loop6): superblock checksum mismatch [ 200.068538] BTRFS error (device loop6): open_ctree failed 14:58:19 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000080)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000100)={'teql0\x00', 0x9}) ioctl$sock_SIOCETHTOOL(r1, 0x8943, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_ts_info={0x41}}) close(0xffffffffffffffff) prctl$getname(0x10, &(0x7f0000000080)=""/112) [ 200.189490] BTRFS error (device loop6): superblock checksum mismatch [ 200.197672] BTRFS error (device loop6): open_ctree failed 14:58:19 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000080)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 200.253859] syz_tun: refused to change device tx_queue_len [ 200.272965] syz_tun: refused to change device tx_queue_len 14:58:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x5}, 0x1c) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x48) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000100)={0x0, 0x3, 0x7fff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) [ 200.340099] BTRFS error (device loop6): superblock checksum mismatch [ 200.364269] BTRFS error (device loop6): open_ctree failed 14:58:19 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 200.466828] BTRFS error (device loop6): superblock checksum mismatch [ 200.479358] BTRFS error (device loop6): open_ctree failed 14:58:19 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:19 executing program 7: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x18000, &(0x7f00000000c0)) 14:58:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x40000000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0xbff, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x4}, 0x1c) write$binfmt_misc(r1, &(0x7f00000002c0)={'syz1'}, 0x4) [ 200.569924] BTRFS error (device loop6): superblock checksum mismatch [ 200.583478] BTRFS error (device loop6): open_ctree failed 14:58:19 executing program 4: syz_emit_ethernet(0x22, &(0x7f0000000040)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x32, 0x0, @multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) [ 200.669500] BTRFS error (device loop0): superblock checksum mismatch [ 200.707209] BTRFS error (device loop0): open_ctree failed 14:58:19 executing program 3: add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000100)="86853bc80bb03e8f01a97f4b046b3ca03ba556639bca9ff574a54bb7ecafcb654eec84ee1fbb1c4d5ed5944fb863d1fdc92a64828d16b9ae13c7058419c4825d8927", 0x42, 0xffffffffffffffff) r0 = socket(0xa, 0x2000000001, 0x0) getsockopt(r0, 0x0, 0x53, &(0x7f0000000140)=""/8, &(0x7f0000000180)=0x5) 14:58:19 executing program 6: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 200.908186] BTRFS error (device loop6): superblock checksum mismatch [ 200.921207] BTRFS error (device loop6): open_ctree failed 14:58:19 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x10d, 0x10, &(0x7f0000000040), 0xc) 14:58:19 executing program 4: r0 = socket$inet6(0xa, 0x100040000080806, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xfffffffffffffffd) r2 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r2, 0x29, 0x6, &(0x7f0000000040), 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x1000000004e20}, 0x1c) 14:58:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") keyctl$unlink(0x14, 0x0, 0x0) 14:58:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b7000000000001b7bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005406000001ed00001d040000000000006f460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 14:58:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:19 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/tcp\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioctl$LOOP_CHANGE_FD(r0, 0x4c03, r1) 14:58:19 executing program 6: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 201.115832] BTRFS error (device loop6): superblock checksum mismatch [ 201.167478] BTRFS error (device loop6): open_ctree failed 14:58:20 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x37, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 14:58:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") unshare(0x40000000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'sit0\x00', 0x20003005}) 14:58:20 executing program 2: ioperm(0x0, 0x102, 0x0) ioperm(0x0, 0x7, 0xfffffffffffffffe) 14:58:20 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f0000001e40)=[{{&(0x7f00000017c0)=@nfc_llcp, 0x80, &(0x7f0000001dc0)}}], 0x1, 0x0, &(0x7f0000001f00)) recvfrom(r0, &(0x7f0000000000)=""/244, 0xf4, 0x0, &(0x7f0000000280)=@xdp={0x2c}, 0x80) sendto$inet(r0, &(0x7f0000004000), 0x33f, 0x0, &(0x7f0000002000)={0x2, 0x3}, 0x10) 14:58:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000640)={"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"}) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000080)={0x10f005, 0x0, 0x500}) 14:58:20 executing program 7: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000080)={0x0, 0x0, 0x17}) 14:58:20 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) r2 = socket(0xa, 0x1, 0x0) fcntl$setlease(r1, 0x400, 0x0) dup3(r2, r1, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 14:58:20 executing program 6: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000d300000000028000007a0a00ffffffff006b0130"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000500)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x5, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) [ 201.362987] BTRFS error (device loop6): superblock checksum mismatch [ 201.375683] BTRFS error (device loop6): open_ctree failed 14:58:20 executing program 7: unshare(0x20000400) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) fstatfs(r0, &(0x7f00000002c0)=""/4096) 14:58:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) fcntl$getflags(r0, 0xb) 14:58:20 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x37, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) [ 201.438784] IPVS: ftp: loaded support on port[0] = 21 14:58:20 executing program 5: capset(&(0x7f00000fc000)={0x19980330}, &(0x7f000047efe8)) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:58:20 executing program 6: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:20 executing program 2: io_setup(0x1, &(0x7f0000000040)=0x0) r1 = socket$unix(0x1, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f00000026c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000080)}]) 14:58:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000000)=[@cstype0={0x4}, @vmwrite={0x8}], 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x6000, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:58:20 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000002e40)=[@text32={0x20, &(0x7f0000002e80)="0f011e0f28e98fe96896acebbe000000660f3881210fe95f0066baf80cb84d191a84ef66bafc0cb006ee2e31a50400000066baf80cb8396aa780ef66bafc0cb0ceee0f2320f4", 0x46}], 0xaaaab58, 0x0, &(0x7f0000000240), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 201.654594] BTRFS error (device loop6): superblock checksum mismatch [ 201.693440] device lo entered promiscuous mode [ 201.712067] BTRFS error (device loop6): open_ctree failed [ 201.748938] IPVS: ftp: loaded support on port[0] = 21 14:58:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000140)=@assoc_value, 0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340), &(0x7f0000000380)=0xc) 14:58:20 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x37, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) [ 201.908367] sctp: [Deprecated]: syz-executor1 (pid 11588) Use of struct sctp_assoc_value in delayed_ack socket option. [ 201.908367] Use struct sctp_sack_info instead [ 201.926614] sctp: [Deprecated]: syz-executor1 (pid 11588) Use of struct sctp_assoc_value in delayed_ack socket option. [ 201.926614] Use struct sctp_sack_info instead 14:58:21 executing program 6: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000000140)={0x18, 0x25, 0x1aff, 0x0, 0x0, {0x3}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 14:58:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000009ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x40a85323, &(0x7f00009dcfa8)={0x80}) 14:58:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x2000000005, 0x84) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x0, 0x1b2a067ed9e38c51}, &(0x7f0000000180)=0x18) 14:58:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x4, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 14:58:21 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x37, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 14:58:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="025cc83d6d345f8f762070") capset(&(0x7f0000001000)={0x19980330}, &(0x7f0000001040)) prctl$intptr(0x26, 0x1) mknod(&(0x7f0000000040)='./bus\x00', 0xffe, 0x0) execve(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100), &(0x7f00000002c0)) 14:58:21 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r2, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r1, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000340)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)=@updpolicy={0xb8, 0x19, 0x523, 0x0, 0x0, {{@in=@multicast2=0xe0000002, @in6, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) sendfile(r2, r4, &(0x7f0000d83ff8), 0x8000fffffffe) [ 202.337606] BTRFS error (device loop6): superblock checksum mismatch [ 202.364802] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:58:21 executing program 5: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000cc0)=@broute={'%route\x00', 0x20, 0x1, 0x388, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000780], 0x0, &(0x7f0000000000), &(0x7f0000000780)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'team_slave_1\x00', 'syzkaller1\x00', 'ip6tnl0\x00', "04010000000000000000e4ff00001700", @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x2a8, 0x2a8, 0x2f8, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "f2eb59ffbdc76c311b467b90ba912abc07f1e2c457f16281e7af0c229d0a"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x400) 14:58:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x5}, 0x1c) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) [ 202.421018] BTRFS error (device loop6): open_ctree failed 14:58:21 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x160, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, &(0x7f00000000c0), &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000001100000000000000000062637368300000000000000000000000697036746e6c3000000000000000010079616d3000000000000000000000000062707130000000000000000000000000000000000000000000000000aaaaaaaaaaaa00000000000000007000000070000000a000000072656469726563740000000000000000000000000000000000000000ebffffff08000000000000000000000000000000"]}, 0x1d8) 14:58:21 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x20, 0x31, 0x119, 0x0, 0x0, {0x3}, [@nested={0xc, 0x0, [@typed={0x8, 0x1, @u32}]}]}, 0x20}, 0x1}, 0x0) 14:58:21 executing program 6: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:21 executing program 1: r0 = add_key(&(0x7f0000943000)='keyring\x00', &(0x7f0000f02ffb)={0x73, 0x79, 0x7a}, &(0x7f0000000000), 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) keyctl$revoke(0x3, r0) keyctl$get_security(0xb, r1, &(0x7f000027e000)=""/87, 0x7f07bdf4) 14:58:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x10, 0x40000000000003, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005e0007031dfffd946fa2830007000247b9a904005a4e43680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 202.615795] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 202.628392] netlink: get zone limit has 4 unknown bytes 14:58:21 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000140)=ANY=[]) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x28200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x6000, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$fiemap(r2, 0xc020660b, &(0x7f0000000280)={0x0, 0x8e, 0x1}) [ 202.691116] BTRFS error (device loop6): superblock checksum mismatch 14:58:21 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0xfffffffffffffffe, 0x1, 0x0, 0x40000000000fcae}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETAF(r1, 0x5412, &(0x7f00000000c0)={0xa}) 14:58:21 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = open(&(0x7f000000fffa)='./bus\x00', 0x140042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) mount$9p_xen(&(0x7f0000000000)='!\x00', &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f00000000c0)={'trans=', 'xen', 0x2c, {'port', 0x3d}, 0x2c, {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d}, 0x2c}) 14:58:21 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r2, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r1, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000340)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)=@updpolicy={0xb8, 0x19, 0x523, 0x0, 0x0, {{@in=@multicast2=0xe0000002, @in6, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) sendfile(r2, r4, &(0x7f0000d83ff8), 0x8000fffffffe) [ 202.742178] BTRFS error (device loop6): open_ctree failed 14:58:21 executing program 3: socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00006c4f60)=[{&(0x7f0000317fa3)="b5c5242e283536f05dfcf3c925d43c6cf1eb17fde04dfbf2b3", 0x19}], 0x1) write(r0, &(0x7f0000805000)="346bd71b3c015b53c0833e97df6312f9b0659db5b29837caa9", 0x19) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x4) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x0, 0x0, &(0x7f00000fff80), 0x0, &(0x7f00001e1e78)}], 0x1, 0x0) 14:58:21 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0x46, 0x10800a}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000efb000)='/dev/sequencer2\x00', 0x0, 0x0) [ 202.854694] 9pnet: Could not find request transport: xen 14:58:21 executing program 6: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:21 executing program 7: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x1, 0x0, &(0x7f0000fd7ff0)={0x77359400}, &(0x7f00000000c0), 0x0) [ 202.902612] 9pnet: Could not find request transport: xen 14:58:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x7d, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="4ae30000000000000200000000000000020000004000000000b1ee00000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000008ac000000000000000000000000000000000000000000008000000001740e56b30000000000000001010000000000000100010000000000090000000000000000000000000000000000000004010000000000000000000000000000000000000000000000030000000000000000000000000000000088df4f0f20db"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:58:21 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 203.091919] BTRFS error (device loop6): superblock checksum mismatch [ 203.137416] BTRFS error (device loop6): open_ctree failed 14:58:22 executing program 2: syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x20402) 14:58:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000005efff)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0xff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000f6bff4)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000efd000)=0x62) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000fddfff)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000000)) 14:58:22 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r2, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r1, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000340)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)=@updpolicy={0xb8, 0x19, 0x523, 0x0, 0x0, {{@in=@multicast2=0xe0000002, @in6, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) sendfile(r2, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 14:58:22 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x800002, 0x12, r2, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x4001, &(0x7f0000000740)=0x1, 0x9, 0x0) mlock(&(0x7f0000004000/0x5000)=nil, 0x5000) 14:58:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) ioctl(r3, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060"}], 0xaaaaaaaaaaaa84c, 0x0, &(0x7f0000000140), 0x10000000000000c5) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f00000000c0)={0x7f, 0x3, 0x9, 0x0, 0x2, 0x7}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x7, 0xcd, 0x5, 0x10001, 0x8}, &(0x7f00000002c0)=0x14) rt_sigtimedwait(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000200)={0x77359400}, 0xfffffffffffffe9c) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:58:22 executing program 6: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:22 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/tcp\x00') ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) 14:58:22 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x7, 0x9) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") 14:58:22 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000003c0)) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100), 0x4) 14:58:22 executing program 0: r0 = userfaultfd(0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f0000000100)="9af5cf446d44000fc5dab032889a77f04966baf80cb8f842488fef66bafc0cb079ee0f20c035200000000f22c0b9aa0a0000b848000000ba000000000f3066ba2100ecb805000000b9000000000f01c1b918020000b806a7c364bac7a653380f3066b808018ec0", 0x67}], 0x1, 0x0, &(0x7f0000000200), 0x0) [ 203.731801] BTRFS error (device loop6): superblock checksum mismatch [ 203.770174] BTRFS error (device loop6): open_ctree failed 14:58:22 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r2, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r1, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000340)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)=@updpolicy={0xb8, 0x19, 0x523, 0x0, 0x0, {{@in=@multicast2=0xe0000002, @in6, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) sendfile(r2, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 14:58:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f0000222000)=0x9, 0x4) connect$inet6(r1, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000b7ff8)={0x0, 0x269}, &(0x7f0000000000)=0x725) 14:58:22 executing program 6: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:22 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x18, 0x0, [0x0, 0x0, 0xffffff7f]}]}, 0x18}, 0x1}, 0x0) 14:58:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x3fd) truncate(&(0x7f0000000080)='./file0\x00', 0x7) sendfile(r1, r2, &(0x7f00007ed000), 0x2) 14:58:22 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c0045002, &(0x7f0000000200)=0x10003) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ppoll(&(0x7f0000000140)=[{r1}], 0x1, &(0x7f0000000300)={0x0, r2+30000000}, &(0x7f00000003c0), 0x8) readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/51, 0x33}], 0x1) 14:58:22 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x11, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x3ef) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000000)="340367", &(0x7f00000002c0)}, 0x20) 14:58:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4040ae9e, &(0x7f0000000000)) 14:58:22 executing program 2: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) r0 = syz_open_dev$sndmidi(&(0x7f0000000380)='/dev/snd/midiC#D#\x00', 0xe440, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0xc0305710, &(0x7f0000000040)) [ 204.059961] BTRFS error (device loop6): superblock checksum mismatch [ 204.093620] BTRFS error (device loop6): open_ctree failed 14:58:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) listen(r1, 0x400000000f3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x1e, &(0x7f0000000000)=[@in={0x2, 0x0, @broadcast=0xffffffff}], 0xffad) close(r1) 14:58:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_emit_ethernet(0x2e, &(0x7f0000001040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @rand_addr=0xfffffffffffffffe, {[@timestamp={0x44, 0x4}]}}, @igmp}}}}, 0x0) 14:58:23 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000200)="2957e1311f16f477671070") syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000140)={[{@datasum='datasum', 0x2c}, {@fragment_all='fragment=all', 0x2c}, {@datacow='datacow', 0x2c}, {@nodiscard='nodiscard', 0x2c}, {@nospace_cache='nospace_cache', 0x2c}, {@check_int_print_mask={'check_int_print_mask', 0x3d, [0x3d]}, 0x2c}]}) 14:58:23 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x3, 0x14, 0xbb}, @remote={0xac, 0x14, 0x14, 0xbb}}, @tcp={{0x0, 0x4001, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}, &(0x7f0000000100)) 14:58:23 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x75, &(0x7f0000000100), 0x0) [ 204.269795] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 28 transid 756082810144684242 /dev/loop4 14:58:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4040ae9e, &(0x7f0000000000)) 14:58:23 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f00000001c0), &(0x7f0000000200)=0x2) 14:58:23 executing program 5: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000380)='./file1\x00', 0x4) [ 204.365936] BTRFS error (device loop4): unsupported checksum algorithm 3786 [ 204.373193] BTRFS error (device loop4): superblock checksum mismatch 14:58:23 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}}, 0xe) [ 204.438334] BTRFS error (device loop6): superblock checksum mismatch 14:58:23 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16de76521070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000140)="c4c13deba603000000660f388044394bb8741d18b50f23d80f21f835800000300f23f8b9800000c00f3235004000000f303e672e660f388208c744240003000000c7442402ce6d4d77c7442406000000000f011c240f0fca8a360f01c9f4c4c129d47936", 0x64}], 0xaaaaaaaaaaaad6c, 0x0, &(0x7f00000001c0), 0x1d1) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000000)=ANY=[@ANYBLOB="05"]) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:58:23 executing program 7: clone(0x200, &(0x7f0000fbf000), &(0x7f0000000000), &(0x7f0000000100), &(0x7f00000000c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000a7bfc8), &(0x7f00006fcff0)) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, &(0x7f0000bf5000), 0x0, 0x0, &(0x7f0000000680)=@abs, 0x6e) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r3 = getpid() fcntl$setown(r1, 0x8, r3) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) exit(0x0) open(&(0x7f0000000080)='./file0\x00', 0x401, 0x0) [ 204.491422] BTRFS error (device loop4): open_ctree failed [ 204.499146] BTRFS error (device loop6): open_ctree failed [ 204.602552] BTRFS error (device loop4): unsupported checksum algorithm 3786 [ 204.609897] BTRFS error (device loop4): superblock checksum mismatch [ 204.698307] BTRFS error (device loop4): open_ctree failed 14:58:23 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c0045002, &(0x7f0000000200)=0x10003) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ppoll(&(0x7f0000000140)=[{r1}], 0x1, &(0x7f0000000300)={0x0, r2+30000000}, &(0x7f00000003c0), 0x8) readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/51, 0x33}], 0x1) 14:58:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x10, 0x3, 0x4) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff095ffefd956fa283b724a6008c00000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvfrom$unix(r1, &(0x7f0000000040)=""/161, 0xa1, 0x0, &(0x7f0000000100)=@abs, 0x709000) 14:58:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r4, 0x40000000af01, &(0x7f0000000300)) r5 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) close(r5) socket$packet(0x11, 0x3, 0x300) readv(r4, &(0x7f00000002c0)=[{&(0x7f0000001980)=""/150, 0x96}], 0x1) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r4, 0x4008af30, &(0x7f0000f1dff8)={0x0, r5}) 14:58:23 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4040ae9e, &(0x7f0000000000)) 14:58:23 executing program 2: add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000040)="1082", 0x2, 0xffffffffffffffff) 14:58:23 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000200)="2957e1311f16f477671070") syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000140)={[{@datasum='datasum', 0x2c}, {@fragment_all='fragment=all', 0x2c}, {@datacow='datacow', 0x2c}, {@nodiscard='nodiscard', 0x2c}, {@nospace_cache='nospace_cache', 0x2c}, {@check_int_print_mask={'check_int_print_mask', 0x3d, [0x3d]}, 0x2c}]}) [ 205.139087] BTRFS error (device loop6): superblock checksum mismatch [ 205.157648] BTRFS error (device loop4): unsupported checksum algorithm 3786 [ 205.164934] BTRFS error (device loop4): superblock checksum mismatch [ 205.181462] BTRFS error (device loop6): open_ctree failed 14:58:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="f6"], 0x1) ioctl(r1, 0x40044104, &(0x7f0000001f64)) [ 205.217222] BTRFS error (device loop4): open_ctree failed 14:58:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4040ae9e, &(0x7f0000000000)) 14:58:24 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)=ANY=[@ANYBLOB="b5000000ee0cd74c4f3d0aedef73a3991a56623dd3943db5a7e72c946911404ddc2bb351d3295791157b015680cbeb8b1c4dd4f5c460e14a60d944c84694c4de1f3c392c6b4d1b050338f11cc40000000081ff34c7634d9bb9358ed3d67b8024882a1567a764b6bc87ced81043d123be95788afb5c127d6d54a7c9d50e278e9d90b2b5871c94d565f74d708e8bc24661f78342e0215993e5396a4d10d05064283685240c4dd0dd5f0f4020e9dda771d2954f"], &(0x7f0000000140)=0x1) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000340)=0xffffffffffffffff) r3 = socket$inet6(0xa, 0x1, 0x0) ioctl(r3, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, &(0x7f00000001c0)="66b9800000c00f326635004000000f3026d0abae8fba420066ed6766c7442400e2bf00006766c7442402fb83c0566766c744240600000000670f011424eb000f01ca650f001f640f01cb0f070fc7980000", 0x51}], 0x1, 0x0, &(0x7f0000000280), 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:58:24 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000200)="2957e1311f16f477671070") syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000140)={[{@datasum='datasum', 0x2c}, {@fragment_all='fragment=all', 0x2c}, {@datacow='datacow', 0x2c}, {@nodiscard='nodiscard', 0x2c}, {@nospace_cache='nospace_cache', 0x2c}, {@check_int_print_mask={'check_int_print_mask', 0x3d, [0x3d]}, 0x2c}]}) 14:58:24 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c0045002, &(0x7f0000000200)=0x10003) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ppoll(&(0x7f0000000140)=[{r1}], 0x1, &(0x7f0000000300)={0x0, r2+30000000}, &(0x7f00000003c0), 0x8) readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/51, 0x33}], 0x1) 14:58:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") pkey_mprotect(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) prctl$setmm(0x23, 0x4, &(0x7f0000003000/0x4000)=nil) [ 205.410564] BTRFS error (device loop6): superblock checksum mismatch 14:58:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=@newae={0x64, 0x1e, 0xd01, 0x0, 0x0, {{@in=@rand_addr}, @in=@multicast2=0xe0000002}, [@lifetime_val={0x24, 0x9}]}, 0x64}, 0x1}, 0x0) [ 205.452156] BTRFS error (device loop4): unsupported checksum algorithm 3786 [ 205.459395] BTRFS error (device loop4): superblock checksum mismatch [ 205.472947] BTRFS error (device loop6): open_ctree failed [ 205.568896] BTRFS error (device loop4): open_ctree failed 14:58:24 executing program 7: r0 = syz_open_dev$sndtimer(&(0x7f00000b5ff1)='/dev/snd/timer\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r2 = dup3(r0, r1, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000000)={{0x0, 0x1}}) 14:58:24 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") pkey_mprotect(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) prctl$setmm(0x23, 0x4, &(0x7f0000003000/0x4000)=nil) [ 205.868392] BTRFS error (device loop6): superblock checksum mismatch [ 205.888679] BTRFS error (device loop6): open_ctree failed 14:58:24 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000040)={0x81, 0x0, [0x3]}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x4020aea5, &(0x7f00000002c0)) 14:58:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0/file1/file0/file0\x00', &(0x7f00000000c0)='./file0/file1/file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x2) read(r1, &(0x7f0000003380)=""/4096, 0x30) 14:58:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x1f, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000040), 0x20000040}]) 14:58:24 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000200)="2957e1311f16f477671070") syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000140)={[{@datasum='datasum', 0x2c}, {@fragment_all='fragment=all', 0x2c}, {@datacow='datacow', 0x2c}, {@nodiscard='nodiscard', 0x2c}, {@nospace_cache='nospace_cache', 0x2c}, {@check_int_print_mask={'check_int_print_mask', 0x3d, [0x3d]}, 0x2c}]}) 14:58:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") pkey_mprotect(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) prctl$setmm(0x23, 0x4, &(0x7f0000003000/0x4000)=nil) 14:58:24 executing program 7: r0 = syz_open_dev$sndtimer(&(0x7f00000b5ff1)='/dev/snd/timer\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r2 = dup3(r0, r1, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000000)={{0x0, 0x1}}) 14:58:24 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c0045002, &(0x7f0000000200)=0x10003) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ppoll(&(0x7f0000000140)=[{r1}], 0x1, &(0x7f0000000300)={0x0, r2+30000000}, &(0x7f00000003c0), 0x8) readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/51, 0x33}], 0x1) 14:58:24 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") pkey_mprotect(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) prctl$setmm(0x23, 0x4, &(0x7f0000003000/0x4000)=nil) [ 206.179272] BTRFS error (device loop6): superblock checksum mismatch 14:58:25 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x200, 0x202) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000004c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 14:58:25 executing program 7: r0 = syz_open_dev$sndtimer(&(0x7f00000b5ff1)='/dev/snd/timer\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r2 = dup3(r0, r1, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000000)={{0x0, 0x1}}) [ 206.221988] BTRFS error (device loop6): open_ctree failed [ 206.227745] BTRFS error (device loop4): unsupported checksum algorithm 3786 [ 206.234997] BTRFS error (device loop4): superblock checksum mismatch [ 206.248520] BTRFS error (device loop4): open_ctree failed 14:58:25 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f00000000c0)="295ee1311f16f477671070") prctl$intptr(0x23, 0xd) 14:58:25 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:25 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0xb4}], 0x1) dup3(r2, r1, 0x0) dup3(r1, r0, 0x0) 14:58:25 executing program 7: r0 = syz_open_dev$sndtimer(&(0x7f00000b5ff1)='/dev/snd/timer\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r2 = dup3(r0, r1, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000000)={{0x0, 0x1}}) 14:58:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$rds(0xa, 0x2, 0x88) sendmsg$rds(r1, &(0x7f0000017000)={&(0x7f0000015ff3)={0x2, 0x4e21}, 0x10, &(0x7f000000d000), 0x0, &(0x7f000000ef03)=[@mask_fadd={0x58, 0x114, 0x8, {{}, &(0x7f0000005ff8), &(0x7f000001eff8)}}, @fadd={0x44, 0x114, 0x6, {{}, &(0x7f000001bff8), &(0x7f0000009ff8), 0x0, 0x0, 0x0, 0x0, 0x14, 0x100000000}}, @rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f000000f000)}, &(0x7f000001e000)=[{&(0x7f0000012000)=""/15, 0x301}], 0x1}}, @mask_cswp={0xb, 0x114, 0x9, {{}, &(0x7f0000012ff8), &(0x7f000001cff8)}}], 0xba}, 0x0) 14:58:25 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1000082) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f00000002c0)) [ 206.504943] BTRFS error (device loop6): superblock checksum mismatch [ 206.558764] BTRFS error (device loop6): open_ctree failed [ 206.628365] serio: Serial port pts0 14:58:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000014c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000004fc0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000004f80)={&(0x7f0000000080)={0x5c, r1, 0x1, 0x0, 0x0, {0x4001}, [{{0x8, 0x1, r2}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6}}}]}}]}, 0x5c}, 0x1}, 0x0) 14:58:25 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0x6f, &(0x7f0000000100), &(0x7f0000000140)=0x20) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) close(r0) 14:58:25 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0xe) ioctl$TCFLSH(r1, 0x80047437, 0x709000) 14:58:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x1bc}, 0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000040)=0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={r1, @in={{0x2}}}, 0x98) 14:58:25 executing program 7: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={"62726964676530002000008000", &(0x7f0000000000)=ANY=[@ANYBLOB="07000000000000000070700040000000d58679aa"]}) 14:58:25 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netfilter\x00') fstat(r1, &(0x7f0000003000)) 14:58:25 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 207.042704] sctp: [Deprecated]: syz-executor2 (pid 12008) Use of int in maxseg socket option. [ 207.042704] Use struct sctp_assoc_value instead 14:58:25 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1) 14:58:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x80004000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) open(&(0x7f0000000080)="2e2f66696c65302f662e6c6530f0", 0x40003ffd, 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0xffffff43) 14:58:25 executing program 0: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) futex(&(0x7f000031dffc), 0x400000085, 0x0, &(0x7f0000004000), &(0x7f0000000000), 0x40000000) [ 207.083266] BTRFS error (device loop6): superblock checksum mismatch [ 207.111423] BTRFS error (device loop6): open_ctree failed [ 207.114410] netlink: 'syz-executor1': attribute type 3 has an invalid length. 14:58:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="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", 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) [ 207.333225] BTRFS error (device loop6): superblock checksum mismatch [ 207.367326] BTRFS error (device loop6): open_ctree failed [ 207.408412] serio: Serial port pts0 14:58:26 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0xb4}], 0x1) dup3(r2, r1, 0x0) dup3(r1, r0, 0x0) 14:58:26 executing program 7: r0 = getpgrp(0x0) rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffffffffffffffa}) 14:58:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000440)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCCONS(r2, 0x541d) ioctl$TCSETSW(r2, 0x5437, &(0x7f0000002000)) 14:58:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001240)={{{@in=@multicast1=0xe0000001, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0xff}, 0x0, @in=@multicast2=0xe0000002}}, 0xe8) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0xfa) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}, 0x1}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="02120000020000000000e8000000006a"], 0x10}, 0x1}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x400000000000308, 0x10000, &(0x7f0000001000)={0x77359400}) 14:58:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="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", 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) [ 207.548756] serio: Serial port pts1 14:58:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="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", 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) 14:58:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:26 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0xb4}], 0x1) dup3(r2, r1, 0x0) dup3(r1, r0, 0x0) 14:58:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001240)={{{@in=@multicast1=0xe0000001, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0xff}, 0x0, @in=@multicast2=0xe0000002}}, 0xe8) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0xfa) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}, 0x1}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="02120000020000000000e8000000006a"], 0x10}, 0x1}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x400000000000308, 0x10000, &(0x7f0000001000)={0x77359400}) 14:58:26 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) connect$inet6(r1, &(0x7f00008c0000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$sock_buf(r1, 0x1, 0x4, &(0x7f0000000100)=""/4096, &(0x7f0000001100)=0x1c) 14:58:26 executing program 1: io_setup(0x2, &(0x7f00000002c0)) io_setup(0x100000001, &(0x7f0000001940)) io_setup(0x400000002, &(0x7f00000018c0)) io_setup(0x4, &(0x7f0000000340)) io_setup(0x2, &(0x7f0000000200)) 14:58:26 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000000c0)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000000)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}, @rand_addr}, 0xc) [ 207.894448] serio: Serial port pts0 14:58:26 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040), 0x4) 14:58:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="2f007e574d000330809022cfde26555dc9ecfe1974406edad38364782d63b6612854b9e49dbdcaef718197e37e870a308b1e3a798fa788a46d3025ef933e51828ab675064e2adbe9126423b4a73d68fbe99c6db2f160d49cb6cce76c27289a4f9d097354aaa5860d2383df87526baa184d90bb7729366c17bc33d765e9bc2f882a13f3a9c1f60660bd4fd2fa31d2c0a775242289bce062d10d24ded5406918a66b2c75c43fe1ff458ae5cd9fec63039ba5a7b66a60ede5ccdabc7ee77660ef2358ccdff02226021384b0c235f114ed9ade92767aecc256acdeb610df42e7169f240357f735ae5fe29017e51e27252f48b95bfbbb3a865535298bdc36d71db635f41c57771db77aeaff883feb3dc3cc24bd3c036e396ad3af37945058839e812270bc40901fa654e7cc3292a82fc80c374dc07142a1c2e9d3e2528e4fdac32bcaefe910ebd3b948a3bfebef5fa8d82473c7fbf3ec", 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) [ 207.925529] BTRFS error (device loop6): superblock checksum mismatch [ 207.961207] BTRFS error (device loop6): open_ctree failed 14:58:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001240)={{{@in=@multicast1=0xe0000001, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0xff}, 0x0, @in=@multicast2=0xe0000002}}, 0xe8) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0xfa) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}, 0x1}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="02120000020000000000e8000000006a"], 0x10}, 0x1}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x400000000000308, 0x10000, &(0x7f0000001000)={0x77359400}) 14:58:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000580), 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000000)=ANY=[@ANYBLOB="01000fc77f"]) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:58:27 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0xb4}], 0x1) dup3(r2, r1, 0x0) dup3(r1, r0, 0x0) 14:58:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) setsockopt$inet_int(r1, 0x0, 0x14, &(0x7f0000000000)=0x7, 0x4) recvmsg(r1, &(0x7f0000000400)={&(0x7f0000f10000)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000001680), 0x0, &(0x7f0000000100)=""/79, 0x4f}, 0x0) sendto$inet(r1, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) 14:58:27 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:27 executing program 5: r0 = socket$inet6(0xa, 0x1800000000003, 0x1) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0xffffffffffffffff, 0x6012, r2, 0x0) mremap(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) pipe2(&(0x7f0000000000), 0x0) clone(0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000180)) 14:58:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001240)={{{@in=@multicast1=0xe0000001, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0xff}, 0x0, @in=@multicast2=0xe0000002}}, 0xe8) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0xfa) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}, 0x1}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="02120000020000000000e8000000006a"], 0x10}, 0x1}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x400000000000308, 0x10000, &(0x7f0000001000)={0x77359400}) 14:58:27 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0x9, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f760070") mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x40086200, &(0x7f0000000000)) 14:58:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x1c}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 14:58:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x1}, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}], 0x1e) [ 208.384196] x86/PAT: syz-executor5:12127 map pfn RAM range req write-combining for [mem 0x18ffb0000-0x18ffb3fff], got write-back [ 208.409161] BTRFS error (device loop6): superblock checksum mismatch 14:58:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x80) [ 208.438179] BTRFS error (device loop6): open_ctree failed [ 208.439351] serio: Serial port pts1 [ 208.486122] x86/PAT: syz-executor5:12127 map pfn RAM range req write-combining for [mem 0x1bcdee000-0x1bcdeefff], got write-back [ 208.564145] x86/PAT: syz-executor5:12145 map pfn RAM range req write-combining for [mem 0x18ffb0000-0x18ffb3fff], got write-back 14:58:27 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_void(r0, 0x29, 0x23, 0x0, 0x300) 14:58:27 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0x9, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f760070") mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x40086200, &(0x7f0000000000)) 14:58:27 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="e92be282346d61ac55"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) write(r1, &(0x7f00000005c0)="260000005e0009571e00eaf83a000000001ee9ff4435eade0000000000000000000000000000", 0x26) 14:58:27 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0xb4}], 0x1) dup3(r2, r1, 0x0) dup3(r1, r0, 0x0) 14:58:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0xffffff9e}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=@ipv6_newroute={0x30, 0x18, 0xe0b, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0xc0fe}, [@RTA_GATEWAY={0x14, 0x5, @loopback={0x0, 0x1}}]}, 0x30}, 0x1}, 0x0) 14:58:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000100), 0x4) [ 208.744113] BTRFS error (device loop6): superblock checksum mismatch [ 208.781396] serio: Serial port pts0 [ 208.789535] BTRFS error (device loop6): open_ctree failed 14:58:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0xb4}], 0x1) dup3(r2, r1, 0x0) dup3(r1, r0, 0x0) [ 209.238138] serio: Serial port pts1 14:58:28 executing program 1: unshare(0x24020400) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) fgetxattr(r0, &(0x7f0000000400)=@known='system.sockprotoname\x00', &(0x7f0000000440)=""/246, 0xf6) 14:58:28 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0x9, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f760070") mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x40086200, &(0x7f0000000000)) 14:58:28 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x5, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) 14:58:28 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005940)=[{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="48107936edbbc8470fd3bd7d3faf24211f88c05f85353b1bcef5de3280f2687c2620032770501ef8a908213c16f3b17383193cefab9cd87a0e4958fa53ac2576bdf6e4aa2b73a8ae9ddad19092065a07a0df23aa43a96ad5163f8c10c3516fff9e65261d4d15fc36fc66a9b264b3bed5d84d796328051ffcf2c7b3ebd851b3da7056d7d478fd06d41cf43be76f1c4d8d063f9aa159b9a785d4acd315f4da35cc6ba1474f40ac24eb4d0d96710f22da64ecfd62e99652af5d934e310437ee6b58d579baed1cd9b72f5b9210f986f57a03a25ed92f7b0f6e387b6b01e5a9689987", 0xe0}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmsg(r2, &(0x7f0000001440)={&(0x7f0000000000)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f0000005a80)=""/4096, 0x20005e83}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 14:58:28 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4309(ccm(serpent-generic)))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x8) 14:58:28 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0x9, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f760070") mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x40086200, &(0x7f0000000000)) [ 209.320687] BTRFS error (device loop6): superblock checksum mismatch [ 209.356258] BTRFS error (device loop6): open_ctree failed 14:58:28 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) r2 = gettid() r3 = fcntl$dupfd(r1, 0x0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000280)=""/176, 0xb0}], 0x1) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1004000000016) 14:58:28 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f00000001c0)=""/198) ioctl(r0, 0x4000008912, &(0x7f00000000c0)="295ee1311f16f477671070") prctl$intptr(0x2a, 0x0) 14:58:28 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0), &(0x7f0000000400)=0xc) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000440), &(0x7f0000000480)=0x18) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000180)) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000000)) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) fgetxattr(0xffffffffffffffff, &(0x7f0000000140)=@known='user.syz\x00', &(0x7f0000000080)=""/2, 0xe21fd7828d99d674) 14:58:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) [ 209.523897] BTRFS error (device loop6): superblock checksum mismatch 14:58:28 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0xb4}], 0x1) dup3(r2, r1, 0x0) dup3(r1, r0, 0x0) 14:58:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f00000001c0)={0x2, 0x0, [0x10a, 0x0, 0x40000108]}) [ 209.589912] BTRFS error (device loop6): open_ctree failed [ 209.633110] kauditd_printk_skb: 57 callbacks suppressed [ 209.633122] audit: type=1326 audit(1531061908.489:70): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12238 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455ba9 code=0x50000 [ 209.658467] audit: type=1326 audit(1531061908.489:71): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12238 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455ba9 code=0x50000 [ 209.665549] serio: Serial port pts0 14:58:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070") syz_emit_ethernet(0x3e, &(0x7f0000000200)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0x12, 0x8, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x70, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000000)={0xfffffffffffffffd, 0x1}) [ 209.678420] audit: type=1326 audit(1531061908.489:72): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12238 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455ba9 code=0x50000 [ 209.678446] audit: type=1326 audit(1531061908.489:73): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12238 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455ba9 code=0x50000 [ 209.678471] audit: type=1326 audit(1531061908.489:74): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12238 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455ba9 code=0x50000 [ 209.678493] audit: type=1326 audit(1531061908.489:75): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12238 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455ba9 code=0x50000 [ 209.678513] audit: type=1326 audit(1531061908.492:76): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12238 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455ba9 code=0x50000 [ 209.678534] audit: type=1326 audit(1531061908.492:77): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12238 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455ba9 code=0x50000 [ 209.678555] audit: type=1326 audit(1531061908.492:78): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12238 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455ba9 code=0x50000 [ 209.820332] audit: type=1326 audit(1531061908.492:79): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12238 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455ba9 code=0x50000 14:58:28 executing program 0: r0 = socket(0x10, 0x80002, 0x0) connect$netlink(r0, &(0x7f0000000040)=@unspec, 0xc) 14:58:28 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:28 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_fuse_mount(&(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:58:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000000)='GPL\x00', 0x4, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0x0, 0xb6, &(0x7f0000000000), &(0x7f0000000100)=""/182}, 0x28) 14:58:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x40) 14:58:28 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000240)={[{@nojoliet='nojoliet', 0x2c}]}) 14:58:29 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000004000), 0x33f, 0x0, &(0x7f0000002000)={0x2}, 0x10) umount2(&(0x7f0000000200)='./file0\x00', 0x4) umount2(&(0x7f0000000040)='./file0\x00', 0x4) 14:58:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x40) 14:58:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) read(r2, &(0x7f0000000280)=""/1, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000fd0ffc)) ioctl$TCSETAF(r2, 0x5401, &(0x7f0000000000)) r3 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) [ 210.116154] BTRFS error (device loop6): superblock checksum mismatch [ 210.137425] BTRFS error (device loop6): open_ctree failed [ 210.320799] ISOFS: Unable to identify CD-ROM format. 14:58:29 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x40) 14:58:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000023000)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000000240)={0x1c, 0x27, 0xaff, 0x0, 0x0, {0x5}, [@typed={0x8, 0x1, @binary='^'}]}, 0x1c}, 0x1}, 0x0) 14:58:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) r2 = gettid() r3 = fcntl$dupfd(r1, 0x0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000280)=""/176, 0xb0}], 0x1) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1004000000016) [ 210.408130] ISOFS: Unable to identify CD-ROM format. [ 210.411785] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 210.432908] BTRFS error (device loop6): superblock checksum mismatch [ 210.471533] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 210.482826] BTRFS error (device loop6): open_ctree failed 14:58:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x40) 14:58:29 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1269, 0x700000) 14:58:29 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="025cc83d6d345f8f762070") mbind(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000100), 0x100, 0x0) mbind(&(0x7f0000001000/0x4000)=nil, 0x4002, 0x4002, &(0x7f0000000040)=0xf2, 0x3f, 0x3) 14:58:29 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = dup(r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x100000001}}, 0xe) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f}, 0xe) [ 210.654201] BTRFS error (device loop6): superblock checksum mismatch [ 210.672757] BTRFS error (device loop6): open_ctree failed 14:58:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3}], 0x18}], 0x1, 0x0) 14:58:29 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x3a, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 14:58:29 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 210.792171] BTRFS error (device loop6): superblock checksum mismatch [ 210.813094] BTRFS error (device loop6): open_ctree failed 14:58:29 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 210.856794] BTRFS error (device loop2): superblock checksum mismatch [ 210.872953] BTRFS error (device loop2): open_ctree failed [ 210.915152] BTRFS error (device loop2): superblock checksum mismatch [ 210.946400] BTRFS error (device loop2): open_ctree failed [ 210.963798] BTRFS error (device loop6): superblock checksum mismatch [ 210.993920] BTRFS error (device loop6): open_ctree failed 14:58:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) r2 = gettid() r3 = fcntl$dupfd(r1, 0x0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000280)=""/176, 0xb0}], 0x1) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1004000000016) [ 211.324217] BTRFS error (device loop2): superblock checksum mismatch [ 211.342801] BTRFS error (device loop2): open_ctree failed [ 211.358402] BTRFS error (device loop2): superblock checksum mismatch 14:58:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 211.395934] BTRFS error (device loop2): open_ctree failed [ 211.418380] BTRFS error (device loop2): superblock checksum mismatch 14:58:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 211.450128] BTRFS error (device loop2): open_ctree failed 14:58:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 211.510697] BTRFS error (device loop2): superblock checksum mismatch [ 211.550009] BTRFS error (device loop2): open_ctree failed 14:58:30 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 211.572630] BTRFS error (device loop0): superblock checksum mismatch [ 211.609646] BTRFS error (device loop0): open_ctree failed 14:58:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:30 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 211.664446] BTRFS error (device loop4): superblock checksum mismatch [ 211.680620] BTRFS error (device loop4): open_ctree failed 14:58:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 211.746541] BTRFS error (device loop2): superblock checksum mismatch [ 211.785272] BTRFS error (device loop2): open_ctree failed 14:58:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 211.804477] BTRFS error (device loop2): superblock checksum mismatch [ 211.839726] BTRFS error (device loop2): open_ctree failed 14:58:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 211.914846] BTRFS error (device loop4): superblock checksum mismatch [ 211.937779] BTRFS error (device loop4): open_ctree failed [ 211.969371] BTRFS error (device loop2): superblock checksum mismatch [ 211.980984] BTRFS error (device loop2): open_ctree failed 14:58:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:30 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 212.031581] BTRFS error (device loop0): superblock checksum mismatch [ 212.058763] BTRFS error (device loop0): open_ctree failed 14:58:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) r2 = gettid() r3 = fcntl$dupfd(r1, 0x0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000280)=""/176, 0xb0}], 0x1) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1004000000016) 14:58:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 212.163203] BTRFS error (device loop4): superblock checksum mismatch [ 212.185181] BTRFS error (device loop4): open_ctree failed 14:58:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 212.374114] BTRFS error (device loop4): superblock checksum mismatch 14:58:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 212.415436] BTRFS error (device loop4): open_ctree failed 14:58:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:58:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:58:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:58:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:58:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB]) 14:58:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:58:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB]) 14:58:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:35 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB]) 14:58:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:58:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:35 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100000, &(0x7f0000000380), &(0x7f0000000100), &(0x7f0000000180), &(0x7f0000000280)) 14:58:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000001340)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000001200)={0x30, 0x0, 0x0, 0x0, 0x0, {0x5}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}]}, 0x30}, 0x1}, 0x0) recvmsg(r1, &(0x7f0000000000)={&(0x7f0000f7ffa8)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x329}], 0x1, &(0x7f0000fb3fa9)=""/87, 0x57}, 0x0) 14:58:35 executing program 5: socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f00006c4f60)=[{&(0x7f0000317fa3)="b5c5242e283536f05dfcf3c925d43c6cf1eb17fde04dfbf2b3", 0x19}], 0x1) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000180), &(0x7f0000000280)=0x8) write(r0, &(0x7f0000805000)="346bd71b3c015b53c0833e97df6312f9b0659db5b29837caa9", 0x19) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x4) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x0, 0x0, &(0x7f00000fff80), 0x0, &(0x7f00001e1e78)}], 0x1, 0x0) 14:58:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) read(r2, &(0x7f0000000280)=""/1, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000fd0ffc)=0xe) ioctl$TCSETSF(r2, 0x541b, &(0x7f0000000000)) r3 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) 14:58:35 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000300)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) flistxattr(r2, &(0x7f0000000080)=""/123, 0x7b) 14:58:35 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000140)={0xaa}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/223, 0xdf) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r2, &(0x7f0000465f8e)=""/114, 0x72) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000080)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 14:58:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setlease(r1, 0x400, 0x1) rename(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='./file0\x00') 14:58:35 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr\x00') exit(0x0) fchownat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 14:58:35 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000010407031dfffd946fa283000a200a0009000100030000000c1baba20400ff7e", 0x24}], 0x1}, 0x0) 14:58:35 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local={0x1, 0x80, 0xc2}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0xe803, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x4, 0x0, @empty, @broadcast=0xffffffff}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 14:58:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setlease(r1, 0x400, 0x1) rename(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='./file0\x00') 14:58:35 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100000, &(0x7f0000000380), &(0x7f0000000100), &(0x7f0000000180), &(0x7f0000000280)) 14:58:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x10, 0x3, 0x0) r2 = dup(r1) write(r2, &(0x7f00000000c0)="1b0000004a001f0fff07f4f9002304000a04f51108000100020100", 0x1b) recvmmsg(r2, &(0x7f0000004c40)=[{{&(0x7f0000004500)=@rc, 0x80, &(0x7f0000004640), 0x0, &(0x7f0000004680)=""/160, 0x52}}, {{&(0x7f0000004740)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000004ac0), 0x147, &(0x7f0000004b40)=""/206, 0xce}}], 0x2, 0x0, &(0x7f0000004dc0)={0x77359400}) 14:58:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x2, 0x0, [0x277, 0xc0000081]}) [ 216.701991] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 216.728676] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 14:58:35 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x40085112, &(0x7f0000000040)={0xfffffffffffffffe}) 14:58:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setlease(r1, 0x400, 0x1) rename(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='./file0\x00') 14:58:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x10, 0x3, 0x0) r2 = dup(r1) write(r2, &(0x7f00000000c0)="1b0000004a001f0fff07f4f9002304000a04f51108000100020100", 0x1b) recvmmsg(r2, &(0x7f0000004c40)=[{{&(0x7f0000004500)=@rc, 0x80, &(0x7f0000004640), 0x0, &(0x7f0000004680)=""/160, 0x52}}, {{&(0x7f0000004740)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000004ac0), 0x147, &(0x7f0000004b40)=""/206, 0xce}}], 0x2, 0x0, &(0x7f0000004dc0)={0x77359400}) 14:58:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f00000004c0)={0x0, 0x0}) move_pages(r2, 0x215d, &(0x7f0000000080)=[&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000040), 0x0) 14:58:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setlease(r1, 0x400, 0x1) rename(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='./file0\x00') 14:58:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xfdfdffff}) 14:58:36 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = getpgrp(0x0) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000053b000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, &(0x7f0000008ff8)=0x3f) fcntl$setown(r3, 0x8, r1) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b28fe0)=[{r4}], 0x1, 0xfffffffffffffff8) r5 = dup3(r3, r4, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f00000002c0)={0x13, 0x10, 0xfa00}, 0x18) tkill(r2, 0x16) 14:58:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x10, 0x3, 0x0) r2 = dup(r1) write(r2, &(0x7f00000000c0)="1b0000004a001f0fff07f4f9002304000a04f51108000100020100", 0x1b) recvmmsg(r2, &(0x7f0000004c40)=[{{&(0x7f0000004500)=@rc, 0x80, &(0x7f0000004640), 0x0, &(0x7f0000004680)=""/160, 0x52}}, {{&(0x7f0000004740)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000004ac0), 0x147, &(0x7f0000004b40)=""/206, 0xce}}], 0x2, 0x0, &(0x7f0000004dc0)={0x77359400}) 14:58:36 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100000, &(0x7f0000000380), &(0x7f0000000100), &(0x7f0000000180), &(0x7f0000000280)) 14:58:36 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)=',', 0x1}], 0x1, &(0x7f0000000440)}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000001180)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a078007b4972aba36cae02004373a6a74d74cb15a52c5f8426cb6f235d38048fd91f5d6100fd58a335df10add227d804167ba191c7a035c5a2a916e7fef18a6003578820b3e0be26a22f2c149f40a0335cadcca64a5e44179e6ce4d7f7c16e8a96c5be7cdf66eef901cb8eeabc94bae30acca8c6fa02889c32311044dcbc9a2e02e0632f7f9aa96849abede543773745e4652fccc503003f10cd68ddab594969ad36cb622ed7ba22dc46a80fb63ac2c561a80ae5c10b295b9f75d9536ba1ac24b8e9ae217611ffe79cb9422158475c1a89a51547d13c03b68d75ffb5717a35f381774567871e9e4190272c97eafcfa0a07a751d0bc8eeb0c206e12b2cff1065a3d5622635fa44c0dcb0722ad4c97e6b7d5844b2e9bab9ba1d083fa2930a3ea267d7f15d817e2b2e055ccfbaf019292f6156efd3a9a13ea90ecf59fc1bf35c6626db1c6759a50ed84acefd3cdb3532da1f23a262055223e7a3a62f15eeb8060dc9cfa30e6783757ae2f0ac6ed75d3212591ccd73de4aed62fda77585403cb2d1446e86c12fc6ad1b8f954960a439a096ec3bf1dcc6e8cff12c8abe42391d75c0861ddd448b7dbf208cf748c9de63551ee1d1c14934b18d", 0x2c1}], 0x1, &(0x7f0000000200)}, 0x8000) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2973ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a95310da713cff077b06000000d4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147ee038b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe26ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd292fdf886ee3e64b90f47ce22661c7a21f7bc10df0248079b7be17284eb54e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d7b3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade00300000031a4", 0x2d7}], 0x1, &(0x7f0000001780)}, 0x0) 14:58:36 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0xca}], 0x1, 0x4000000000) 14:58:36 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000140)={{0x80}, "706f7274310000000100", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 14:58:36 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'broute\x00', 0x20, 0x1, 0x240, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x86dd, 'syzkaller0\x00', 'tunl0\x00', 'sit0\x00', 'ifb0\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x128, 0x160, 0x1b0, [@ip6={'ip6\x00', 0x50, {{@empty, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, [], [], 0x0, 0x3a, 0x240}}}, @mark_m={'mark_m\x00', 0x18}]}, [@common=@dnat={'dnat\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x2b8) 14:58:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x10, 0x3, 0x0) r2 = dup(r1) write(r2, &(0x7f00000000c0)="1b0000004a001f0fff07f4f9002304000a04f51108000100020100", 0x1b) recvmmsg(r2, &(0x7f0000004c40)=[{{&(0x7f0000004500)=@rc, 0x80, &(0x7f0000004640), 0x0, &(0x7f0000004680)=""/160, 0x52}}, {{&(0x7f0000004740)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000004ac0), 0x147, &(0x7f0000004b40)=""/206, 0xce}}], 0x2, 0x0, &(0x7f0000004dc0)={0x77359400}) 14:58:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000540)={&(0x7f0000000280)={0x14}, 0x14}, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000001) 14:58:36 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100000, &(0x7f0000000380), &(0x7f0000000100), &(0x7f0000000180), &(0x7f0000000280)) 14:58:36 executing program 2: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mkdirat(r0, &(0x7f0000000140)='A/f.Le0\x00', 0x0) 14:58:36 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x2003}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8, 0x1b}]}, 0x28}, 0x1}, 0x0) ioctl$TUNSETOWNER(r0, 0x400454ce, 0x0) 14:58:36 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") keyctl$clear(0x17, 0x0) 14:58:36 executing program 6: r0 = socket$inet6(0xa, 0x401000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f7379732f6e01742f697076342f76732f636f6e6e5f72657573825f0500000000", 0x2, 0x0) quotactl(0x2080000201, &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000000)) 14:58:36 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@ipv6_deladdr={0x34, 0x15, 0x1, 0x0, 0x0, {0xa}, [@IFA_FLAGS={0x8, 0x8}, @IFA_LOCAL={0x14, 0x2, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}]}, 0x34}, 0x1}, 0x0) [ 217.846802] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 217.861140] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 217.871936] 8021q: adding VLAN 0 to HW filter on device  14:58:36 executing program 7: r0 = epoll_create1(0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2, 0x2) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) write$fuse(r1, &(0x7f00000000c0)={0xffffffffffffff3b, 0x0, 0x0, @fuse_notify_inval_inode_out}, 0x28) [ 217.963929] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:58:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000040c0)=[{{&(0x7f00000012c0)=@vsock={0x0, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000280)}}, {{0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000001680)=""/5, 0x5}, {&(0x7f0000001700)=""/195, 0xc3}], 0x2, &(0x7f00000018c0)=""/185, 0xb9}}], 0x2, 0x0, &(0x7f0000004280)={0x77359400}) 14:58:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000001f000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha384-ssse3)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="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", 0x100) 14:58:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='projid_map\x00') 14:58:37 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xe, 0x4, 0x4, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000000)='o', &(0x7f00000001c0)}, 0x20) 14:58:37 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x2000000802, 0x0) connect$inet6(r1, &(0x7f000000cfe4)={0xa}, 0x1c) sendmmsg(r1, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)=[{0x18, 0x29, 0x3b, "01"}], 0x18}}], 0x1, 0x0) 14:58:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x4170000}, 0xc, &(0x7f00000000c0)={&(0x7f0000001040)=@updpolicy={0xb8, 0x19, 0x101, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa, 0xfffffff0, 0xf0ffffffffffff}}}, 0x24f}, 0x1}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000100)=@flushpolicy={0x10, 0x1d, 0x1}, 0x10}, 0x1}, 0x0) 14:58:37 executing program 7: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f0000000080)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, r2) 14:58:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="9ff2e5"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:58:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$assume_authority(0x10, r1) 14:58:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000580), 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0xc0010140}]}) 14:58:37 executing program 6: r0 = socket$inet6(0xa, 0x6, 0x0) io_setup(0x1f0, &(0x7f0000000000)=0x0) listen(r0, 0x0) io_submit(r1, 0x1, &(0x7f0000000780)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040)="ab", 0x1}]) 14:58:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x0, 0x0, {0x6}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4}, @IPVS_SVC_ATTR_AF={0x8, 0x1}]}]}, 0x28}, 0x1}, 0x0) 14:58:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") unshare(0x20020000) mkdir(&(0x7f00001a3000)='./file0\x00', 0x0) mount(&(0x7f00000016c0)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000001700)='ramfs\x00', 0x0, &(0x7f000000a000)) poll(&(0x7f0000000080), 0x0, 0x400007f) rmdir(&(0x7f0000d19000)='./file0\x00') [ 218.579805] netlink: 'syz-executor4': attribute type 4 has an invalid length. [ 218.587576] netlink: 'syz-executor4': attribute type 1 has an invalid length. 14:58:37 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=@ipv4_newaddr={0x34, 0x14, 0x11d, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @dev={0xac, 0x14, 0x14}}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x7}}]}, 0x34}, 0x1}, 0x0) 14:58:37 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0), 0x0) 14:58:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x0, 0x0) syz_emit_ethernet(0x2e, &(0x7f0000000300)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x32, 0x0, @dev={0xac, 0x14, 0x14}, @local={0xac, 0x14, 0x14, 0xaa}, {[@lsrr={0x83, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @multicast2=0xe0000002}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0x53e]}) [ 218.637182] netlink: 'syz-executor4': attribute type 4 has an invalid length. [ 218.644586] netlink: 'syz-executor4': attribute type 1 has an invalid length. 14:58:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x4170000}, 0xc, &(0x7f00000000c0)={&(0x7f0000001040)=@updpolicy={0xb8, 0x19, 0x101, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa, 0xfffffff0, 0xf0ffffffffffff}}}, 0x24f}, 0x1}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000100)=@flushpolicy={0x10, 0x1d, 0x1}, 0x10}, 0x1}, 0x0) 14:58:37 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 14:58:37 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x8, 0x10008, 0x0, 0xffffffffffffffff, 0x0, [0x18]}, 0x2c) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000100)) 14:58:37 executing program 6: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00`\x00', 0x20, 0x2, 0x5b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001040], 0x0, &(0x7f0000000080), &(0x7f0000001040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'veth0_to_team\x00', 'ipddp0\x00', 'bridge_slave_0\x00', "7465616d5f73ff5e76655f30004000", @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x6f, 0x1e8, 0x218}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:usb_device_t:s0\x00'}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0x0, 'bond_slave_0\x00', 'veth1_to_bridge\x00', 'syz_tun\x00', 'eql\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0xa8, 0x1d8, 0x308, [@mac={'mac\x00', 0x10}]}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:var_spool_t:s0\x00'}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:bsdpty_device_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2}]}, 0x628) 14:58:37 executing program 0: r0 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f0000000680)="dfb2e8ae58c47354068f636919b051d0fe1d25fec10b38eaf23f0a4e1dca322763c72f758a8954d95c5080376b97543e8f6dadc7e837b419b127f508", 0x3c, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000000)='./file0\x00') clone(0x0, &(0x7f0000000340), &(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000005040)=""/4096, 0x1000) 14:58:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x4170000}, 0xc, &(0x7f00000000c0)={&(0x7f0000001040)=@updpolicy={0xb8, 0x19, 0x101, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa, 0xfffffff0, 0xf0ffffffffffff}}}, 0x24f}, 0x1}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000100)=@flushpolicy={0x10, 0x1d, 0x1}, 0x10}, 0x1}, 0x0) 14:58:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(generic-gcm-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000280)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000480)=""/255, 0xff}], 0x1}}, {{&(0x7f0000000ec0)=@nl=@proc, 0x3b2, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0xef, &(0x7f00000011c0)=""/157, 0x9d}}], 0x367, 0x0, &(0x7f0000001380)={0x77359400}) 14:58:37 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') readv(r0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/242, 0xf2}], 0x1) [ 218.889601] kernel msg: ebtables bug: please report to author: entry offsets not in right order 14:58:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x800010, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) ftruncate(r0, 0x273d) 14:58:37 executing program 6: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r0 = socket(0x11, 0x80002, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0xc5) sendmmsg$inet_sctp(r0, &(0x7f0000000700)=[{&(0x7f0000000200)=@in6={0xa, 0x0, 0x1}, 0x1c, &(0x7f0000000580), 0x0, &(0x7f0000000680)}], 0x492492492492682, 0x0) 14:58:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x4170000}, 0xc, &(0x7f00000000c0)={&(0x7f0000001040)=@updpolicy={0xb8, 0x19, 0x101, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa, 0xfffffff0, 0xf0ffffffffffff}}}, 0x24f}, 0x1}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000100)=@flushpolicy={0x10, 0x1d, 0x1}, 0x10}, 0x1}, 0x0) 14:58:37 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') readv(r0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/242, 0xf2}], 0x1) [ 219.267913] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 1041) [ 219.276406] FAT-fs (loop3): Filesystem has been set read-only 14:58:38 executing program 6: prctl$seccomp(0x2f, 0x0, &(0x7f0000000000)={0x1ffffffffffffe67, &(0x7f0000000080)}) 14:58:38 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000a40)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x9, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000200010081000000"], 0x18) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f00000000c0)="295ee1311f16f477671070") write$binfmt_elf64(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 14:58:38 executing program 0: r0 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f0000000680)="dfb2e8ae58c47354068f636919b051d0fe1d25fec10b38eaf23f0a4e1dca322763c72f758a8954d95c5080376b97543e8f6dadc7e837b419b127f508", 0x3c, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000000)='./file0\x00') clone(0x0, &(0x7f0000000340), &(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000005040)=""/4096, 0x1000) 14:58:38 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x8, 0x10008, 0x0, 0xffffffffffffffff, 0x0, [0x18]}, 0x2c) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000100)) 14:58:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d5500ff1febe34f73eea0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000022c0)=[{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="3e552afd5921c487b3e07553e4fea738", 0x10}], 0x1, &(0x7f0000000340)}], 0x1, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000000)=""/129, 0x81}], 0x1) 14:58:38 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') readv(r0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/242, 0xf2}], 0x1) 14:58:38 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f00000a9000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x4000000, &(0x7f0000000100)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) 14:58:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x800010, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) ftruncate(r0, 0x273d) 14:58:38 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) write(r0, &(0x7f0000002280)='7', 0x1) 14:58:38 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') readv(r0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/242, 0xf2}], 0x1) 14:58:38 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0xf0, 0xf0, 0x120, [@limit={'limit\x00', 0x20, {{0x0, 0x2}}}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'vlan0\x00', 'lo\x00', 'rose0\x00', 'bridge0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2c8) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 14:58:38 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa000003fe, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 14:58:38 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x4, 0x0, 0x0, 0x0, 0x0, 0x7fb}, 0x20) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x2}, 0x8) sendto$inet6(r1, &(0x7f0000000080)="ba", 0x1, 0x0, 0x0, 0x0) 14:58:38 executing program 0: r0 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f0000000680)="dfb2e8ae58c47354068f636919b051d0fe1d25fec10b38eaf23f0a4e1dca322763c72f758a8954d95c5080376b97543e8f6dadc7e837b419b127f508", 0x3c, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000000)='./file0\x00') clone(0x0, &(0x7f0000000340), &(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000005040)=""/4096, 0x1000) 14:58:38 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x8, 0x10008, 0x0, 0xffffffffffffffff, 0x0, [0x18]}, 0x2c) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000100)) [ 219.911444] rpcbind: RPC call returned error 22 [ 219.933589] rpcbind: RPC call returned error 22 14:58:38 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='dos1xfloppy,uid=,debug,errors=remouot-ro,debug,showexec,discard,codepage=0']) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x8000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 14:58:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x800010, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) ftruncate(r0, 0x273d) 14:58:38 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback=0x7f000001}, 0x10) sendmsg$inet_sctp(r0, &(0x7f00000029c0)={&(0x7f0000000240)=@in={0x2}, 0x10, &(0x7f0000002740)=[{&(0x7f00000026c0)='\t', 0x1}], 0x1, &(0x7f0000002900)=[@init={0x18, 0x84}], 0x18}, 0x20000000) 14:58:38 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) r1 = getpgid(0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000080)=0x9) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) read(r2, &(0x7f0000000280)=""/1, 0x1) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000000)) r3 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) readv(r2, &(0x7f0000001580)=[{&(0x7f00000014c0)=""/136, 0x88}], 0x1) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) 14:58:38 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x1, 0x0) dup2(r0, r1) [ 220.085627] FAT-fs (loop2): Unrecognized mount option "uid=" or missing value 14:58:39 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x3}, 0xe) 14:58:39 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) sendfile(r1, r2, &(0x7f00000003c0), 0x3) [ 220.162918] FAT-fs (loop2): codepage cp0 not found 14:58:39 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) capset(&(0x7f00000fc000)={0x19980330}, &(0x7f000047efe8)) r2 = mq_open(&(0x7f0000000000)="2d1f05", 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x2}) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400080, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000080)) mq_timedsend(r2, &(0x7f0000e71fff), 0x0, 0x0, 0x0) ioctl$void(r0, 0xc0045878) mq_open(&(0x7f0000000180)="2d1f05", 0xc0, 0xa2, &(0x7f00000001c0)={0x6, 0x0, 0x8, 0xea9, 0x1, 0x7, 0x7e}) mq_timedsend(r2, &(0x7f0000000040), 0x0, 0x0, &(0x7f000058eff0)={0x77359400}) mq_timedreceive(r2, &(0x7f0000000740)=""/131, 0x2e0, 0x80000000000008, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r3, 0x0, 0x483, &(0x7f0000000140)={0x3c, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e23, 0x2, 'rr\x00', 0x4f8b6cf5f627cc0b, 0x7, 0x5f}, 0x2c) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f00000000c0)={0x6, {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @rand_addr=0xdbd}, {0x2, 0x4e22, @rand_addr=0x4}, 0x100, 0x4, 0x8000, 0x225, 0x40, 0x0, 0x1, 0xff, 0x1}) process_vm_readv(r1, &(0x7f0000000200)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x10000000000000fc, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0xfffffe08}], 0x1, 0x0) r4 = semget$private(0x0, 0x3, 0x690) semctl$IPC_RMID(r4, 0x0, 0x0) 14:58:39 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0xef}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x314, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) shutdown(r0, 0x1) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) 14:58:39 executing program 0: r0 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f0000000680)="dfb2e8ae58c47354068f636919b051d0fe1d25fec10b38eaf23f0a4e1dca322763c72f758a8954d95c5080376b97543e8f6dadc7e837b419b127f508", 0x3c, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000000)='./file0\x00') clone(0x0, &(0x7f0000000340), &(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000005040)=""/4096, 0x1000) 14:58:39 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)={0x5}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) poll(&(0x7f0000000040)=[{r2, 0x200}, {r0, 0x4000}], 0x2, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:58:39 executing program 7: r0 = socket(0x1, 0x5, 0x0) accept$alg(r0, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x1c) 14:58:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x8, 0x10008, 0x0, 0xffffffffffffffff, 0x0, [0x18]}, 0x2c) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000100)) 14:58:39 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) ioctl$KVM_GET_MSRS(r0, 0x405c5503, &(0x7f0000000380)) 14:58:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x800010, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) ftruncate(r0, 0x273d) 14:58:39 executing program 7: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r1, 0xfffc) write$binfmt_misc(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='s'], 0x1) ftruncate(r1, 0x0) 14:58:39 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x2, 0x0, [0x40000072]}) 14:58:39 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) fstat(r1, &(0x7f0000000100)) 14:58:39 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x60001, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b3fdc)) write(r1, &(0x7f00000001c0)='\t', 0x1) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETS(r2, 0x5412, &(0x7f00000000c0)={0x12}) [ 220.662160] FAT-fs (loop7): error, invalid access to FAT (entry 0x00000045) [ 220.669428] FAT-fs (loop7): Filesystem has been set read-only 14:58:39 executing program 7: r0 = socket$inet(0x2, 0x80003, 0xab) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000740)=@broute={'broute\x00', 0x20, 0x2, 0x3c8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, &(0x7f0000000300), &(0x7f0000000340)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x3, 0x0, 0x800, 'bond0\x00', 'vlan0\x00', 'gre0\x00', 'gretap0\x00', @link_local={0x1, 0x80, 0xc2}, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0xb8, 0x1e8, 0x230, [@ip={'ip\x00', 0x20, {{@rand_addr, @empty, 0x0, 0x0, 0x0, 0x0, 0x14, 0x9}}}]}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:systemd_logind_exec_t:s0\x00'}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}, {{{0x11, 0x0, 0x0, 'bond0\x00', 'ipddp0\x00', 'yam0\x00', 'eql\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x70, 0xa0, 0xd8}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8}]}, @common=@dnat={'dnat\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x440) 14:58:39 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='usrjquota=']) 14:58:39 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6}, 0x14) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000440)="0d43b7057acfb01f48fd1ddf667540cbe37494b4e376a6ac63c29a7fca9db9656088", 0x22}], 0x1, &(0x7f0000000040)}, 0x0) 14:58:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'veth1_to_bond\x00', &(0x7f0000000000)=@ethtool_stats={0x34}}) close(r2) close(r1) [ 221.030833] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 221.083816] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 14:58:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x1) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739c9d, 0x120, 0x0, 0x35) recvmsg(r0, &(0x7f0000000580)={&(0x7f0000000000)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/19, 0x13}, 0x1) 14:58:40 executing program 6: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00005cfff6)='/dev/cuse\x00', 0x8010000080802, 0x0) pread64(r0, &(0x7f0000a4c000)=""/56, 0x38, 0x0) write$fuse(r0, &(0x7f00007df000)={0x10, 0xffffffffffffffff, 0x1}, 0x10) 14:58:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f00000001c0)=@in={0x2}, 0x80) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000000000), 0x7552bc54) 14:58:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) r1 = getpgid(0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000080)=0x9) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) read(r2, &(0x7f0000000280)=""/1, 0x1) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000000)) r3 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) readv(r2, &(0x7f0000001580)=[{&(0x7f00000014c0)=""/136, 0x88}], 0x1) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) 14:58:40 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) r1 = getpgid(0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000080)=0x9) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) read(r2, &(0x7f0000000280)=""/1, 0x1) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000000)) r3 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) readv(r2, &(0x7f0000001580)=[{&(0x7f00000014c0)=""/136, 0x88}], 0x1) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) 14:58:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) r1 = getpgid(0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000080)=0x9) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) read(r2, &(0x7f0000000280)=""/1, 0x1) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000000)) r3 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) readv(r2, &(0x7f0000001580)=[{&(0x7f00000014c0)=""/136, 0x88}], 0x1) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) 14:58:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") semop(0x0, &(0x7f0000000180)=[{0x0, 0x0, 0x1800}], 0x125) r1 = semget$private(0x0, 0x4, 0x0) semop(r1, &(0x7f00000000c0)=[{0x0, 0x0, 0x17fd}], 0x1) semop(0x0, &(0x7f0000000100)=[{0x0, 0x0, 0x1800}], 0x1) 14:58:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000cc0)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@dev={0xac, 0x14, 0x14}}}}, [@policy_type={0xc, 0x10}]}, 0xcc}, 0x1}, 0x0) 14:58:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f00000001c0)=@in={0x2}, 0x80) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000000000), 0x7552bc54) 14:58:40 executing program 6: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0x0, 0x10001) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000040)='./bus\x00', 0x81, 0x0) sendfile(r1, r0, 0x0, 0xd7c3) lseek(r0, 0x0, 0x4) 14:58:40 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f00000001c0)={0x2, 0x0, [0x488, 0xfdfdffff]}) 14:58:40 executing program 6: r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f762070") r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xd43f58e118afee75}, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r3, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r1, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r4 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'bridge0\x00', 0x0}) sendto$packet(r4, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000080)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) 14:58:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f00000001c0)=@in={0x2}, 0x80) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000000000), 0x7552bc54) 14:58:40 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000240)="295ee1311f16f477671070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000013ff1)={&(0x7f0000000000)={0x1c, 0x28, 0x10000000000005, 0x0, 0x0, {0x1}, [@generic="7b6c6e6602"]}, 0x1c}, 0x1}, 0x0) 14:58:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f00000001c0)=@in={0x2}, 0x80) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000000000), 0x7552bc54) [ 221.518810] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:58:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000), 0x0) 14:58:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={@empty, 0x0, r1}) 14:58:41 executing program 6: r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f762070") r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xd43f58e118afee75}, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r3, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r1, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r4 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'bridge0\x00', 0x0}) sendto$packet(r4, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000080)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) 14:58:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f762070") r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xd43f58e118afee75}, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r3, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r1, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r4 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'bridge0\x00', 0x0}) sendto$packet(r4, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000080)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) 14:58:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0xe440, 0x1) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0x40045731, &(0x7f00000001c0)) 14:58:41 executing program 0: capset(&(0x7f0000000140)={0x20071026}, &(0x7f0000000180)) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000003c0)={'filter\x00', 0x2, [{}, {}]}, 0x48) 14:58:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) r1 = getpgid(0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000080)=0x9) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) read(r2, &(0x7f0000000280)=""/1, 0x1) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000000)) r3 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) readv(r2, &(0x7f0000001580)=[{&(0x7f00000014c0)=""/136, 0x88}], 0x1) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) 14:58:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) r1 = getpgid(0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000080)=0x9) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) read(r2, &(0x7f0000000280)=""/1, 0x1) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000000)) r3 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) readv(r2, &(0x7f0000001580)=[{&(0x7f00000014c0)=""/136, 0x88}], 0x1) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) 14:58:41 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) r1 = getpgid(0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000080)=0x9) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) read(r2, &(0x7f0000000280)=""/1, 0x1) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000000)) r3 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) readv(r2, &(0x7f0000001580)=[{&(0x7f00000014c0)=""/136, 0x88}], 0x1) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) 14:58:41 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1e) connect$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14}}}, 0x1e) 14:58:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f00000002c0)=ANY=[@ANYBLOB="0100000000000000010000000000000018000000ff"]) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f00000001c0)={0x2, 0x0, [0x48b, 0x0, 0x40000000, 0x80ffff]}) 14:58:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f762070") r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xd43f58e118afee75}, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r3, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r1, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r4 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'bridge0\x00', 0x0}) sendto$packet(r4, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000080)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) 14:58:41 executing program 6: r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f762070") r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xd43f58e118afee75}, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r3, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r1, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r4 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'bridge0\x00', 0x0}) sendto$packet(r4, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000080)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) 14:58:41 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x4}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x1000}]}, 0x10) sendto$inet6(r1, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 14:58:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0xe440, 0x1) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0x40045731, &(0x7f00000001c0)) 14:58:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f762070") r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xd43f58e118afee75}, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r3, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r1, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r4 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'bridge0\x00', 0x0}) sendto$packet(r4, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000080)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) 14:58:41 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000f10ffc)=0x3f, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, 0x1c) listen(r0, 0x0) 14:58:41 executing program 6: r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f762070") r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xd43f58e118afee75}, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r3, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r1, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r4 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'bridge0\x00', 0x0}) sendto$packet(r4, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000080)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) 14:58:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80284504, &(0x7f0000000140)) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)=0x6, 0x4) setsockopt(r0, 0x65, 0x5, &(0x7f0000000000), 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f0000000280)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "7748f37cb63d97410f26b25d273c63471a4aea801964650b837c0de5f6704e6cefbe04f5ec1867dc62c9dcd0c6ab798ac9d22a36d96ff25f75c58a213e2d5b9f"}, 0x48}, 0x1}, 0x0) 14:58:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0xe440, 0x1) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0x40045731, &(0x7f00000001c0)) 14:58:41 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r1) r2 = inotify_init1(0x0) dup2(r0, r2) 14:58:41 executing program 6: syz_mount_image$ext4(&(0x7f00000000c0)="fe78743208", &(0x7f0000000080)='/\x00', 0x0, 0x0, &(0x7f0000000840), 0x20, &(0x7f00000001c0)={[{@journal_ioprio={'journal_ioprio', 0x3d, [0x39]}, 0x2c}]}) [ 222.826860] EXT4-fs (sda1): Invalid journal IO priority (must be 0-7) [ 222.859590] EXT4-fs (sda1): Invalid journal IO priority (must be 0-7) 14:58:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) r1 = getpgid(0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000080)=0x9) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) read(r2, &(0x7f0000000280)=""/1, 0x1) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000000)) r3 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) readv(r2, &(0x7f0000001580)=[{&(0x7f00000014c0)=""/136, 0x88}], 0x1) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) 14:58:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) r1 = getpgid(0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000080)=0x9) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) read(r2, &(0x7f0000000280)=""/1, 0x1) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000000)) r3 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) readv(r2, &(0x7f0000001580)=[{&(0x7f00000014c0)=""/136, 0x88}], 0x1) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) 14:58:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f0000000000)="0f09650fc758e7660f211066ba610066b8720066efc74424004f1f3974c744240206000000c7442406000000000f0114243e0f01c80f01d10f30b805000000b9080000000f01d9642e3e0f01ca", 0x4d}], 0x1, 0x0, &(0x7f0000000180), 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0x70003}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000200)="b98a0200000f32c4c1d971d7c1b9990000400f32b9e7080000b8cd000000ba000000000f30f30f233064360f070f017ad565decf66bad104b805000000ef66b827000f00d8", 0x45}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:58:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0xe440, 0x1) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0x40045731, &(0x7f00000001c0)) 14:58:41 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r1) r2 = inotify_init1(0x0) dup2(r0, r2) 14:58:41 executing program 6: capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) clock_adjtime(0x0, &(0x7f0000000200)={0x7ff}) 14:58:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") clock_gettime(0x2, &(0x7f0000000040)) 14:58:41 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) r1 = getpgid(0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000080)=0x9) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) read(r2, &(0x7f0000000280)=""/1, 0x1) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000000)) r3 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) readv(r2, &(0x7f0000001580)=[{&(0x7f00000014c0)=""/136, 0x88}], 0x1) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) 14:58:42 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r1) r2 = inotify_init1(0x0) dup2(r0, r2) 14:58:42 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) getsockname(r0, &(0x7f0000000140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, &(0x7f00000001c0)=0x80) 14:58:42 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x18, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback={0x0, 0x1}, @in=@remote={0xac, 0x14, 0x14, 0xbb}}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x80}, 0x1}, 0x0) 14:58:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="000100000008000081000000c9030000f4000204000000000000000000000000002000000000000040350ce9943df0256e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)) 14:58:42 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x3e1, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) shutdown(r1, 0x1) 14:58:42 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r1) r2 = inotify_init1(0x0) dup2(r0, r2) 14:58:42 executing program 0: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000380)="eb64c86d6b66732ee6617400020441090564073008f8", 0x16}], 0x8040, &(0x7f0000000000)=ANY=[]) 14:58:42 executing program 6: execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400), &(0x7f0000000500)=[&(0x7f0000000480)='-[}\x00', &(0x7f00000004c0)="00000600"], 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) [ 223.382956] EXT4-fs (loop2): invalid inodes per group: 8192 [ 223.382956] [ 223.466588] EXT4-fs (loop2): invalid inodes per group: 8192 [ 223.466588] 14:58:42 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x200000088) recvfrom$inet6(r0, &(0x7f0000000080)=""/185, 0xb9, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000280)=0x85a, 0x4) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f0000000040)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000002540)}, 0x0) 14:58:42 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@nat={'nat\x00', 0x19, 0x1, 0x1b0, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000040), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'rose0\x00', 'eql\x00', 'syzkaller0\x00', 'ifb0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @empty, [], 0xf0, 0xf0, 0x120, [@devgroup={'devgroup\x00', 0x18, {{0x3}}}, @devgroup={'devgroup\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x228) 14:58:42 executing program 3: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x2a, &(0x7f0000000000)=""/62, &(0x7f0000000080)=0x3e) 14:58:42 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = fanotify_init(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 14:58:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x8, 0xfffffffffffffffa, 0x5, 0xfffffffffffff2fc, 0x4, 0xfffffffffffffffe, 0x2, {0x0, @in6={{0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x7fffffff}}, 0xfffffffffffff001, 0x8, 0x1ff, 0x0, 0x2}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={0x0, 0x400}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000200)={r2, 0x3, 0xdb0f, 0xbe, 0x7, 0x3, 0x2, 0x100000000, {r3, @in={{0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x7, 0x4, 0x1, 0x3ff, 0x6}}, &(0x7f00000002c0)=0xb0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bridge_slave_1\x00'}, 0x1a3) ioctl(r0, 0x800000000008982, &(0x7f0000000080)) accept4$unix(r1, &(0x7f0000000300), &(0x7f0000000380)=0x6e, 0x800) 14:58:42 executing program 6: execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400), &(0x7f0000000500)=[&(0x7f0000000480)='-[}\x00', &(0x7f00000004c0)="00000600"], 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) 14:58:42 executing program 7: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000007ffe) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) accept4(r0, &(0x7f0000000000)=@in={0x0, 0x0, @local}, &(0x7f0000000080)=0xffffffffffffff15, 0x0) recvfrom$inet(r1, &(0x7f00000000c0)=""/50, 0x32, 0x0, 0x0, 0x0) 14:58:42 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@empty, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}, @tcp={{0xffff8000, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f0000000040)={0x0, 0xfffffffffffffffd, [0x0, 0xfffffffffffffffd]}) 14:58:42 executing program 3: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2}, 0x21) listen(r0, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040)={0x303, 0x33}, 0x4) 14:58:42 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000000)) mknod(&(0x7f00000000c0)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000578fe8), &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') preadv(r1, &(0x7f00000027c0)=[{&(0x7f0000000740)=""/4096, 0x1277}], 0x1, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f00000003c0)) creat(&(0x7f0000000100)='./file0\x00', 0x0) 14:58:43 executing program 6: execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400), &(0x7f0000000500)=[&(0x7f0000000480)='-[}\x00', &(0x7f00000004c0)="00000600"], 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) 14:58:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x8, 0xfffffffffffffffa, 0x5, 0xfffffffffffff2fc, 0x4, 0xfffffffffffffffe, 0x2, {0x0, @in6={{0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x7fffffff}}, 0xfffffffffffff001, 0x8, 0x1ff, 0x0, 0x2}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={0x0, 0x400}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000200)={r2, 0x3, 0xdb0f, 0xbe, 0x7, 0x3, 0x2, 0x100000000, {r3, @in={{0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x7, 0x4, 0x1, 0x3ff, 0x6}}, &(0x7f00000002c0)=0xb0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bridge_slave_1\x00'}, 0x1a3) ioctl(r0, 0x800000000008982, &(0x7f0000000080)) accept4$unix(r1, &(0x7f0000000300), &(0x7f0000000380)=0x6e, 0x800) 14:58:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="025cc83d6d345f8f762070") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000040)="0009e0ffffffffffffff05000000000400000000", 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 14:58:43 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 14:58:43 executing program 2: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000289000)={&(0x7f0000cf1ff4)={0x10}, 0xc, &(0x7f0000703000)={&(0x7f000023f000)=ANY=[@ANYBLOB="840000000000000000000000000000000046659a62290ffc380c2dbfc75e89e106ba4206274d760dfe0597260617e101000006000000001cb4e2bf501db1bb9427ecd8337f6d63cc8769c29c4d91b00ffff0be48b748d3050bc1700612dbc3080c91125fa158cf0d70309f7f19007c8262d732940142ab1cf90b11e0141c63f5f94035"], 0x83}, 0x1}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x20b) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f000053b000)={0xa}, 0x1c) 14:58:43 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r0) syz_fuseblk_mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:58:43 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000280)=0x7, 0x4) 14:58:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x8, 0xfffffffffffffffa, 0x5, 0xfffffffffffff2fc, 0x4, 0xfffffffffffffffe, 0x2, {0x0, @in6={{0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x7fffffff}}, 0xfffffffffffff001, 0x8, 0x1ff, 0x0, 0x2}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={0x0, 0x400}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000200)={r2, 0x3, 0xdb0f, 0xbe, 0x7, 0x3, 0x2, 0x100000000, {r3, @in={{0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x7, 0x4, 0x1, 0x3ff, 0x6}}, &(0x7f00000002c0)=0xb0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bridge_slave_1\x00'}, 0x1a3) ioctl(r0, 0x800000000008982, &(0x7f0000000080)) accept4$unix(r1, &(0x7f0000000300), &(0x7f0000000380)=0x6e, 0x800) 14:58:43 executing program 6: execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400), &(0x7f0000000500)=[&(0x7f0000000480)='-[}\x00', &(0x7f00000004c0)="00000600"], 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) 14:58:43 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000004c0)="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", 0x101, 0x400}], 0x0, &(0x7f0000000080)) 14:58:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x3) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f000082ef0a)=""/246) 14:58:43 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'rfc3686(ctr(aes-aesni))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df", 0x14) 14:58:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_read_part_table(0x23000000, 0x1, &(0x7f0000001ac0)=[{&(0x7f0000000000)='ER', 0x2}]) [ 224.936684] loop4: unable to read partition table 14:58:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x8, 0xfffffffffffffffa, 0x5, 0xfffffffffffff2fc, 0x4, 0xfffffffffffffffe, 0x2, {0x0, @in6={{0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x7fffffff}}, 0xfffffffffffff001, 0x8, 0x1ff, 0x0, 0x2}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={0x0, 0x400}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000200)={r2, 0x3, 0xdb0f, 0xbe, 0x7, 0x3, 0x2, 0x100000000, {r3, @in={{0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x7, 0x4, 0x1, 0x3ff, 0x6}}, &(0x7f00000002c0)=0xb0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bridge_slave_1\x00'}, 0x1a3) ioctl(r0, 0x800000000008982, &(0x7f0000000080)) accept4$unix(r1, &(0x7f0000000300), &(0x7f0000000380)=0x6e, 0x800) 14:58:43 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d345f8f762070") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000003c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000400)=@bridge_getlink={0x28, 0x12, 0xa01, 0x0, 0x0, {0x7}, [@IFLA_IF_NETNSID={0x8, 0x1d}]}, 0x28}, 0x1}, 0x0) [ 224.958506] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (a7be1829) [ 224.982586] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 14:58:43 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x800000018, &(0x7f0000001280)=0x800, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x800}]}, 0x10) sendmsg(r0, &(0x7f0000001440)={&(0x7f0000000140)=@in6={0xa, 0x4e21}, 0x42f, &(0x7f0000001200), 0x322}, 0x8000) sendmsg(r0, &(0x7f0000000200)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f00000001c0), 0x23e, &(0x7f00000036c0)}, 0x0) 14:58:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000140)=ANY=[]) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x428200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$fiemap(r2, 0xc020660b, &(0x7f0000000480)=ANY=[@ANYBLOB="00000900000000008e000000004eeaffff"]) [ 225.062982] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (a7be1829) 14:58:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d345f8f762070") socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) [ 225.128928] loop4: unable to read partition table 14:58:44 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000001, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000100)={{0x7fffffff, 0x100000000000a}, {}, 0xfffffffffffffffe}) 14:58:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)="0000000201000000000000010400000000000000", 0x14, 0x0) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB='security.secur'], &(0x7f0000000240)='security.capabimity\x00', 0x14, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 225.162836] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 14:58:44 executing program 5: clock_gettime(0xffffffffffffffff, &(0x7f00000036c0)) 14:58:44 executing program 6: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}}) 14:58:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_read_part_table(0x23000000, 0x1, &(0x7f0000001ac0)=[{&(0x7f0000000000)='ER', 0x2}]) 14:58:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='com.apple.FinderInfo\x00', &(0x7f0000000040)='vboxnet1\'\'posix_acl_accessmd5sum$!nodev/ppp0![!!proc\x00', 0x35, 0x0) ioctl(r1, 0xc2604111, &(0x7f0000000040)) 14:58:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000100)="025cc83d6d345f8f762070") clock_gettime(0x30a9f7b8a7436003, &(0x7f0000000180)) 14:58:44 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="ad56b6c5820faeb995298992ea54c7be", 0x10) r2 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000e4b000)=0x0) sendmsg$alg(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001300), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_submit(r3, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000500)='\x00', 0x1}]) 14:58:44 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmat(r1, &(0x7f0000ffc000/0x1000)=nil, 0x0) get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0xfffffffffffffff8, &(0x7f0000ffc000/0x1000)=nil, 0x3) 14:58:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6_sctp(0xa, 0x100000000000005, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040), 0x4) getsockname(r1, &(0x7f0000000080)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, &(0x7f0000000100)=0x80) [ 225.412813] loop4: unable to read partition table [ 225.432862] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 14:58:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='com.apple.FinderInfo\x00', &(0x7f0000000040)='vboxnet1\'\'posix_acl_accessmd5sum$!nodev/ppp0![!!proc\x00', 0x35, 0x0) ioctl(r1, 0xc2604111, &(0x7f0000000040)) 14:58:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = timerfd_create(0x0, 0x0) r2 = dup(r1) poll(&(0x7f0000002800)=[{r1}], 0x1, 0xf038) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0x40085400, &(0x7f0000000000)={0x7}) 14:58:44 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bond_slave_0\x00'}) 14:58:44 executing program 0: r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xcf, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) 14:58:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_read_part_table(0x23000000, 0x1, &(0x7f0000001ac0)=[{&(0x7f0000000000)='ER', 0x2}]) 14:58:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f00000003c0)='/dev/input/mouse#\x00', 0x0, 0x109001) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 14:58:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='com.apple.FinderInfo\x00', &(0x7f0000000040)='vboxnet1\'\'posix_acl_accessmd5sum$!nodev/ppp0![!!proc\x00', 0x35, 0x0) ioctl(r1, 0xc2604111, &(0x7f0000000040)) 14:58:44 executing program 6: r0 = syz_fuseblk_mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0) write$fuse(r0, &(0x7f0000000140)={0x28, 0x4, 0x0, @fuse_notify_delete_out={0x1}}, 0x28) 14:58:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000002c0)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f000016b000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="1b0775b0d50100e5b30bfb8e43b60c065d", 0x11) 14:58:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:45 executing program 6: r0 = syz_fuseblk_mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0) write$fuse(r0, &(0x7f0000000140)={0x28, 0x4, 0x0, @fuse_notify_delete_out={0x1}}, 0x28) 14:58:45 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bond_slave_0\x00'}) 14:58:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 226.209912] BTRFS error (device loop2): superblock checksum mismatch [ 226.222461] BTRFS error (device loop2): open_ctree failed 14:58:45 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 226.310247] BTRFS error (device loop3): superblock checksum mismatch [ 226.338868] BTRFS error (device loop3): open_ctree failed [ 226.352718] BTRFS error (device loop2): superblock checksum mismatch [ 226.372520] BTRFS error (device loop2): open_ctree failed 14:58:45 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:45 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 226.633059] loop4: unable to read partition table [ 226.640384] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 14:58:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = timerfd_create(0x0, 0x0) r2 = dup(r1) poll(&(0x7f0000002800)=[{r1}], 0x1, 0xf038) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0x40085400, &(0x7f0000000000)={0x7}) 14:58:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='com.apple.FinderInfo\x00', &(0x7f0000000040)='vboxnet1\'\'posix_acl_accessmd5sum$!nodev/ppp0![!!proc\x00', 0x35, 0x0) ioctl(r1, 0xc2604111, &(0x7f0000000040)) 14:58:45 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bond_slave_0\x00'}) 14:58:45 executing program 0: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:45 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_read_part_table(0x23000000, 0x1, &(0x7f0000001ac0)=[{&(0x7f0000000000)='ER', 0x2}]) [ 226.793993] loop4: unable to read partition table 14:58:45 executing program 6: r0 = syz_fuseblk_mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0) write$fuse(r0, &(0x7f0000000140)={0x28, 0x4, 0x0, @fuse_notify_delete_out={0x1}}, 0x28) 14:58:45 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bond_slave_0\x00'}) [ 226.818269] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 226.842465] BTRFS error (device loop3): superblock checksum mismatch [ 226.869497] BTRFS error (device loop3): open_ctree failed [ 226.884403] BTRFS error (device loop3): superblock checksum mismatch [ 226.909929] BTRFS error (device loop3): open_ctree failed [ 226.945635] BTRFS error (device loop3): superblock checksum mismatch 14:58:45 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 226.974225] BTRFS error (device loop3): open_ctree failed 14:58:45 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:45 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 227.062881] BTRFS error (device loop3): superblock checksum mismatch [ 227.107231] BTRFS error (device loop3): open_ctree failed [ 227.146236] BTRFS error (device loop2): superblock checksum mismatch 14:58:46 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 227.173241] BTRFS error (device loop2): open_ctree failed [ 227.203785] BTRFS error (device loop0): superblock checksum mismatch [ 227.208184] IPVS: ftp: loaded support on port[0] = 21 14:58:46 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 227.256923] BTRFS error (device loop0): open_ctree failed [ 227.282766] BTRFS error (device loop3): superblock checksum mismatch 14:58:46 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 227.311424] BTRFS error (device loop3): open_ctree failed [ 227.349915] BTRFS error (device loop2): superblock checksum mismatch [ 227.385224] FAULT_INJECTION: forcing a failure. [ 227.385224] name failslab, interval 1, probability 0, space 0, times 1 [ 227.396529] CPU: 0 PID: 14091 Comm: syz-executor0 Not tainted 4.18.0-rc3+ #136 [ 227.403891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.413247] Call Trace: [ 227.415854] dump_stack+0x1c9/0x2b4 [ 227.419486] ? dump_stack_print_info.cold.2+0x52/0x52 [ 227.424677] should_fail.cold.4+0xa/0x1a [ 227.428737] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 227.433838] ? lock_downgrade+0x8f0/0x8f0 [ 227.437990] ? proc_fail_nth_write+0x9e/0x210 [ 227.442475] ? proc_cwd_link+0x1d0/0x1d0 [ 227.446527] ? find_held_lock+0x36/0x1c0 [ 227.450577] ? dce_v8_0_crtc_do_set_base+0x90/0x1a90 [ 227.455676] ? check_same_owner+0x340/0x340 [ 227.460001] ? rcu_note_context_switch+0x730/0x730 [ 227.464931] __should_failslab+0x124/0x180 [ 227.469158] should_failslab+0x9/0x14 [ 227.472966] __kmalloc+0x2c8/0x760 [ 227.476495] ? strncpy_from_user+0x510/0x510 [ 227.480890] ? fput+0x130/0x1a0 [ 227.484186] ? __x64_sys_memfd_create+0x142/0x4f0 [ 227.489031] __x64_sys_memfd_create+0x142/0x4f0 [ 227.493687] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 227.499209] ? memfd_fcntl+0x1400/0x1400 [ 227.503279] ? do_syscall_64+0x9a/0x820 [ 227.507246] do_syscall_64+0x1b9/0x820 [ 227.511121] ? finish_task_switch+0x1d3/0x890 [ 227.515606] ? syscall_return_slowpath+0x5e0/0x5e0 [ 227.520522] ? syscall_return_slowpath+0x31d/0x5e0 [ 227.525446] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 227.530812] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 227.535652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.540826] RIP: 0033:0x455ba9 [ 227.543999] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 227.563255] RSP: 002b:00007f3b14630a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 227.570951] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455ba9 [ 227.578220] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004ba7f0 14:58:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 227.585485] RBP: 000000000072bea0 R08: 0000000020000318 R09: 00000000fbad8001 [ 227.592739] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 227.600005] R13: 00000000004c228c R14: 00000000004d3840 R15: 0000000000000000 [ 227.629610] BTRFS error (device loop2): open_ctree failed 14:58:46 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:58:46 executing program 2 (fault-call:2 fault-nth:0): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 227.673791] BTRFS error (device loop3): superblock checksum mismatch [ 227.690597] BTRFS error (device loop3): open_ctree failed 14:58:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = timerfd_create(0x0, 0x0) r2 = dup(r1) poll(&(0x7f0000002800)=[{r1}], 0x1, 0xf038) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0x40085400, &(0x7f0000000000)={0x7}) 14:58:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 227.760920] FAULT_INJECTION: forcing a failure. [ 227.760920] name failslab, interval 1, probability 0, space 0, times 0 [ 227.772270] CPU: 1 PID: 14106 Comm: syz-executor0 Not tainted 4.18.0-rc3+ #136 [ 227.779637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.788995] Call Trace: [ 227.791605] dump_stack+0x1c9/0x2b4 [ 227.795271] ? dump_stack_print_info.cold.2+0x52/0x52 [ 227.800486] ? print_usage_bug+0xc0/0xc0 [ 227.804665] should_fail.cold.4+0xa/0x1a [ 227.808740] ? trace_hardirqs_on+0x10/0x10 [ 227.810711] BTRFS error (device loop3): superblock checksum mismatch [ 227.813003] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 227.813029] ? find_held_lock+0x36/0x1c0 [ 227.813058] ? find_held_lock+0x36/0x1c0 [ 227.813089] ? check_same_owner+0x340/0x340 [ 227.820939] BTRFS error (device loop3): open_ctree failed [ 227.824709] ? rcu_note_context_switch+0x730/0x730 [ 227.824729] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 227.824750] __should_failslab+0x124/0x180 [ 227.824768] should_failslab+0x9/0x14 [ 227.824790] kmem_cache_alloc+0x2af/0x760 [ 227.864811] __d_alloc+0xc8/0xd50 [ 227.868268] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 227.873291] ? do_raw_spin_unlock+0xa7/0x2f0 [ 227.877711] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 227.882331] ? __lock_is_held+0xb5/0x140 [ 227.886404] ? _raw_spin_unlock+0x22/0x30 [ 227.890553] ? __alloc_fd+0x34e/0x710 [ 227.894364] ? exit_files+0xb0/0xb0 [ 227.897998] d_alloc_pseudo+0x1d/0x30 [ 227.901807] __shmem_file_setup+0x1f3/0x700 [ 227.906134] ? check_same_owner+0x340/0x340 [ 227.910463] ? shmem_fill_super+0xa50/0xa50 [ 227.914788] ? get_unused_fd_flags+0x122/0x1a0 [ 227.919368] ? __alloc_fd+0x710/0x710 [ 227.923177] shmem_file_setup+0x2f/0x40 [ 227.927155] __x64_sys_memfd_create+0x2af/0x4f0 [ 227.931825] ? memfd_fcntl+0x1400/0x1400 [ 227.935891] ? do_syscall_64+0x9a/0x820 [ 227.939872] do_syscall_64+0x1b9/0x820 [ 227.943766] ? syscall_return_slowpath+0x5e0/0x5e0 [ 227.948699] ? syscall_return_slowpath+0x31d/0x5e0 [ 227.953634] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 227.959007] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 227.963860] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.969075] RIP: 0033:0x455ba9 [ 227.972257] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 227.991641] RSP: 002b:00007f3b14630a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 227.999359] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455ba9 [ 228.006628] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004ba7f0 [ 228.013898] RBP: 000000000072bea0 R08: 0000000020000318 R09: 00000000fbad8001 [ 228.021167] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 228.028437] R13: 00000000004c228c R14: 00000000004d3840 R15: 0000000000000001 14:58:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:46 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 228.102813] BTRFS error (device loop3): superblock checksum mismatch [ 228.117574] BTRFS error (device loop3): open_ctree failed [ 228.125908] FAULT_INJECTION: forcing a failure. [ 228.125908] name failslab, interval 1, probability 0, space 0, times 0 [ 228.137264] CPU: 1 PID: 14123 Comm: syz-executor0 Not tainted 4.18.0-rc3+ #136 [ 228.144630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.153968] Call Trace: [ 228.156571] dump_stack+0x1c9/0x2b4 [ 228.160197] ? dump_stack_print_info.cold.2+0x52/0x52 [ 228.165384] ? __kernel_text_address+0xd/0x40 [ 228.169905] should_fail.cold.4+0xa/0x1a [ 228.173969] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 228.179069] ? save_stack+0xa9/0xd0 [ 228.182682] ? save_stack+0x43/0xd0 [ 228.186301] ? kasan_kmalloc+0xc4/0xe0 [ 228.190184] ? kasan_slab_alloc+0x12/0x20 [ 228.194323] ? kmem_cache_alloc+0x12e/0x760 [ 228.198654] ? __d_alloc+0xc8/0xd50 [ 228.202265] ? d_alloc_pseudo+0x1d/0x30 [ 228.206229] ? __shmem_file_setup+0x1f3/0x700 [ 228.210721] ? shmem_file_setup+0x2f/0x40 [ 228.214872] ? find_held_lock+0x36/0x1c0 [ 228.218963] ? check_same_owner+0x340/0x340 [ 228.223293] ? rcu_note_context_switch+0x730/0x730 [ 228.228232] ? kasan_check_read+0x11/0x20 [ 228.232371] __should_failslab+0x124/0x180 [ 228.236615] should_failslab+0x9/0x14 [ 228.240415] kmem_cache_alloc+0x2af/0x760 [ 228.244556] ? rcu_read_lock_sched_held+0x108/0x120 [ 228.249565] ? kmem_cache_alloc+0x5fa/0x760 [ 228.253877] ? shmem_destroy_callback+0xc0/0xc0 [ 228.258537] shmem_alloc_inode+0x1b/0x40 [ 228.262601] alloc_inode+0x63/0x190 [ 228.266222] new_inode_pseudo+0x71/0x1a0 [ 228.270288] ? prune_icache_sb+0x1b0/0x1b0 [ 228.274515] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 228.279532] new_inode+0x1c/0x40 [ 228.282899] shmem_get_inode+0xf1/0x910 [ 228.286864] ? shmem_encode_fh+0x340/0x340 [ 228.291086] ? _raw_spin_unlock+0x22/0x30 [ 228.295216] ? __alloc_fd+0x34e/0x710 [ 228.299004] ? exit_files+0xb0/0xb0 [ 228.302635] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 228.308171] __shmem_file_setup+0x259/0x700 [ 228.312486] ? check_same_owner+0x340/0x340 [ 228.316814] ? shmem_fill_super+0xa50/0xa50 [ 228.321131] ? get_unused_fd_flags+0x122/0x1a0 [ 228.325707] ? __alloc_fd+0x710/0x710 [ 228.329531] shmem_file_setup+0x2f/0x40 [ 228.333504] __x64_sys_memfd_create+0x2af/0x4f0 [ 228.338167] ? memfd_fcntl+0x1400/0x1400 [ 228.342213] ? do_syscall_64+0x9a/0x820 [ 228.346186] do_syscall_64+0x1b9/0x820 [ 228.350066] ? finish_task_switch+0x1d3/0x890 [ 228.354543] ? syscall_return_slowpath+0x5e0/0x5e0 [ 228.359475] ? syscall_return_slowpath+0x31d/0x5e0 [ 228.364415] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 228.369776] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 228.374622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.379802] RIP: 0033:0x455ba9 [ 228.382985] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 228.402185] RSP: 002b:00007f3b14630a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 228.409876] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455ba9 [ 228.417127] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004ba7f0 [ 228.424390] RBP: 000000000072bea0 R08: 0000000020000318 R09: 00000000fbad8001 [ 228.431673] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 228.438936] R13: 00000000004c228c R14: 00000000004d3840 R15: 0000000000000002 [ 228.461970] FAULT_INJECTION: forcing a failure. [ 228.461970] name failslab, interval 1, probability 0, space 0, times 0 [ 228.473278] CPU: 1 PID: 14109 Comm: syz-executor2 Not tainted 4.18.0-rc3+ #136 [ 228.480664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.490021] Call Trace: [ 228.492626] dump_stack+0x1c9/0x2b4 [ 228.496273] ? dump_stack_print_info.cold.2+0x52/0x52 [ 228.501486] should_fail.cold.4+0xa/0x1a [ 228.506459] ? fault_create_debugfs_attr+0x1f0/0x1f0 14:58:47 executing program 3: socket$inet6(0xa, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 228.511575] ? lock_downgrade+0x8f0/0x8f0 [ 228.515735] ? proc_fail_nth_write+0x9e/0x210 [ 228.520237] ? proc_cwd_link+0x1d0/0x1d0 [ 228.524320] ? find_held_lock+0x36/0x1c0 [ 228.528413] ? check_same_owner+0x340/0x340 [ 228.532751] ? rcu_note_context_switch+0x730/0x730 [ 228.537695] __should_failslab+0x124/0x180 [ 228.541948] should_failslab+0x9/0x14 [ 228.545757] __kmalloc+0x2c8/0x760 [ 228.549308] ? strncpy_from_user+0x510/0x510 [ 228.553730] ? fput+0x130/0x1a0 [ 228.557017] ? __x64_sys_memfd_create+0x142/0x4f0 [ 228.561863] __x64_sys_memfd_create+0x142/0x4f0 [ 228.566530] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 228.572086] ? memfd_fcntl+0x1400/0x1400 [ 228.576139] ? do_syscall_64+0x9a/0x820 [ 228.580106] do_syscall_64+0x1b9/0x820 [ 228.583981] ? finish_task_switch+0x1d3/0x890 [ 228.588464] ? syscall_return_slowpath+0x5e0/0x5e0 [ 228.593390] ? syscall_return_slowpath+0x31d/0x5e0 [ 228.598310] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 228.603677] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 228.608524] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.613711] RIP: 0033:0x455ba9 [ 228.616883] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 228.636154] RSP: 002b:00007f7fd6c0da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 228.643863] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455ba9 [ 228.651119] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004ba7f0 [ 228.658373] RBP: 000000000072bea0 R08: 0000000020000318 R09: 00000000fbad8001 [ 228.665628] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000014 [ 228.672886] R13: 00000000004c228c R14: 00000000004d3840 R15: 0000000000000000 [ 228.739447] BTRFS error (device loop3): superblock checksum mismatch [ 228.748866] BTRFS error (device loop3): open_ctree failed [ 229.789388] device bridge_slave_1 left promiscuous mode [ 229.794973] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.809635] device bridge_slave_0 left promiscuous mode [ 229.815163] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.816359] team0 (unregistering): Port device team_slave_1 removed [ 231.827252] team0 (unregistering): Port device team_slave_0 removed [ 231.836981] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 231.858070] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 231.883845] bond0 (unregistering): Released all slaves [ 232.135090] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.141636] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.149760] device bridge_slave_0 entered promiscuous mode [ 232.185124] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.191554] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.198835] device bridge_slave_1 entered promiscuous mode [ 232.233982] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 232.270216] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 232.379009] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 232.419618] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 232.594504] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 232.602198] team0: Port device team_slave_0 added [ 232.637103] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 232.644650] team0: Port device team_slave_1 added [ 232.681821] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.720461] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.758857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.798844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.149787] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.156227] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.162901] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.169284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.177840] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 233.952276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.984705] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.063344] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 234.141320] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 234.147884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.155631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.226369] 8021q: adding VLAN 0 to HW filter on device team0 14:58:53 executing program 6: r0 = syz_fuseblk_mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0) write$fuse(r0, &(0x7f0000000140)={0x28, 0x4, 0x0, @fuse_notify_delete_out={0x1}}, 0x28) 14:58:53 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:58:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:53 executing program 3: socket$inet6(0xa, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = timerfd_create(0x0, 0x0) r2 = dup(r1) poll(&(0x7f0000002800)=[{r1}], 0x1, 0xf038) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0x40085400, &(0x7f0000000000)={0x7}) 14:58:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000500)="91ff9f5079bce14f0a87bbe2036f55545f2ff4b1dbf9a5fb32dcfadf9d7990ec3f2cd88e7e5f9657228e8a9dc70b044ba45a827655c8f8b55dafe61342e893c6ecbd9e9e9a189ac850b20d1087cff7cec6877039de3cfa40c9ea49035286cc3c7cce7f1ebd39e3d685c0473ec59cb0e67183169244bab30d7acb9d51fc938878bbaed1836ed4d482db6742161cc88c582f33ad1868294c51e69f536d136c4b6cc7e1cf5e810c3895fbcdbe5371573bad4bb63a593e17acca9cecbb", 0xbb, 0x3ff}], 0x10, &(0x7f0000000840)={[{@gid={'gid', 0x3d, [0x32, 0x0, 0x7f]}, 0x2c}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, [0x31, 0x3d, 0x3f, 0x2d]}, 0x2c}, {@disable_sparse_no={'disable_sparse=no', 0x3d, [0x35, 0x30, 0x36, 0x3f]}, 0x2c}, {@gid={'gid', 0x3d, [0xb1fcf7292a1d5173]}, 0x2c}, {@disable_sparse_yes={'disable_sparse=yes', 0x3d, [0x36, 0x32]}, 0x2c}, {@utf8='utf8', 0x2c}]}) 14:58:53 executing program 4: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x2, 0x0) recvfrom$inet6(r1, &(0x7f00000012c0)=""/4096, 0x1000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x2004e24}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) ioctl(r1, 0x4000008906, &(0x7f0000000200)) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 14:58:53 executing program 5: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) ioctl$sock_ifreq(r0, 0x8943, &(0x7f0000000380)={'syz_tun\x00', @ifru_hwaddr=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}) [ 234.685852] FAULT_INJECTION: forcing a failure. [ 234.685852] name failslab, interval 1, probability 0, space 0, times 0 [ 234.697157] CPU: 0 PID: 14398 Comm: syz-executor0 Not tainted 4.18.0-rc3+ #136 [ 234.704526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.713996] Call Trace: [ 234.716599] dump_stack+0x1c9/0x2b4 [ 234.720276] ? dump_stack_print_info.cold.2+0x52/0x52 [ 234.725481] ? __lock_acquire+0x7fc/0x5020 [ 234.729742] should_fail.cold.4+0xa/0x1a [ 234.733821] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 234.738944] ? find_held_lock+0x36/0x1c0 [ 234.743022] ? graph_lock+0x170/0x170 [ 234.746846] ? find_held_lock+0x36/0x1c0 [ 234.750944] ? check_same_owner+0x340/0x340 [ 234.755277] ? graph_lock+0x170/0x170 [ 234.759100] ? rcu_note_context_switch+0x730/0x730 [ 234.764041] ? kasan_check_read+0x11/0x20 [ 234.768203] __should_failslab+0x124/0x180 [ 234.769770] sg_write: data in/out 16777180/80 bytes for SCSI command 0x0-- guessing data in; 14:58:53 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}], "caeb"}, 0x7a) [ 234.769770] program syz-executor5 not setting count and/or reply_len properly [ 234.772459] should_failslab+0x9/0x14 [ 234.772479] kmem_cache_alloc+0x2af/0x760 [ 234.772499] ? find_held_lock+0x36/0x1c0 [ 234.772523] get_empty_filp+0x12d/0x530 [ 234.772539] ? proc_nr_files+0x60/0x60 [ 234.772561] ? kasan_check_read+0x11/0x20 [ 234.772574] ? do_raw_spin_unlock+0xa7/0x2f0 [ 234.772597] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 234.812977] __ntfs_error: 58 callbacks suppressed [ 234.812988] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. 14:58:53 executing program 5: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f0000000140)={[{@check_strict='check=strict', 0x2c}]}) [ 234.817046] ? kasan_check_write+0x14/0x20 [ 234.817062] ? do_raw_spin_lock+0xc1/0x200 [ 234.817083] alloc_file+0x24/0x3e0 [ 234.817098] ? clear_nlink.part.9+0x65/0x80 [ 234.817121] __shmem_file_setup+0x313/0x700 [ 234.821715] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 234.826539] ? check_same_owner+0x340/0x340 [ 234.826558] ? shmem_fill_super+0xa50/0xa50 [ 234.826576] ? get_unused_fd_flags+0x122/0x1a0 [ 234.834973] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. [ 234.839177] ? __alloc_fd+0x710/0x710 [ 234.839197] shmem_file_setup+0x2f/0x40 [ 234.839231] __x64_sys_memfd_create+0x2af/0x4f0 [ 234.894466] ISOFS: Unable to identify CD-ROM format. [ 234.895377] ? memfd_fcntl+0x1400/0x1400 [ 234.895397] ? do_syscall_64+0x9a/0x820 [ 234.895418] do_syscall_64+0x1b9/0x820 [ 234.895433] ? finish_task_switch+0x1d3/0x890 [ 234.895451] ? syscall_return_slowpath+0x5e0/0x5e0 [ 234.895468] ? syscall_return_slowpath+0x31d/0x5e0 [ 234.895490] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 234.895510] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 234.941589] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.946765] RIP: 0033:0x455ba9 [ 234.949937] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 234.969210] RSP: 002b:00007f3b14630a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 234.976907] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455ba9 [ 234.984161] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004ba7f0 [ 234.991416] RBP: 000000000072bea0 R08: 0000000020000318 R09: 00000000fbad8001 [ 234.998670] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 235.005925] R13: 00000000004c228c R14: 00000000004d3840 R15: 0000000000000003 [ 235.040209] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 235.048753] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 235.060832] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. 14:58:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000100)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @rand_addr}, 0x10) listen(r2, 0x0) 14:58:54 executing program 0 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 235.121957] ISOFS: Unable to identify CD-ROM format. [ 235.134093] BTRFS error (device loop3): superblock checksum mismatch 14:58:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btr.s\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 235.199490] BTRFS error (device loop3): open_ctree failed [ 235.243752] FAULT_INJECTION: forcing a failure. [ 235.243752] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 235.255916] CPU: 1 PID: 14442 Comm: syz-executor0 Not tainted 4.18.0-rc3+ #136 [ 235.263282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.272638] Call Trace: [ 235.275250] dump_stack+0x1c9/0x2b4 [ 235.278899] ? dump_stack_print_info.cold.2+0x52/0x52 [ 235.284102] ? __radix_tree_lookup+0x3dd/0x6e0 [ 235.288717] should_fail.cold.4+0xa/0x1a [ 235.292799] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 235.297936] ? graph_lock+0x170/0x170 [ 235.301749] ? find_held_lock+0x36/0x1c0 [ 235.305833] ? find_held_lock+0x36/0x1c0 [ 235.309906] ? __lock_is_held+0xb5/0x140 [ 235.313968] ? check_same_owner+0x340/0x340 [ 235.318308] ? rcu_note_context_switch+0x730/0x730 [ 235.323250] __alloc_pages_nodemask+0x36e/0xdb0 [ 235.327918] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 235.332924] ? trace_hardirqs_on+0x10/0x10 [ 235.337159] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 235.342187] ? percpu_counter_add_batch+0xf2/0x150 [ 235.347110] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 235.352132] ? __vm_enough_memory+0x590/0x980 [ 235.356626] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 235.362153] alloc_pages_vma+0xdd/0x540 [ 235.366121] shmem_alloc_page+0xa8/0x190 [ 235.370173] ? shmem_swapin+0x230/0x230 [ 235.374152] ? print_usage_bug+0xc0/0xc0 [ 235.378227] shmem_alloc_and_acct_page+0x1f1/0x820 [ 235.383159] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 235.387830] shmem_getpage_gfp+0x6ea/0x41e0 [ 235.392164] ? print_usage_bug+0xc0/0xc0 [ 235.396236] ? shmem_writepage+0x1380/0x1380 [ 235.400634] ? print_usage_bug+0xc0/0xc0 [ 235.404688] ? __lock_acquire+0x7fc/0x5020 [ 235.408913] ? print_usage_bug+0xc0/0xc0 [ 235.412975] ? __lock_acquire+0x7fc/0x5020 [ 235.417201] ? print_usage_bug+0xc0/0xc0 [ 235.421249] ? __lock_acquire+0x7fc/0x5020 [ 235.425469] ? __lock_acquire+0x7fc/0x5020 [ 235.429705] ? check_noncircular+0x20/0x20 [ 235.433928] ? __lock_acquire+0x7fc/0x5020 [ 235.438163] ? __lock_acquire+0x7fc/0x5020 [ 235.442392] ? trace_hardirqs_on+0x10/0x10 [ 235.446613] ? print_usage_bug+0xc0/0xc0 [ 235.450665] ? __lock_acquire+0x7fc/0x5020 [ 235.454901] ? print_usage_bug+0xc0/0xc0 [ 235.458961] ? print_usage_bug+0xc0/0xc0 [ 235.463012] ? graph_lock+0x170/0x170 [ 235.466807] ? print_usage_bug+0xc0/0xc0 [ 235.470864] ? __lock_acquire+0x7fc/0x5020 [ 235.475090] ? __lock_acquire+0x7fc/0x5020 [ 235.479316] ? graph_lock+0x170/0x170 [ 235.483120] ? find_held_lock+0x36/0x1c0 [ 235.487259] ? print_usage_bug+0xc0/0xc0 [ 235.491341] ? lock_downgrade+0x8f0/0x8f0 [ 235.495476] ? kasan_check_read+0x11/0x20 [ 235.499611] ? lock_release+0xa30/0xa30 [ 235.503576] ? mark_held_locks+0xc9/0x160 [ 235.507713] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 235.513247] ? iov_iter_fault_in_readable+0x23d/0x460 [ 235.518423] ? copy_page_from_iter+0x890/0x890 [ 235.522989] ? __sanitizer_cov_trace_cmp8+0xd/0x20 [ 235.527905] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 235.533095] shmem_write_begin+0x110/0x1e0 [ 235.537323] generic_perform_write+0x3ae/0x6c0 [ 235.541902] ? add_page_wait_queue+0x2c0/0x2c0 [ 235.546820] ? file_update_time+0xe4/0x640 [ 235.551044] ? current_time+0x1b0/0x1b0 [ 235.555013] ? down_write+0x8f/0x130 [ 235.558719] __generic_file_write_iter+0x26e/0x630 [ 235.563665] generic_file_write_iter+0x438/0x870 [ 235.568410] ? __generic_file_write_iter+0x630/0x630 [ 235.573515] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 235.579038] ? iov_iter_init+0xc9/0x1f0 [ 235.583000] __vfs_write+0x6c6/0x9f0 [ 235.586709] ? kernel_read+0x120/0x120 [ 235.590588] ? __lock_is_held+0xb5/0x140 [ 235.594660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 235.600184] ? __sb_start_write+0x17f/0x300 [ 235.604490] vfs_write+0x1f8/0x560 [ 235.608025] ksys_pwrite64+0x181/0x1b0 [ 235.611899] ? __ia32_sys_pread64+0xf0/0xf0 [ 235.616209] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 235.621729] ? fput+0x130/0x1a0 [ 235.624994] ? do_sys_ftruncate+0x44e/0x560 [ 235.629318] __x64_sys_pwrite64+0x97/0xf0 [ 235.633461] do_syscall_64+0x1b9/0x820 [ 235.637344] ? finish_task_switch+0x1d3/0x890 [ 235.641824] ? syscall_return_slowpath+0x5e0/0x5e0 [ 235.646739] ? syscall_return_slowpath+0x31d/0x5e0 [ 235.651677] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 235.657046] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 235.661879] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.667055] RIP: 0033:0x40fe67 [ 235.670225] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 14:58:54 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000004c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/94, 0x5e}], 0x1) 14:58:54 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0x5, &(0x7f00000000c0), 0x4) [ 235.689460] RSP: 002b:00007f3b14630a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 235.697157] RAX: ffffffffffffffda RBX: 0000000020000310 RCX: 000000000040fe67 [ 235.704413] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000014 [ 235.711681] RBP: 0000000000000000 R08: 0000000020000318 R09: 00000000fbad8001 [ 235.718935] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 235.726189] R13: 0000000000000001 R14: 00000000004d3840 R15: 0000000000000004 14:58:54 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000280)="ee67727eb44dadf904bc948611c1d88799f6a496c0a29913233e16013d9eb25c3e08f2f53beecbf406eb736e41b52d1a72834dddf0e50aba616ff2c7a2e169cf516d049a9088a896eb9479eaf9d14572a901d83f9affab0f5d8a1900db18f7b98d4f905900d48919126d1ca35935347bd4d026987879f09cb519b295c506d5a83b04c42233353cd1b114097d245ea7cb1ec7d4d8291a9c65499a6b84e62a216baae9", 0xa2}], 0x1, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000380)=0x2, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f00000003c0)=0x3) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)=ANY=[@ANYBLOB="b5000000ee0cd74c4f4f0aedef73a3991a56623dd3943db5a7e72c946911404ddc2bb351d3295791157b015680cbeb8b1c4dd4f5c460e14a60d944c84694c4de1f3c392c6b4d1b050338f11cc40000000081ff34d1634d9bb9358ed3d67b8024882a1567a764b6bc87ced81043d123be95788afb5c127d6d54a7c9d50e278e9d90b2b5871c94d565f74d708e8bc24661f78342e0215993e5396a4d10d05064283685240c4dd0dd5f0f4020e9dda771d2954f"], &(0x7f0000000140)=0x1) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 235.876011] device bridge_slave_1 left promiscuous mode [ 235.881666] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.965401] device bridge_slave_0 left promiscuous mode [ 235.970960] bridge0: port 1(bridge_slave_0) entered disabled state 14:58:54 executing program 0 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:58:54 executing program 3: socket$inet6(0xa, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:54 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 14:58:54 executing program 5: r0 = getpid() sched_setaffinity(r0, 0x6, &(0x7f0000000080)=0xb4a2) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) io_setup(0x8, &(0x7f00000002c0)) clock_gettime(0x0, &(0x7f0000000300)) 14:58:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) close(r1) 14:58:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btr/s\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 236.070474] FAULT_INJECTION: forcing a failure. [ 236.070474] name failslab, interval 1, probability 0, space 0, times 0 [ 236.082043] CPU: 0 PID: 14490 Comm: syz-executor0 Not tainted 4.18.0-rc3+ #136 [ 236.089389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.098726] Call Trace: [ 236.101303] dump_stack+0x1c9/0x2b4 [ 236.104933] ? dump_stack_print_info.cold.2+0x52/0x52 [ 236.110121] should_fail.cold.4+0xa/0x1a [ 236.114186] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 236.119288] ? __lock_acquire+0x7fc/0x5020 [ 236.123510] ? print_usage_bug+0xc0/0xc0 [ 236.127580] ? print_usage_bug+0xc0/0xc0 [ 236.131627] ? trace_hardirqs_on+0x10/0x10 [ 236.135850] ? lock_downgrade+0x8f0/0x8f0 [ 236.140087] ? __lock_acquire+0x7fc/0x5020 [ 236.144317] ? print_usage_bug+0xc0/0xc0 [ 236.148371] __should_failslab+0x124/0x180 [ 236.152593] should_failslab+0x9/0x14 [ 236.156382] kmem_cache_alloc+0x47/0x760 [ 236.160428] ? radix_tree_node_alloc.constprop.19+0x310/0x310 [ 236.166303] radix_tree_node_alloc.constprop.19+0x1e6/0x310 [ 236.172005] __radix_tree_create+0x4d6/0x840 [ 236.176408] ? radix_tree_maybe_preload_order+0x110/0x110 [ 236.181928] ? find_held_lock+0x36/0x1c0 [ 236.185982] ? graph_lock+0x170/0x170 [ 236.189769] ? __lock_is_held+0xb5/0x140 [ 236.193843] ? print_usage_bug+0xc0/0xc0 [ 236.197914] ? find_held_lock+0x36/0x1c0 [ 236.201966] __radix_tree_insert+0x107/0x8f0 [ 236.206372] ? graph_lock+0x170/0x170 [ 236.210162] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 236.215167] ? __radix_tree_create+0x840/0x840 [ 236.219737] ? lock_acquire+0x1e4/0x540 [ 236.223701] ? shmem_add_to_page_cache+0x49c/0xe00 [ 236.228621] ? lock_release+0xa30/0xa30 [ 236.232606] ? kasan_check_write+0x14/0x20 [ 236.236826] ? do_raw_spin_lock+0xc1/0x200 [ 236.241062] shmem_add_to_page_cache+0x988/0xe00 [ 236.245800] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 236.250198] ? shmem_put_link+0x280/0x280 [ 236.254334] ? percpu_ref_put_many+0x131/0x240 [ 236.258901] ? percpu_ref_tryget+0x2d0/0x2d0 [ 236.263299] ? mem_cgroup_try_charge+0x548/0xa70 [ 236.268043] ? mem_cgroup_protected+0xa60/0xa60 [ 236.272703] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 236.278228] ? shmem_alloc_and_acct_page+0x31a/0x820 [ 236.283321] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 236.287993] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 236.292997] ? __radix_tree_preload+0x173/0x1d0 [ 236.297662] shmem_getpage_gfp+0x81b/0x41e0 [ 236.301979] ? shmem_writepage+0x1380/0x1380 [ 236.306374] ? print_usage_bug+0xc0/0xc0 [ 236.310422] ? __lock_acquire+0x7fc/0x5020 [ 236.314645] ? print_usage_bug+0xc0/0xc0 [ 236.318690] ? __lock_acquire+0x7fc/0x5020 [ 236.322910] ? print_usage_bug+0xc0/0xc0 [ 236.326972] ? __lock_acquire+0x7fc/0x5020 [ 236.331192] ? __lock_acquire+0x7fc/0x5020 [ 236.335414] ? check_noncircular+0x20/0x20 [ 236.339637] ? __lock_acquire+0x7fc/0x5020 [ 236.343860] ? __lock_acquire+0x7fc/0x5020 [ 236.348113] ? trace_hardirqs_on+0x10/0x10 [ 236.352345] ? print_usage_bug+0xc0/0xc0 [ 236.356390] ? __lock_acquire+0x7fc/0x5020 [ 236.360614] ? print_usage_bug+0xc0/0xc0 [ 236.364660] ? print_usage_bug+0xc0/0xc0 [ 236.368708] ? graph_lock+0x170/0x170 [ 236.372497] ? print_usage_bug+0xc0/0xc0 [ 236.376555] ? __lock_acquire+0x7fc/0x5020 [ 236.380776] ? __lock_acquire+0x7fc/0x5020 [ 236.384999] ? graph_lock+0x170/0x170 [ 236.388794] ? find_held_lock+0x36/0x1c0 [ 236.392842] ? print_usage_bug+0xc0/0xc0 [ 236.396895] ? lock_downgrade+0x8f0/0x8f0 [ 236.401034] ? kasan_check_read+0x11/0x20 [ 236.405183] ? lock_release+0xa30/0xa30 [ 236.409145] ? mark_held_locks+0xc9/0x160 [ 236.413280] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 236.418817] ? iov_iter_fault_in_readable+0x23d/0x460 [ 236.423992] ? copy_page_from_iter+0x890/0x890 [ 236.428560] ? __sanitizer_cov_trace_cmp8+0xd/0x20 [ 236.433484] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 236.438672] shmem_write_begin+0x110/0x1e0 [ 236.442900] generic_perform_write+0x3ae/0x6c0 [ 236.447477] ? add_page_wait_queue+0x2c0/0x2c0 [ 236.452045] ? file_update_time+0xe4/0x640 [ 236.456268] ? current_time+0x1b0/0x1b0 [ 236.460236] ? down_write+0x8f/0x130 [ 236.463937] __generic_file_write_iter+0x26e/0x630 [ 236.468943] generic_file_write_iter+0x438/0x870 [ 236.473697] ? __generic_file_write_iter+0x630/0x630 [ 236.478787] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 236.484308] ? iov_iter_init+0xc9/0x1f0 [ 236.488270] __vfs_write+0x6c6/0x9f0 [ 236.491979] ? kernel_read+0x120/0x120 [ 236.495854] ? __lock_is_held+0xb5/0x140 [ 236.499907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 236.505435] ? __sb_start_write+0x17f/0x300 [ 236.509743] vfs_write+0x1f8/0x560 [ 236.513271] ksys_pwrite64+0x181/0x1b0 [ 236.517144] ? __ia32_sys_pread64+0xf0/0xf0 [ 236.521453] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 236.526973] ? fput+0x130/0x1a0 [ 236.530239] ? do_sys_ftruncate+0x44e/0x560 [ 236.534545] __x64_sys_pwrite64+0x97/0xf0 [ 236.538692] do_syscall_64+0x1b9/0x820 [ 236.542575] ? finish_task_switch+0x1d3/0x890 [ 236.547057] ? syscall_return_slowpath+0x5e0/0x5e0 [ 236.551975] ? syscall_return_slowpath+0x31d/0x5e0 [ 236.556892] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 236.562243] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 236.567093] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.572265] RIP: 0033:0x40fe67 [ 236.575444] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 236.594689] RSP: 002b:00007f3b14630a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 236.602411] RAX: ffffffffffffffda RBX: 0000000020000310 RCX: 000000000040fe67 [ 236.609663] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000014 14:58:55 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x4}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x3c, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x88) [ 236.616916] RBP: 0000000000000000 R08: 0000000020000318 R09: 00000000fbad8001 [ 236.624168] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 236.631423] R13: 0000000000000001 R14: 00000000004d3840 R15: 0000000000000005 14:58:55 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 14:58:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x10, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='oom_score\x00') sendfile(r1, r2, &(0x7f00000000c0), 0x80000002) [ 236.672421] team0 (unregistering): Port device team_slave_1 removed [ 236.698528] BTRFS error (device loop3): superblock checksum mismatch [ 236.721335] team0 (unregistering): Port device team_slave_0 removed 14:58:55 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") clock_getres(0x80007, &(0x7f0000000080)) 14:58:55 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) [ 236.742992] BTRFS error (device loop3): open_ctree failed [ 236.770349] bond0 (unregistering): Releasing backup interface bond_slave_1 14:58:55 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 236.817807] bond0 (unregistering): Releasing backup interface bond_slave_0 14:58:55 executing program 0 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:58:55 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) [ 236.953505] IPVS: ftp: loaded support on port[0] = 21 [ 236.972116] bond0 (unregistering): Released all slaves [ 236.975228] FAULT_INJECTION: forcing a failure. [ 236.975228] name failslab, interval 1, probability 0, space 0, times 0 [ 236.988759] CPU: 1 PID: 14526 Comm: syz-executor0 Not tainted 4.18.0-rc3+ #136 14:58:55 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 236.996120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.005478] Call Trace: [ 237.008080] dump_stack+0x1c9/0x2b4 [ 237.011722] ? dump_stack_print_info.cold.2+0x52/0x52 [ 237.016925] ? add_page_wait_queue+0x2c0/0x2c0 [ 237.021531] should_fail.cold.4+0xa/0x1a [ 237.025604] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 237.030717] ? up_write+0x7b/0x220 [ 237.034266] ? up_read+0x110/0x110 [ 237.037816] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 237.043370] ? __generic_file_write_iter+0x1bd/0x630 [ 237.048493] ? find_held_lock+0x36/0x1c0 [ 237.052580] ? dig_playback_pcm_open+0x10/0x50 [ 237.057186] ? check_same_owner+0x340/0x340 [ 237.061524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.067077] ? rcu_note_context_switch+0x730/0x730 [ 237.072017] ? lock_downgrade+0x8f0/0x8f0 [ 237.076178] __should_failslab+0x124/0x180 [ 237.080427] should_failslab+0x9/0x14 [ 237.084238] kmem_cache_alloc+0x2af/0x760 [ 237.088384] getname_flags+0xd0/0x5a0 [ 237.092170] ? __sb_end_write+0xac/0xe0 [ 237.096143] getname+0x19/0x20 [ 237.099355] do_sys_open+0x3a2/0x760 [ 237.103071] ? filp_open+0x80/0x80 [ 237.106613] ? do_sys_ftruncate+0x44e/0x560 [ 237.110924] __x64_sys_open+0x7e/0xc0 [ 237.114741] do_syscall_64+0x1b9/0x820 [ 237.118620] ? finish_task_switch+0x1d3/0x890 [ 237.123111] ? syscall_return_slowpath+0x5e0/0x5e0 [ 237.128049] ? syscall_return_slowpath+0x31d/0x5e0 [ 237.132986] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 237.138351] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 237.143204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.148403] RIP: 0033:0x40fe01 [ 237.151584] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 237.170872] RSP: 002b:00007f3b14630a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 237.178587] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 000000000040fe01 [ 237.185848] RDX: 00007f3b14630afa RSI: 0000000000000002 RDI: 00007f3b14630af0 [ 237.193107] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 14:58:56 executing program 7: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ae6000/0x4000)=nil, 0x4000, 0xe) [ 237.200370] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000014 [ 237.207633] R13: 0000000000000001 R14: 00000000004d3840 R15: 0000000000000006 14:58:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000500)="025cc83d6d345f8f762070") openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x24000, 0x0) 14:58:56 executing program 7: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r1 = dup2(r0, r0) ioctl$LOOP_CLR_FD(r1, 0x800452d3) 14:58:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:56 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)=0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0x200000022d, 0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 14:58:56 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:56 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="025cc83d6d345f8f760070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) setsockopt$inet6_mtu(r1, 0x29, 0x48, &(0x7f0000000000)=0x21440ecf0f3965f0, 0x30) [ 238.153780] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.161090] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.168385] device bridge_slave_0 entered promiscuous mode [ 238.204986] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.211418] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.218732] device bridge_slave_1 entered promiscuous mode [ 238.254374] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 238.289983] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 238.393347] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 238.431868] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 238.595814] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 238.604356] team0: Port device team_slave_0 added [ 238.638985] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 238.646565] team0: Port device team_slave_1 added [ 238.680840] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.711725] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.746372] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 238.753539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.767997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.800344] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 238.807486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.815757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.054794] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.061191] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.067831] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.074195] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.081808] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 239.239246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.821752] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.895604] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 239.969949] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 239.976161] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.983637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.054555] 8021q: adding VLAN 0 to HW filter on device team0 14:58:59 executing program 6: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x2) write$sndseq(r0, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @result}], 0xffffff60) 14:58:59 executing program 7: r0 = memfd_create(&(0x7f0000000100)='/dev/ptmx\x00', 0x2) fcntl$addseals(r0, 0x409, 0x8) fcntl$addseals(r0, 0x409, 0xf) 14:58:59 executing program 0 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:58:59 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKRAGET(r0, 0x8000552c, &(0x7f0000000100)) 14:58:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:59 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:59 executing program 4: socket(0x29, 0x2, 0x4) 14:58:59 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f}, 0xe) 14:58:59 executing program 6: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x2) write$sndseq(r0, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @result}], 0xffffff60) [ 240.525987] FAULT_INJECTION: forcing a failure. [ 240.525987] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 240.537840] CPU: 0 PID: 14851 Comm: syz-executor0 Not tainted 4.18.0-rc3+ #136 [ 240.545216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.545223] Call Trace: [ 240.545247] dump_stack+0x1c9/0x2b4 [ 240.545270] ? dump_stack_print_info.cold.2+0x52/0x52 [ 240.545301] should_fail.cold.4+0xa/0x1a [ 240.545321] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 240.545347] ? trace_hardirqs_on+0x10/0x10 [ 240.545361] ? check_same_owner+0x340/0x340 [ 240.545382] ? find_held_lock+0x36/0x1c0 [ 240.545408] ? lock_downgrade+0x8f0/0x8f0 [ 240.545427] ? add_page_wait_queue+0x2c0/0x2c0 [ 240.545447] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 240.545460] ? should_fail+0x223/0xbed [ 240.545480] __alloc_pages_nodemask+0x36e/0xdb0 [ 240.545493] ? up_write+0x7b/0x220 [ 240.545510] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 240.545524] ? __generic_file_write_iter+0x1bd/0x630 [ 240.545544] ? find_held_lock+0x36/0x1c0 [ 240.545574] ? check_same_owner+0x340/0x340 [ 240.545588] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 240.545607] cache_grow_begin+0x91/0x710 [ 240.545629] kmem_cache_alloc+0x689/0x760 [ 240.545653] getname_flags+0xd0/0x5a0 [ 240.545667] ? __sb_end_write+0xac/0xe0 [ 240.545684] getname+0x19/0x20 [ 240.545697] do_sys_open+0x3a2/0x760 [ 240.545714] ? filp_open+0x80/0x80 [ 240.545744] ? do_sys_ftruncate+0x44e/0x560 [ 240.545765] __x64_sys_open+0x7e/0xc0 [ 240.545787] do_syscall_64+0x1b9/0x820 [ 240.545800] ? finish_task_switch+0x1d3/0x890 [ 240.545817] ? syscall_return_slowpath+0x5e0/0x5e0 [ 240.545833] ? syscall_return_slowpath+0x31d/0x5e0 [ 240.545855] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 240.545873] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 240.545895] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.545906] RIP: 0033:0x40fe01 14:58:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x4013, r1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffdf7, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) shutdown(r2, 0x1) r3 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r3, &(0x7f0000000240)='U', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r3, 0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000001380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0)="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", 0xc42, 0xffffffffffffffff) close(r2) 14:58:59 executing program 4: add_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0xfffff, 0xfffffffffffffffc) 14:58:59 executing program 7: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{&(0x7f0000000b40)=@l2={0x1f}, 0x80, &(0x7f0000000f00), 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="180000eeffffff000000000000000000e20d"], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) sigaltstack(&(0x7f0000001000/0x1000)=nil, &(0x7f0000008ff8)) [ 240.545910] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 240.729197] RSP: 002b:00007f3b14630a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 240.736891] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 000000000040fe01 [ 240.744157] RDX: 00007f3b14630afa RSI: 0000000000000002 RDI: 00007f3b14630af0 [ 240.751419] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 240.758673] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000014 [ 240.765926] R13: 0000000000000001 R14: 00000000004d3840 R15: 0000000000000007 14:58:59 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) rt_tgsigqueueinfo(r0, r1, 0xb, &(0x7f0000000100)={0x0, 0x0, 0x1}) read(r2, &(0x7f0000481000)=""/128, 0x80) [ 240.835740] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:58:59 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:58:59 executing program 0 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:58:59 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070") mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x6, 0x71, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(r0, 0x800454df, &(0x7f0000000340)=""/4096) [ 240.934807] Option ' [ 240.981877] FAULT_INJECTION: forcing a failure. [ 240.981877] name failslab, interval 1, probability 0, space 0, times 0 14:58:59 executing program 6: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x2) write$sndseq(r0, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @result}], 0xffffff60) 14:58:59 executing program 7: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0x12, 0x0, 0x4, 0x108000000000009, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) [ 241.033759] CPU: 1 PID: 14885 Comm: syz-executor0 Not tainted 4.18.0-rc3+ #136 [ 241.041117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.050469] Call Trace: [ 241.053063] dump_stack+0x1c9/0x2b4 [ 241.057211] ? dump_stack_print_info.cold.2+0x52/0x52 [ 241.057239] should_fail.cold.4+0xa/0x1a [ 241.057259] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 241.057279] ? lock_release+0xa30/0xa30 [ 241.057293] ? check_same_owner+0x340/0x340 [ 241.057306] ? graph_lock+0x170/0x170 [ 241.057319] ? rcu_note_context_switch+0x730/0x730 [ 241.057338] ? find_held_lock+0x36/0x1c0 [ 241.057358] ? __lock_is_held+0xb5/0x140 [ 241.057383] ? check_same_owner+0x340/0x340 [ 241.057401] ? rcu_note_context_switch+0x730/0x730 [ 241.106032] __should_failslab+0x124/0x180 [ 241.106054] should_failslab+0x9/0x14 [ 241.106070] kmem_cache_alloc_trace+0x2cb/0x780 [ 241.106084] ? init_wait_entry+0x1c0/0x1c0 [ 241.106111] ? loop_get_status64+0x140/0x140 [ 241.106122] __kthread_create_on_node+0x127/0x4c0 14:59:00 executing program 5: r0 = gettid() setrlimit(0xb, &(0x7f0000011000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b38000)=0x3c) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r2}], 0x1, 0xfffffffffffffff8) dup2(r1, r2) fcntl$setown(r2, 0x8, r0) tkill(r0, 0x13) [ 241.106139] ? __kthread_parkme+0x1d0/0x1d0 [ 241.136942] ? __lockdep_init_map+0x105/0x590 [ 241.136958] ? loop_get_status64+0x140/0x140 [ 241.136970] kthread_create_on_node+0xb1/0xe0 [ 241.136980] ? __kthread_create_on_node+0x4c0/0x4c0 [ 241.136994] ? kasan_check_read+0x11/0x20 [ 241.137012] lo_ioctl+0x7ce/0x1d10 [ 241.137032] ? lo_rw_aio_complete+0x450/0x450 [ 241.137046] blkdev_ioctl+0x9cd/0x2030 14:59:00 executing program 1: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000014ff8)='./file0\x00', &(0x7f0000014000)='proc\x00', 0x1, &(0x7f0000fc9000)) r0 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) faccessat(r0, &(0x7f0000e34000)='./bus\x00', 0x2, 0x0) 14:59:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:00 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 241.137058] ? blkpg_ioctl+0xc40/0xc40 14:59:00 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x1c, 0x0, &(0x7f0000000040)=[@acquire_done={0x40106309}, @increfs={0x40046304}], 0x1, 0x0, &(0x7f0000000200)='a'}) [ 241.137071] ? lock_downgrade+0x8f0/0x8f0 14:59:00 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) dup2(r2, r1) [ 241.137085] ? kasan_check_read+0x11/0x20 [ 241.137095] ? rcu_is_watching+0x8c/0x150 14:59:00 executing program 0 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 241.137104] ? rcu_report_qs_rnp+0x7a0/0x7a0 14:59:00 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:00 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000017fdc)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000640)="2400000002031f001cfffd946fa2830020200a000900030002e712000000a3a20404ff7e", 0x24}], 0x1}, 0x0) [ 241.137121] ? __fget+0x414/0x670 [ 241.137134] ? expand_files.part.8+0x9c0/0x9c0 14:59:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 241.137151] block_ioctl+0xee/0x130 [ 241.137162] ? blkdev_fallocate+0x400/0x400 [ 241.137176] do_vfs_ioctl+0x1de/0x1720 14:59:00 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) connect$l2tp(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}, 0x4, 0x1}}, 0x2e) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x40047452, &(0x7f0000000180)) 14:59:00 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x1c, 0x0, &(0x7f0000000040)=[@acquire_done={0x40106309}, @increfs={0x40046304}], 0x1, 0x0, &(0x7f0000000200)='a'}) [ 241.137185] ? rcu_is_watching+0x8c/0x150 [ 241.137197] ? ioctl_preallocate+0x300/0x300 [ 241.137206] ? __fget_light+0x2f7/0x440 14:59:00 executing program 0 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 241.137216] ? fget_raw+0x20/0x20 14:59:00 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 241.137226] ? putname+0xf2/0x130 [ 241.137239] ? rcu_read_lock_sched_held+0x108/0x120 [ 241.137249] ? kmem_cache_free+0x25c/0x2d0 [ 241.137260] ? putname+0xf7/0x130 [ 241.137271] ? do_sys_open+0x3cb/0x760 [ 241.137285] ? security_file_ioctl+0x94/0xc0 [ 241.137296] ksys_ioctl+0xa9/0xd0 [ 241.137307] __x64_sys_ioctl+0x73/0xb0 [ 241.137320] do_syscall_64+0x1b9/0x820 [ 241.137330] ? syscall_slow_exit_work+0x500/0x500 [ 241.137341] ? syscall_return_slowpath+0x5e0/0x5e0 [ 241.137353] ? syscall_return_slowpath+0x31d/0x5e0 [ 241.137369] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 241.137383] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 241.137398] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.137406] RIP: 0033:0x455a17 [ 241.137409] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 241.137603] RSP: 002b:00007f3b14630a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 241.137614] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 0000000000455a17 [ 241.137620] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 241.137626] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 241.137633] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 241.137639] R13: 0000000000000001 R14: 00000000004d3840 R15: 0000000000000008 [ 241.406639] binder: 14921:14925 BC_ACQUIRE_DONE u0000000000000000 no match [ 241.406666] binder: 14921:14925 IncRefs 0 refcount change on invalid ref 0 ret -22 [ 241.412196] binder: 14921:14929 BC_ACQUIRE_DONE u0000000000000000 no match [ 241.412219] binder: 14921:14929 IncRefs 0 refcount change on invalid ref 0 ret -22 [ 241.506380] FAULT_INJECTION: forcing a failure. [ 241.506380] name failslab, interval 1, probability 0, space 0, times 0 [ 241.506401] CPU: 1 PID: 14935 Comm: syz-executor0 Not tainted 4.18.0-rc3+ #136 [ 241.506411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.506418] Call Trace: [ 241.506440] dump_stack+0x1c9/0x2b4 [ 241.506463] ? dump_stack_print_info.cold.2+0x52/0x52 [ 241.506493] should_fail.cold.4+0xa/0x1a [ 241.506516] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 241.506540] ? lock_release+0xa30/0xa30 [ 241.506556] ? check_same_owner+0x340/0x340 [ 241.506576] ? graph_lock+0x170/0x170 [ 241.506591] ? perf_trace_lock+0xde/0x920 [ 241.506613] ? find_held_lock+0x36/0x1c0 [ 241.506645] ? __lock_is_held+0xb5/0x140 [ 241.506675] ? check_same_owner+0x340/0x340 [ 241.506695] ? rcu_note_context_switch+0x730/0x730 [ 241.506717] __should_failslab+0x124/0x180 [ 241.506735] should_failslab+0x9/0x14 [ 241.506751] kmem_cache_alloc_trace+0x2cb/0x780 [ 241.506764] ? init_wait_entry+0x1c0/0x1c0 [ 241.506790] ? loop_get_status64+0x140/0x140 [ 241.506805] __kthread_create_on_node+0x127/0x4c0 [ 241.506824] ? __kthread_parkme+0x1d0/0x1d0 [ 241.506854] ? __lockdep_init_map+0x105/0x590 [ 241.506874] ? loop_get_status64+0x140/0x140 [ 241.506888] kthread_create_on_node+0xb1/0xe0 [ 241.506902] ? __kthread_create_on_node+0x4c0/0x4c0 [ 241.506928] lo_ioctl+0x7ce/0x1d10 [ 241.506950] ? lo_rw_aio_complete+0x450/0x450 [ 241.506966] blkdev_ioctl+0x9cd/0x2030 [ 241.506983] ? blkpg_ioctl+0xc40/0xc40 [ 241.507002] ? lock_downgrade+0x8f0/0x8f0 [ 241.507023] ? rcu_is_watching+0x8c/0x150 [ 241.507038] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 241.507063] ? __fget+0x414/0x670 [ 241.507085] ? expand_files.part.8+0x9c0/0x9c0 [ 241.507106] block_ioctl+0xee/0x130 [ 241.507121] ? blkdev_fallocate+0x400/0x400 [ 241.507135] do_vfs_ioctl+0x1de/0x1720 [ 241.507156] ? rcu_is_watching+0x8c/0x150 [ 241.507176] ? ioctl_preallocate+0x300/0x300 [ 241.507189] ? __fget_light+0x2f7/0x440 [ 241.507207] ? fget_raw+0x20/0x20 [ 241.507222] ? putname+0xf2/0x130 [ 241.507236] ? rcu_read_lock_sched_held+0x108/0x120 [ 241.507251] ? kmem_cache_free+0x25c/0x2d0 [ 241.507267] ? putname+0xf7/0x130 [ 241.507281] ? do_sys_open+0x3cb/0x760 [ 241.507299] ? security_file_ioctl+0x94/0xc0 [ 241.507315] ksys_ioctl+0xa9/0xd0 [ 241.507331] __x64_sys_ioctl+0x73/0xb0 [ 241.507349] do_syscall_64+0x1b9/0x820 [ 241.507362] ? finish_task_switch+0x1d3/0x890 [ 241.507377] ? syscall_return_slowpath+0x5e0/0x5e0 [ 241.507393] ? syscall_return_slowpath+0x31d/0x5e0 [ 241.507414] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 241.507432] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 241.507454] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.507465] RIP: 0033:0x455a17 [ 241.507469] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 241.507753] RSP: 002b:00007f3b14630a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 241.507767] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 0000000000455a17 [ 241.507775] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 241.507784] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 241.507793] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 241.507801] R13: 0000000000000001 R14: 00000000004d3840 R15: 0000000000000009 [ 241.535552] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 241.541544] netlink: 'syz-executor1': attribute type 3 has an invalid length. [ 241.541557] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 241.554973] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 241.620467] binder: 14949:14953 BC_ACQUIRE_DONE u0000000000000000 no match [ 241.620495] binder: 14949:14953 IncRefs 0 refcount change on invalid ref 0 ret -22 [ 241.752261] FAULT_INJECTION: forcing a failure. [ 241.752261] name failslab, interval 1, probability 0, space 0, times 0 [ 241.752283] CPU: 1 PID: 14965 Comm: syz-executor0 Not tainted 4.18.0-rc3+ #136 [ 241.752293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.752298] Call Trace: [ 241.752325] dump_stack+0x1c9/0x2b4 [ 241.752344] ? dump_stack_print_info.cold.2+0x52/0x52 [ 241.752363] ? graph_lock+0x170/0x170 [ 241.752391] should_fail.cold.4+0xa/0x1a [ 241.752411] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 241.752433] ? graph_lock+0x170/0x170 [ 241.752453] ? find_held_lock+0x36/0x1c0 [ 241.752473] ? __lock_is_held+0xb5/0x140 [ 241.752497] ? check_same_owner+0x340/0x340 [ 241.752513] ? rcu_note_context_switch+0x730/0x730 [ 241.752533] __should_failslab+0x124/0x180 [ 241.752552] should_failslab+0x9/0x14 [ 241.752567] kmem_cache_alloc+0x2af/0x760 [ 241.752587] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 241.752606] __kernfs_new_node+0xef/0x5a0 [ 241.752624] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 241.752641] ? lock_downgrade+0x8f0/0x8f0 [ 241.752659] ? lock_release+0xa30/0xa30 [ 241.752672] ? check_same_owner+0x340/0x340 [ 241.752689] ? lock_downgrade+0x8f0/0x8f0 [ 241.752706] kernfs_new_node+0x80/0xf0 [ 241.752724] kernfs_create_dir_ns+0x3d/0x140 [ 241.752741] internal_create_group+0x110/0x970 [ 241.752758] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 241.752778] sysfs_create_group+0x1f/0x30 [ 241.752793] lo_ioctl+0x12c8/0x1d10 [ 241.752811] ? lo_rw_aio_complete+0x450/0x450 [ 241.752831] blkdev_ioctl+0x9cd/0x2030 [ 241.752851] ? blkpg_ioctl+0xc40/0xc40 [ 241.752869] ? lock_downgrade+0x8f0/0x8f0 [ 241.752889] ? rcu_is_watching+0x8c/0x150 [ 241.752903] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 241.752925] ? __fget+0x414/0x670 [ 241.752945] ? expand_files.part.8+0x9c0/0x9c0 [ 241.752968] block_ioctl+0xee/0x130 [ 241.752985] ? blkdev_fallocate+0x400/0x400 [ 241.752999] do_vfs_ioctl+0x1de/0x1720 [ 241.753021] ? rcu_is_watching+0x8c/0x150 [ 241.753040] ? ioctl_preallocate+0x300/0x300 [ 241.753055] ? __fget_light+0x2f7/0x440 [ 241.753072] ? fget_raw+0x20/0x20 [ 241.753085] ? putname+0xf2/0x130 [ 241.753101] ? rcu_read_lock_sched_held+0x108/0x120 [ 241.753122] ? kmem_cache_free+0x25c/0x2d0 [ 241.753140] ? putname+0xf7/0x130 [ 241.753158] ? do_sys_open+0x3cb/0x760 [ 241.753178] ? security_file_ioctl+0x94/0xc0 [ 241.753197] ksys_ioctl+0xa9/0xd0 [ 241.753215] __x64_sys_ioctl+0x73/0xb0 [ 241.753232] do_syscall_64+0x1b9/0x820 [ 241.753251] ? syscall_return_slowpath+0x5e0/0x5e0 [ 241.753271] ? syscall_return_slowpath+0x31d/0x5e0 [ 241.753296] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 241.753317] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 241.753338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.753351] RIP: 0033:0x455a17 [ 241.753355] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 241.753638] RSP: 002b:00007f3b14630a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 241.753654] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 0000000000455a17 [ 241.753663] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 241.753671] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 14:59:01 executing program 6: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x2) write$sndseq(r0, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @result}], 0xffffff60) 14:59:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") unshare(0x400) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x1a, &(0x7f000004c000)=0x23, 0x4) setsockopt$sock_int(r2, 0x1, 0x2000000000f, &(0x7f0000f10000)=0xfffffffffffff830, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f000086eff0)={0x2, 0x4e22, @multicast2=0xe0000002}, 0x10) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr=0x9}}, 0x1c) bind$inet6(r2, &(0x7f0000f13000)={0xa, 0x4e22}, 0x1c) 14:59:01 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 14:59:01 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x1c, 0x0, &(0x7f0000000040)=[@acquire_done={0x40106309}, @increfs={0x40046304}], 0x1, 0x0, &(0x7f0000000200)='a'}) 14:59:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)="62747266738c", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:01 executing program 0 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:01 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:01 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") clock_adjtime(0x0, &(0x7f0000000140)={0xcc73}) [ 241.753680] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 241.753689] R13: 0000000000000001 R14: 00000000004d3840 R15: 000000000000000a [ 242.723932] binder: 14992:14994 BC_ACQUIRE_DONE u0000000000000000 no match [ 242.737109] FAULT_INJECTION: forcing a failure. [ 242.737109] name failslab, interval 1, probability 0, space 0, times 0 [ 242.748959] CPU: 0 PID: 14990 Comm: syz-executor0 Not tainted 4.18.0-rc3+ #136 [ 242.753453] binder: 14992:14994 IncRefs 0 refcount change on invalid ref 0 ret -22 [ 242.756320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.773435] Call Trace: [ 242.776023] dump_stack+0x1c9/0x2b4 [ 242.779643] ? dump_stack_print_info.cold.2+0x52/0x52 [ 242.784831] should_fail.cold.4+0xa/0x1a [ 242.788882] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 242.793974] ? update_load_avg+0x2de/0x2590 [ 242.798295] ? update_load_avg+0x2de/0x2590 [ 242.802610] ? perf_trace_lock+0xde/0x920 [ 242.806746] ? attach_entity_load_avg+0x860/0x860 [ 242.811581] ? zap_class+0x740/0x740 [ 242.815282] ? graph_lock+0x170/0x170 [ 242.819088] ? rb_erase+0x3550/0x3550 [ 242.822888] ? zap_class+0x740/0x740 [ 242.826592] ? graph_lock+0x170/0x170 [ 242.830384] ? print_usage_bug+0xc0/0xc0 [ 242.834431] ? rcu_is_watching+0x8c/0x150 [ 242.838567] ? graph_lock+0x170/0x170 [ 242.842355] ? find_held_lock+0x36/0x1c0 [ 242.846404] ? print_usage_bug+0xc0/0xc0 [ 242.850456] __should_failslab+0x124/0x180 [ 242.854679] should_failslab+0x9/0x14 [ 242.858466] kmem_cache_alloc+0x47/0x760 [ 242.862517] ? lock_downgrade+0x8f0/0x8f0 [ 242.866660] radix_tree_node_alloc.constprop.19+0x1e6/0x310 [ 242.872374] idr_get_free+0x899/0x10c0 [ 242.876257] ? radix_tree_clear_tags+0xc0/0xc0 [ 242.880825] ? __kernel_text_address+0xd/0x40 [ 242.885318] ? unwind_get_return_address+0x61/0xa0 [ 242.890235] ? __save_stack_trace+0x8d/0xf0 [ 242.894554] ? save_stack+0xa9/0xd0 [ 242.898181] ? save_stack+0x43/0xd0 [ 242.901795] ? kasan_kmalloc+0xc4/0xe0 [ 242.905665] ? kasan_slab_alloc+0x12/0x20 [ 242.909797] ? kmem_cache_alloc+0x12e/0x760 [ 242.914104] ? __kernfs_new_node+0xef/0x5a0 [ 242.918409] ? kernfs_new_node+0x80/0xf0 [ 242.922456] ? internal_create_group+0x110/0x970 [ 242.927195] ? sysfs_create_group+0x1f/0x30 [ 242.931501] ? lo_ioctl+0x12c8/0x1d10 [ 242.935291] ? block_ioctl+0xee/0x130 [ 242.939089] ? do_vfs_ioctl+0x1de/0x1720 [ 242.943145] ? ksys_ioctl+0xa9/0xd0 [ 242.946758] ? __x64_sys_ioctl+0x73/0xb0 [ 242.950806] ? do_syscall_64+0x1b9/0x820 [ 242.954853] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 242.960206] ? find_held_lock+0x36/0x1c0 [ 242.964254] ? print_usage_bug+0xc0/0xc0 [ 242.968308] idr_alloc_u32+0x201/0x3f0 [ 242.972200] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 242.977032] ? lock_acquire+0x1e4/0x540 [ 242.980991] ? __kernfs_new_node+0x116/0x5a0 [ 242.985386] ? __lock_is_held+0xb5/0x140 [ 242.989437] idr_alloc_cyclic+0x173/0x360 [ 242.993574] ? idr_alloc+0x1b0/0x1b0 [ 242.997287] ? kasan_check_write+0x14/0x20 [ 243.001508] ? do_raw_spin_lock+0xc1/0x200 [ 243.005736] __kernfs_new_node+0x1ab/0x5a0 [ 243.009959] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 243.014716] ? lock_downgrade+0x8f0/0x8f0 [ 243.018854] ? lock_release+0xa30/0xa30 [ 243.022817] ? rcu_note_context_switch+0x730/0x730 [ 243.027734] kernfs_new_node+0x80/0xf0 [ 243.031612] kernfs_create_dir_ns+0x3d/0x140 [ 243.036026] internal_create_group+0x110/0x970 [ 243.040598] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 243.045602] sysfs_create_group+0x1f/0x30 [ 243.049737] lo_ioctl+0x12c8/0x1d10 [ 243.053355] ? lo_rw_aio_complete+0x450/0x450 [ 243.057839] blkdev_ioctl+0x9cd/0x2030 [ 243.061714] ? blkpg_ioctl+0xc40/0xc40 [ 243.065592] ? lock_downgrade+0x8f0/0x8f0 [ 243.069731] ? rcu_is_watching+0x8c/0x150 [ 243.073863] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 243.078262] ? __fget+0x414/0x670 [ 243.081707] ? expand_files.part.8+0x9c0/0x9c0 [ 243.086281] block_ioctl+0xee/0x130 [ 243.089899] ? blkdev_fallocate+0x400/0x400 [ 243.094206] do_vfs_ioctl+0x1de/0x1720 [ 243.098078] ? rcu_is_watching+0x8c/0x150 [ 243.102217] ? ioctl_preallocate+0x300/0x300 [ 243.106609] ? __fget_light+0x2f7/0x440 [ 243.110569] ? fget_raw+0x20/0x20 [ 243.114008] ? putname+0xf2/0x130 [ 243.117454] ? rcu_read_lock_sched_held+0x108/0x120 [ 243.122469] ? kmem_cache_free+0x25c/0x2d0 [ 243.126690] ? putname+0xf7/0x130 [ 243.130129] ? do_sys_open+0x3cb/0x760 [ 243.134007] ? security_file_ioctl+0x94/0xc0 [ 243.138422] ksys_ioctl+0xa9/0xd0 [ 243.141865] __x64_sys_ioctl+0x73/0xb0 [ 243.145739] do_syscall_64+0x1b9/0x820 [ 243.149614] ? finish_task_switch+0x1d3/0x890 [ 243.154097] ? syscall_return_slowpath+0x5e0/0x5e0 [ 243.159029] ? syscall_return_slowpath+0x31d/0x5e0 [ 243.163951] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 243.169305] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 243.174140] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.179312] RIP: 0033:0x455a17 [ 243.182483] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 243.201747] RSP: 002b:00007f3b14630a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 243.209454] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 0000000000455a17 [ 243.216710] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 14:59:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f00000000c0)={0x2}, 0x10) write$binfmt_misc(r0, &(0x7f0000001400)={'syz0', "2d66c74fac55e0da8db83a64c2bcc1ab050c925b5f3a6768546778e7"}, 0x20) [ 243.223962] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 243.231213] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 243.238466] R13: 0000000000000001 R14: 00000000004d3840 R15: 000000000000000b 14:59:02 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000040)={'tunl0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) 14:59:02 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000480)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000780)='./file0\x00') umount2(&(0x7f0000000180)='../file0\x00', 0x2) 14:59:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000040)={0x81, 0x0, [0x3]}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x4020aea5, &(0x7f00000002c0)={0xffffffffffffffff}) 14:59:02 executing program 0 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup2(r1, r0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team_slave_0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) sendmmsg$inet_sctp(r2, &(0x7f0000007080)=[{&(0x7f0000000140)=@in6={0xa, 0x0, 0x4, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c, &(0x7f0000000540)}], 0x342, 0x0) 14:59:02 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x1c, 0x0, &(0x7f0000000040)=[@acquire_done={0x40106309}, @increfs={0x40046304}], 0x1, 0x0, &(0x7f0000000200)='a'}) 14:59:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:02 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000340)) close(r1) [ 243.512622] binder: 15033:15037 BC_ACQUIRE_DONE u0000000000000000 no match [ 243.522313] FAULT_INJECTION: forcing a failure. [ 243.522313] name failslab, interval 1, probability 0, space 0, times 0 [ 243.533608] CPU: 1 PID: 15035 Comm: syz-executor0 Not tainted 4.18.0-rc3+ #136 [ 243.540981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.550336] Call Trace: [ 243.552931] dump_stack+0x1c9/0x2b4 [ 243.556561] ? dump_stack_print_info.cold.2+0x52/0x52 [ 243.561763] ? __mutex_lock+0x7e8/0x1820 [ 243.565865] ? perf_trace_lock+0xde/0x920 [ 243.570017] should_fail.cold.4+0xa/0x1a [ 243.574076] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 243.579192] ? graph_lock+0x170/0x170 [ 243.582995] ? find_held_lock+0x36/0x1c0 [ 243.587069] ? __lock_is_held+0xb5/0x140 [ 243.591127] ? check_same_owner+0x340/0x340 [ 243.595435] ? kasan_check_write+0x14/0x20 [ 243.599658] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 243.604584] ? rcu_note_context_switch+0x730/0x730 [ 243.609504] __should_failslab+0x124/0x180 [ 243.613733] should_failslab+0x9/0x14 [ 243.617523] kmem_cache_alloc+0x2af/0x760 [ 243.621683] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 243.626694] __kernfs_new_node+0xef/0x5a0 [ 243.630830] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 243.635576] ? mutex_unlock+0xd/0x10 [ 243.639276] ? kernfs_activate+0x21a/0x2c0 [ 243.643504] ? kernfs_walk_and_get_ns+0x340/0x340 [ 243.648349] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 243.653873] ? kernfs_link_sibling+0x1d2/0x3b0 [ 243.658462] kernfs_new_node+0x80/0xf0 [ 243.662344] __kernfs_create_file+0x4d/0x330 [ 243.666738] sysfs_add_file_mode_ns+0x21a/0x560 [ 243.671400] internal_create_group+0x282/0x970 [ 243.675981] sysfs_create_group+0x1f/0x30 [ 243.680123] lo_ioctl+0x12c8/0x1d10 [ 243.683743] ? lo_rw_aio_complete+0x450/0x450 [ 243.688228] blkdev_ioctl+0x9cd/0x2030 [ 243.692106] ? blkpg_ioctl+0xc40/0xc40 [ 243.695984] ? lock_downgrade+0x8f0/0x8f0 [ 243.700144] ? rcu_is_watching+0x8c/0x150 [ 243.704276] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 243.708677] ? __fget+0x414/0x670 [ 243.712121] ? expand_files.part.8+0x9c0/0x9c0 [ 243.716694] block_ioctl+0xee/0x130 [ 243.720308] ? blkdev_fallocate+0x400/0x400 [ 243.724615] do_vfs_ioctl+0x1de/0x1720 [ 243.728485] ? rcu_is_watching+0x8c/0x150 [ 243.732621] ? ioctl_preallocate+0x300/0x300 [ 243.737022] ? __fget_light+0x2f7/0x440 [ 243.740987] ? fget_raw+0x20/0x20 [ 243.744431] ? putname+0xf2/0x130 [ 243.747885] ? rcu_read_lock_sched_held+0x108/0x120 [ 243.752887] ? kmem_cache_free+0x25c/0x2d0 [ 243.757109] ? putname+0xf7/0x130 [ 243.760548] ? do_sys_open+0x3cb/0x760 [ 243.764424] ? security_file_ioctl+0x94/0xc0 [ 243.768817] ksys_ioctl+0xa9/0xd0 [ 243.772271] __x64_sys_ioctl+0x73/0xb0 [ 243.776149] do_syscall_64+0x1b9/0x820 [ 243.780028] ? finish_task_switch+0x1d3/0x890 [ 243.784515] ? syscall_return_slowpath+0x5e0/0x5e0 [ 243.789431] ? syscall_return_slowpath+0x31d/0x5e0 [ 243.794366] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 243.799719] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 243.804555] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.809729] RIP: 0033:0x455a17 [ 243.812912] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 243.832201] RSP: 002b:00007f3b14630a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 243.839905] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 0000000000455a17 [ 243.847161] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 243.854413] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 14:59:02 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r1 = memfd_create(&(0x7f00000000c0)="237d00d3fc1ee4671fbaa0a455e73e678b8e96f7fd829d4d39f1828ebf765e220913b73db94f6d495077a6df5ab82b4c4f8d", 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r1, 0x40001) sendfile(r0, r1, &(0x7f0000000400), 0xffe4) [ 243.861667] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 243.868933] R13: 0000000000000001 R14: 00000000004d3840 R15: 000000000000000c [ 243.876445] binder: 15033:15037 IncRefs 0 refcount change on invalid ref 0 ret -22 14:59:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) shutdown(r0, 0x1) 14:59:02 executing program 0 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:02 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet_int(r1, 0x0, 0x1, &(0x7f0000000000), 0x4) 14:59:02 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:02 executing program 7: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x1}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x7b, &(0x7f0000000040)={r1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000002c0)={r2}, 0x8) 14:59:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(xtea-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000"], 0x1a) readv(r1, &(0x7f0000000680)=[{&(0x7f0000000280)=""/129, 0x19}], 0x1f5) 14:59:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 244.140655] FAULT_INJECTION: forcing a failure. [ 244.140655] name failslab, interval 1, probability 0, space 0, times 0 [ 244.151990] CPU: 1 PID: 15070 Comm: syz-executor0 Not tainted 4.18.0-rc3+ #136 [ 244.159352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.168693] Call Trace: [ 244.171273] dump_stack+0x1c9/0x2b4 [ 244.174942] ? dump_stack_print_info.cold.2+0x52/0x52 [ 244.180120] ? __mutex_lock+0x7e8/0x1820 [ 244.184175] should_fail.cold.4+0xa/0x1a [ 244.188231] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 244.193328] ? graph_lock+0x170/0x170 [ 244.197119] ? find_held_lock+0x36/0x1c0 [ 244.201180] ? __lock_is_held+0xb5/0x140 [ 244.205237] ? check_same_owner+0x340/0x340 [ 244.209546] ? kasan_check_write+0x14/0x20 [ 244.213769] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 244.218684] ? rcu_note_context_switch+0x730/0x730 [ 244.223621] __should_failslab+0x124/0x180 [ 244.227844] should_failslab+0x9/0x14 [ 244.231629] kmem_cache_alloc+0x2af/0x760 [ 244.235766] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 244.240789] __kernfs_new_node+0xef/0x5a0 [ 244.244930] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 244.249673] ? mutex_unlock+0xd/0x10 [ 244.253375] ? kernfs_activate+0x21a/0x2c0 [ 244.257598] ? kernfs_walk_and_get_ns+0x340/0x340 [ 244.262430] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 244.267969] ? kernfs_link_sibling+0x1d2/0x3b0 [ 244.272542] kernfs_new_node+0x80/0xf0 [ 244.276419] __kernfs_create_file+0x4d/0x330 [ 244.280817] sysfs_add_file_mode_ns+0x21a/0x560 [ 244.285475] internal_create_group+0x282/0x970 [ 244.290047] sysfs_create_group+0x1f/0x30 [ 244.294182] lo_ioctl+0x12c8/0x1d10 [ 244.297798] ? lo_rw_aio_complete+0x450/0x450 [ 244.302283] blkdev_ioctl+0x9cd/0x2030 [ 244.306159] ? blkpg_ioctl+0xc40/0xc40 [ 244.310039] ? lock_downgrade+0x8f0/0x8f0 [ 244.314188] ? kasan_check_read+0x11/0x20 [ 244.318319] ? rcu_is_watching+0x8c/0x150 [ 244.322452] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 244.326849] ? __fget+0x414/0x670 [ 244.330290] ? expand_files.part.8+0x9c0/0x9c0 [ 244.334864] block_ioctl+0xee/0x130 [ 244.338476] ? blkdev_fallocate+0x400/0x400 [ 244.342795] do_vfs_ioctl+0x1de/0x1720 [ 244.346668] ? rcu_is_watching+0x8c/0x150 [ 244.350801] ? ioctl_preallocate+0x300/0x300 [ 244.355193] ? __fget_light+0x2f7/0x440 [ 244.359163] ? fget_raw+0x20/0x20 [ 244.362602] ? putname+0xf2/0x130 [ 244.366043] ? rcu_read_lock_sched_held+0x108/0x120 [ 244.371057] ? kmem_cache_free+0x25c/0x2d0 [ 244.375291] ? putname+0xf7/0x130 [ 244.378731] ? do_sys_open+0x3cb/0x760 [ 244.382606] ? security_file_ioctl+0x94/0xc0 [ 244.387001] ksys_ioctl+0xa9/0xd0 [ 244.390445] __x64_sys_ioctl+0x73/0xb0 [ 244.394319] do_syscall_64+0x1b9/0x820 [ 244.398195] ? finish_task_switch+0x1d3/0x890 [ 244.402675] ? syscall_return_slowpath+0x5e0/0x5e0 [ 244.407598] ? syscall_return_slowpath+0x31d/0x5e0 [ 244.412523] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 244.417874] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 244.422709] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.427882] RIP: 0033:0x455a17 [ 244.431056] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 244.450287] RSP: 002b:00007f3b14630a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 244.457993] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 0000000000455a17 [ 244.465260] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 244.472527] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 244.479780] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 14:59:03 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070") r1 = add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r3) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000380)="7f3ab8010000802435", 0x9, r4) r6 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r3) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r6, r6, r5}, &(0x7f0000000280)=""/132, 0x84, 0x0) [ 244.487037] R13: 0000000000000001 R14: 00000000004d3840 R15: 000000000000000d 14:59:03 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:03 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x4206, r1) creat(&(0x7f0000000140)='./file0\x00', 0x0) 14:59:03 executing program 0 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:03 executing program 1: r0 = socket$inet6(0xa, 0x40000000000002, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f00000000c0)=0x7, 0x4) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000080), 0x4) 14:59:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:03 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") pselect6(0x1a4, &(0x7f0000000000), &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000ff8)={&(0x7f0000000ff8), 0x8}) [ 244.758336] FAULT_INJECTION: forcing a failure. [ 244.758336] name failslab, interval 1, probability 0, space 0, times 0 [ 244.769721] CPU: 0 PID: 15114 Comm: syz-executor0 Not tainted 4.18.0-rc3+ #136 [ 244.777091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.786447] Call Trace: [ 244.789050] dump_stack+0x1c9/0x2b4 [ 244.792699] ? dump_stack_print_info.cold.2+0x52/0x52 [ 244.797905] ? __mutex_lock+0x7e8/0x1820 [ 244.801980] ? perf_trace_lock+0xde/0x920 [ 244.806154] should_fail.cold.4+0xa/0x1a [ 244.810234] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 244.815364] ? graph_lock+0x170/0x170 [ 244.819186] ? find_held_lock+0x36/0x1c0 [ 244.823263] ? __lock_is_held+0xb5/0x140 [ 244.827350] ? check_same_owner+0x340/0x340 [ 244.831691] ? kasan_check_write+0x14/0x20 [ 244.835940] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 244.840882] ? rcu_note_context_switch+0x730/0x730 [ 244.845832] __should_failslab+0x124/0x180 [ 244.850086] should_failslab+0x9/0x14 [ 244.853898] kmem_cache_alloc+0x2af/0x760 14:59:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000100)="025cc83d6d345f8f762070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000190007031dfffd946f61830002200a000900000700000000000000a20400ff7e280000001100ffffba16a0aa1ce208b3ebea8653b1cc7e63975c02007b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:59:03 executing program 4: unshare(0x2000400) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d345f8f760070") connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x0) 14:59:03 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 244.858068] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 244.863127] __kernfs_new_node+0xef/0x5a0 [ 244.867302] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 244.872068] ? mutex_unlock+0xd/0x10 [ 244.875791] ? kernfs_activate+0x21a/0x2c0 [ 244.880041] ? kernfs_walk_and_get_ns+0x340/0x340 [ 244.884901] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 244.890456] ? kernfs_link_sibling+0x1d2/0x3b0 [ 244.895058] kernfs_new_node+0x80/0xf0 [ 244.898942] __kernfs_create_file+0x4d/0x330 [ 244.903345] sysfs_add_file_mode_ns+0x21a/0x560 [ 244.908016] internal_create_group+0x282/0x970 [ 244.912604] sysfs_create_group+0x1f/0x30 [ 244.916792] lo_ioctl+0x12c8/0x1d10 [ 244.920419] ? lo_rw_aio_complete+0x450/0x450 [ 244.924905] blkdev_ioctl+0x9cd/0x2030 [ 244.928785] ? blkpg_ioctl+0xc40/0xc40 [ 244.932668] ? lock_downgrade+0x8f0/0x8f0 [ 244.936822] ? rcu_is_watching+0x8c/0x150 [ 244.940971] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 244.945395] ? __fget+0x414/0x670 [ 244.948857] ? expand_files.part.8+0x9c0/0x9c0 [ 244.953436] block_ioctl+0xee/0x130 [ 244.957053] ? blkdev_fallocate+0x400/0x400 [ 244.961369] do_vfs_ioctl+0x1de/0x1720 [ 244.965243] ? rcu_is_watching+0x8c/0x150 [ 244.969380] ? ioctl_preallocate+0x300/0x300 [ 244.973787] ? __fget_light+0x2f7/0x440 [ 244.977751] ? fget_raw+0x20/0x20 [ 244.981192] ? putname+0xf2/0x130 [ 244.984644] ? rcu_read_lock_sched_held+0x108/0x120 [ 244.989662] ? kmem_cache_free+0x25c/0x2d0 [ 244.993888] ? putname+0xf7/0x130 [ 244.997331] ? do_sys_open+0x3cb/0x760 [ 245.001227] ? security_file_ioctl+0x94/0xc0 [ 245.005630] ksys_ioctl+0xa9/0xd0 [ 245.009086] __x64_sys_ioctl+0x73/0xb0 [ 245.012980] do_syscall_64+0x1b9/0x820 [ 245.016860] ? finish_task_switch+0x1d3/0x890 [ 245.021349] ? syscall_return_slowpath+0x5e0/0x5e0 [ 245.026270] ? syscall_return_slowpath+0x31d/0x5e0 [ 245.031199] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 245.036557] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 245.041397] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.046573] RIP: 0033:0x455a17 [ 245.049746] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 245.069088] RSP: 002b:00007f3b14630a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 245.076796] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 0000000000455a17 [ 245.084064] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 245.091323] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 245.098604] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 14:59:03 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x4206, r1) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 245.105861] R13: 0000000000000001 R14: 00000000004d3840 R15: 000000000000000e 14:59:04 executing program 7: clock_nanosleep(0x2, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f00000000c0)) clock_nanosleep(0x2, 0x0, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f00000002c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) [ 245.168159] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. 14:59:04 executing program 0 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:04 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000000000000000800000000000000081000000000000008200000001000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000100)={[{@gqnoenforce='gqnoenforce', 0x2c}]}) 14:59:04 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000040)=0x2, 0x4) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000000), &(0x7f0000000300)=0x4) 14:59:04 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:04 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:04 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x4206, r1) creat(&(0x7f0000000140)='./file0\x00', 0x0) 14:59:04 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f"], 0x1) fcntl$setstatus(r0, 0x4, 0x4000) io_setup(0x2, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f00000000c0)=[&(0x7f0000000080)={0x0, 0x0, 0x8, 0x1, 0x0, r0, &(0x7f0000000040)='a', 0x1}]) [ 245.404614] FAULT_INJECTION: forcing a failure. [ 245.404614] name failslab, interval 1, probability 0, space 0, times 0 [ 245.416000] CPU: 0 PID: 15164 Comm: syz-executor0 Not tainted 4.18.0-rc3+ #136 [ 245.423374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.432734] Call Trace: [ 245.435395] dump_stack+0x1c9/0x2b4 [ 245.439127] ? dump_stack_print_info.cold.2+0x52/0x52 [ 245.444339] ? __mutex_lock+0x7e8/0x1820 [ 245.448430] should_fail.cold.4+0xa/0x1a [ 245.452515] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 245.457640] ? graph_lock+0x170/0x170 [ 245.461488] ? find_held_lock+0x36/0x1c0 [ 245.465570] ? __lock_is_held+0xb5/0x140 [ 245.469653] ? check_same_owner+0x340/0x340 [ 245.473972] ? kasan_check_write+0x14/0x20 [ 245.478206] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 245.483131] ? rcu_note_context_switch+0x730/0x730 [ 245.488060] __should_failslab+0x124/0x180 [ 245.492319] should_failslab+0x9/0x14 [ 245.496114] kmem_cache_alloc+0x2af/0x760 [ 245.500264] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 245.505272] __kernfs_new_node+0xef/0x5a0 [ 245.509430] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 245.514180] ? mutex_unlock+0xd/0x10 [ 245.517895] ? kernfs_activate+0x21a/0x2c0 [ 245.522122] ? kernfs_walk_and_get_ns+0x340/0x340 [ 245.526969] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 245.532501] ? kernfs_link_sibling+0x1d2/0x3b0 [ 245.537096] kernfs_new_node+0x80/0xf0 [ 245.540979] __kernfs_create_file+0x4d/0x330 [ 245.545380] sysfs_add_file_mode_ns+0x21a/0x560 [ 245.550050] internal_create_group+0x282/0x970 [ 245.554632] sysfs_create_group+0x1f/0x30 [ 245.558773] lo_ioctl+0x12c8/0x1d10 [ 245.562400] ? lo_rw_aio_complete+0x450/0x450 [ 245.566904] blkdev_ioctl+0x9cd/0x2030 [ 245.570797] ? blkpg_ioctl+0xc40/0xc40 [ 245.574692] ? lock_downgrade+0x8f0/0x8f0 [ 245.578839] ? kasan_check_read+0x11/0x20 [ 245.582973] ? rcu_is_watching+0x8c/0x150 [ 245.587124] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 245.591529] ? __fget+0x414/0x670 [ 245.594987] ? expand_files.part.8+0x9c0/0x9c0 [ 245.599577] ? retint_kernel+0x10/0x10 [ 245.603471] block_ioctl+0xee/0x130 [ 245.607087] ? blkdev_fallocate+0x400/0x400 [ 245.611397] do_vfs_ioctl+0x1de/0x1720 [ 245.615294] ? rcu_is_watching+0x8c/0x150 [ 245.619436] ? ioctl_preallocate+0x300/0x300 [ 245.623834] ? __fget_light+0x2f7/0x440 [ 245.627798] ? fget_raw+0x20/0x20 [ 245.631238] ? putname+0xf2/0x130 [ 245.634681] ? rcu_read_lock_sched_held+0x108/0x120 [ 245.639688] ? kmem_cache_free+0x25c/0x2d0 [ 245.643924] ? putname+0xf7/0x130 [ 245.647369] ? do_sys_open+0x3cb/0x760 [ 245.651261] ? security_file_ioctl+0x94/0xc0 [ 245.655663] ksys_ioctl+0xa9/0xd0 [ 245.659106] __x64_sys_ioctl+0x73/0xb0 [ 245.662988] do_syscall_64+0x1b9/0x820 [ 245.666865] ? finish_task_switch+0x1d3/0x890 [ 245.671366] ? syscall_return_slowpath+0x5e0/0x5e0 [ 245.676294] ? syscall_return_slowpath+0x31d/0x5e0 [ 245.681217] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 245.686572] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 245.691410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.696600] RIP: 0033:0x455a17 [ 245.699783] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 245.719126] RSP: 002b:00007f3b14630a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 245.726825] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 0000000000455a17 [ 245.734082] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 245.741340] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 245.748594] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 14:59:04 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x3) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f00000003c0)=[@text64={0x40, &(0x7f0000000300)="c4e12dfbf60f3066bad00466edb8010000000f01d9b97b0a0000b80e640000ba000000000f3066baf80cb8f4fbbe86ef66bafc0c66ed66b87a008ec80f01c3410f30660ffa8e08000000", 0x4a}], 0x1, 0x0, &(0x7f0000000400), 0x1029) [ 245.755855] R13: 0000000000000001 R14: 00000000004d3840 R15: 000000000000000f 14:59:04 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:04 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, r1, 0x0, 0x0) r3 = syz_fuse_mount(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000000)=r2) dup2(r0, r2) [ 245.862500] XFS (loop4): Mounting V4 Filesystem 14:59:04 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 245.906836] XFS (loop4): totally zeroed log [ 245.928972] XFS (loop4): Metadata corruption detected at xfs_agi_verify+0x188/0x5a0, xfs_agi block 0x2 [ 245.938987] XFS (loop4): Unmount and run xfs_repair [ 245.944063] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 245.950781] 000000000119a1a8: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 245.959682] 00000000ca7c2461: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 245.968550] 00000000f53edff1: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 245.977437] 000000000b248bb2: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 245.986296] 000000003722ae94: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 245.995174] 00000000882daf5d: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 246.004048] 00000000028e53e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 246.012942] 00000000067332bb: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 14:59:04 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x4206, r1) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 246.021940] XFS (loop4): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 246.031394] XFS (loop4): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 246.040480] XFS (loop4): Failed to read root inode 0x80, error 117 14:59:04 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, r1, 0x0, 0x0) r3 = syz_fuse_mount(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000000)=r2) dup2(r0, r2) 14:59:04 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffefffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write(r2, &(0x7f0000000000)="f5", 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x6, 0x30}, 0xc) write(r2, &(0x7f0000000280)="a1", 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000140), 0xc) write$binfmt_misc(r2, &(0x7f0000000240)={'syz1'}, 0x34000) 14:59:04 executing program 0 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 246.234386] FAULT_INJECTION: forcing a failure. [ 246.234386] name failslab, interval 1, probability 0, space 0, times 0 [ 246.245745] CPU: 1 PID: 15236 Comm: syz-executor0 Not tainted 4.18.0-rc3+ #136 [ 246.253112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.262467] Call Trace: [ 246.265074] dump_stack+0x1c9/0x2b4 [ 246.268718] ? dump_stack_print_info.cold.2+0x52/0x52 [ 246.273938] ? __mutex_lock+0x7e8/0x1820 [ 246.278006] ? perf_trace_lock+0xde/0x920 [ 246.282165] should_fail.cold.4+0xa/0x1a [ 246.286226] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 246.291324] ? graph_lock+0x170/0x170 [ 246.295116] ? find_held_lock+0x36/0x1c0 [ 246.299167] ? __lock_is_held+0xb5/0x140 [ 246.303239] ? check_same_owner+0x340/0x340 [ 246.307554] ? kasan_check_write+0x14/0x20 [ 246.311787] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 246.316710] ? rcu_note_context_switch+0x730/0x730 [ 246.321634] __should_failslab+0x124/0x180 [ 246.325857] should_failslab+0x9/0x14 [ 246.329650] kmem_cache_alloc+0x2af/0x760 [ 246.333808] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 246.338820] __kernfs_new_node+0xef/0x5a0 [ 246.342960] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 246.347707] ? mutex_unlock+0xd/0x10 [ 246.351409] ? kernfs_activate+0x21a/0x2c0 [ 246.355632] ? kernfs_walk_and_get_ns+0x340/0x340 [ 246.360465] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 246.365987] ? kernfs_link_sibling+0x1d2/0x3b0 [ 246.370560] kernfs_new_node+0x80/0xf0 [ 246.374459] __kernfs_create_file+0x4d/0x330 [ 246.378868] sysfs_add_file_mode_ns+0x21a/0x560 [ 246.383527] internal_create_group+0x282/0x970 [ 246.388103] sysfs_create_group+0x1f/0x30 [ 246.392241] lo_ioctl+0x12c8/0x1d10 [ 246.395858] ? lo_rw_aio_complete+0x450/0x450 [ 246.400341] blkdev_ioctl+0x9cd/0x2030 [ 246.404232] ? blkpg_ioctl+0xc40/0xc40 [ 246.408113] ? lock_downgrade+0x8f0/0x8f0 [ 246.412251] ? rcu_is_watching+0x8c/0x150 [ 246.416391] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 246.420795] ? __fget+0x414/0x670 [ 246.424236] ? expand_files.part.8+0x9c0/0x9c0 [ 246.428808] block_ioctl+0xee/0x130 [ 246.432421] ? blkdev_fallocate+0x400/0x400 [ 246.436745] do_vfs_ioctl+0x1de/0x1720 [ 246.440615] ? rcu_is_watching+0x8c/0x150 [ 246.444752] ? ioctl_preallocate+0x300/0x300 [ 246.449144] ? __fget_light+0x2f7/0x440 [ 246.453105] ? fget_raw+0x20/0x20 [ 246.456544] ? putname+0xf2/0x130 [ 246.459996] ? rcu_read_lock_sched_held+0x108/0x120 [ 246.465017] ? kmem_cache_free+0x25c/0x2d0 [ 246.469254] ? putname+0xf7/0x130 [ 246.472698] ? do_sys_open+0x3cb/0x760 [ 246.476577] ? security_file_ioctl+0x94/0xc0 [ 246.480970] ksys_ioctl+0xa9/0xd0 [ 246.484410] __x64_sys_ioctl+0x73/0xb0 [ 246.488285] do_syscall_64+0x1b9/0x820 [ 246.492158] ? finish_task_switch+0x1d3/0x890 [ 246.496638] ? syscall_return_slowpath+0x5e0/0x5e0 [ 246.501553] ? syscall_return_slowpath+0x31d/0x5e0 [ 246.506943] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 246.512296] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 246.517218] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.522392] RIP: 0033:0x455a17 [ 246.525562] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 246.544815] RSP: 002b:00007f3b14630a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 246.552508] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 0000000000455a17 [ 246.559773] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 246.567041] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 246.574306] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 246.581573] R13: 0000000000000001 R14: 00000000004d3840 R15: 0000000000000010 14:59:05 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x1c}) 14:59:05 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs#', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:05 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:05 executing program 5: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) 14:59:05 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000340)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000680)={0x18, 0x1d, 0xfffffffffffffffd, 0x0, 0x0, {0x7592da6b}, [@nested={0x4, 0x27}]}, 0x18}, 0x1}, 0x0) 14:59:05 executing program 0 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 246.993088] FAULT_INJECTION: forcing a failure. [ 246.993088] name failslab, interval 1, probability 0, space 0, times 0 [ 247.004407] CPU: 1 PID: 15257 Comm: syz-executor0 Not tainted 4.18.0-rc3+ #136 [ 247.011796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.021139] Call Trace: [ 247.023719] dump_stack+0x1c9/0x2b4 [ 247.027359] ? dump_stack_print_info.cold.2+0x52/0x52 [ 247.032537] ? __mutex_lock+0x7e8/0x1820 [ 247.036592] should_fail.cold.4+0xa/0x1a [ 247.040655] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 247.045760] ? graph_lock+0x170/0x170 [ 247.049639] ? find_held_lock+0x36/0x1c0 [ 247.053694] ? __lock_is_held+0xb5/0x140 [ 247.057750] ? check_same_owner+0x340/0x340 [ 247.062057] ? kasan_check_write+0x14/0x20 [ 247.066280] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 247.071197] ? rcu_note_context_switch+0x730/0x730 [ 247.076114] __should_failslab+0x124/0x180 [ 247.080337] should_failslab+0x9/0x14 [ 247.084124] kmem_cache_alloc+0x2af/0x760 [ 247.088263] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 247.093278] __kernfs_new_node+0xef/0x5a0 [ 247.097418] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 247.102175] ? mutex_unlock+0xd/0x10 [ 247.105879] ? kernfs_activate+0x21a/0x2c0 [ 247.110101] ? kernfs_walk_and_get_ns+0x340/0x340 [ 247.114931] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 247.120456] ? kernfs_link_sibling+0x1d2/0x3b0 [ 247.125037] kernfs_new_node+0x80/0xf0 [ 247.128917] __kernfs_create_file+0x4d/0x330 [ 247.133336] sysfs_add_file_mode_ns+0x21a/0x560 [ 247.137996] internal_create_group+0x282/0x970 [ 247.142573] sysfs_create_group+0x1f/0x30 [ 247.146709] lo_ioctl+0x12c8/0x1d10 [ 247.150329] ? lo_rw_aio_complete+0x450/0x450 [ 247.154812] blkdev_ioctl+0x9cd/0x2030 [ 247.158689] ? blkpg_ioctl+0xc40/0xc40 [ 247.162566] ? lock_downgrade+0x8f0/0x8f0 [ 247.166704] ? kasan_check_read+0x11/0x20 [ 247.170834] ? rcu_is_watching+0x8c/0x150 [ 247.174969] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 247.179379] ? __fget+0x414/0x670 [ 247.182822] ? expand_files.part.8+0x9c0/0x9c0 [ 247.187406] block_ioctl+0xee/0x130 [ 247.191038] ? blkdev_fallocate+0x400/0x400 [ 247.195347] do_vfs_ioctl+0x1de/0x1720 [ 247.199218] ? rcu_is_watching+0x8c/0x150 [ 247.203352] ? ioctl_preallocate+0x300/0x300 [ 247.207745] ? __fget_light+0x2f7/0x440 [ 247.211722] ? fget_raw+0x20/0x20 [ 247.215163] ? putname+0xf2/0x130 [ 247.218601] ? rcu_read_lock_sched_held+0x108/0x120 [ 247.223600] ? kmem_cache_free+0x25c/0x2d0 [ 247.227833] ? putname+0xf7/0x130 [ 247.231282] ? do_sys_open+0x3cb/0x760 [ 247.235161] ? security_file_ioctl+0x94/0xc0 [ 247.239557] ksys_ioctl+0xa9/0xd0 [ 247.242996] __x64_sys_ioctl+0x73/0xb0 [ 247.246874] do_syscall_64+0x1b9/0x820 [ 247.250746] ? finish_task_switch+0x1d3/0x890 [ 247.255228] ? syscall_return_slowpath+0x5e0/0x5e0 [ 247.260146] ? syscall_return_slowpath+0x31d/0x5e0 [ 247.265068] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 247.270436] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 247.275272] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.280464] RIP: 0033:0x455a17 [ 247.283633] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 247.302879] RSP: 002b:00007f3b14630a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 247.310576] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 0000000000455a17 [ 247.317831] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 247.325087] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 247.332353] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 247.339608] R13: 0000000000000001 R14: 00000000004d3840 R15: 0000000000000011 14:59:06 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @cond}) [ 247.368418] netlink: 'syz-executor4': attribute type 39 has an invalid length. 14:59:06 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:06 executing program 0 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:06 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x10, 0x0, "e4e69e173951f8d6032d82efe3e09183df6f26ae364e3eb31b8379a058c2000000800000000076d346a8da1fcc6aabfb7f00000000000000a60a292a6a0c5e8000cea23baaeb2875a386d7b0e8210eca"}, 0xd8) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") sendto$inet6(r0, &(0x7f0000e77fff), 0xfffffffffffffe64, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 14:59:06 executing program 6: r0 = socket$inet6(0xa, 0x802, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000200)="295ee1311f16f477671070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x7dc, 0x0, &(0x7f0000000000), 0xc0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [0x4b564d01, 0x1]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 247.552594] FAULT_INJECTION: forcing a failure. [ 247.552594] name failslab, interval 1, probability 0, space 0, times 0 [ 247.564105] CPU: 0 PID: 15285 Comm: syz-executor0 Not tainted 4.18.0-rc3+ #136 [ 247.571509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.580867] Call Trace: [ 247.583476] dump_stack+0x1c9/0x2b4 [ 247.587125] ? dump_stack_print_info.cold.2+0x52/0x52 [ 247.592332] ? __kernel_text_address+0xd/0x40 [ 247.596847] should_fail.cold.4+0xa/0x1a [ 247.600926] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 247.606044] ? save_stack+0xa9/0xd0 [ 247.609683] ? graph_lock+0x170/0x170 [ 247.613488] ? kasan_kmalloc+0xc4/0xe0 [ 247.617395] ? mark_held_locks+0xc9/0x160 [ 247.621560] ? retint_kernel+0x10/0x10 [ 247.625462] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 247.630491] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 247.635264] ? retint_kernel+0x10/0x10 [ 247.639168] ? __should_failslab+0x8a/0x180 [ 247.643510] __should_failslab+0x124/0x180 [ 247.647761] should_failslab+0x9/0x14 [ 247.651568] __kmalloc+0x2c8/0x760 [ 247.655124] ? kobject_uevent_env+0x20f/0x1110 [ 247.659727] ? rcu_read_lock_sched_held+0x108/0x120 [ 247.664754] ? kobject_get_path+0xc2/0x1a0 [ 247.668996] kobject_get_path+0xc2/0x1a0 [ 247.673066] kobject_uevent_env+0x234/0x1110 [ 247.677485] ? internal_create_group+0x347/0x970 [ 247.682259] kobject_uevent+0x1f/0x30 [ 247.686066] lo_ioctl+0x1346/0x1d10 [ 247.689712] ? lo_rw_aio_complete+0x450/0x450 [ 247.694222] blkdev_ioctl+0x9cd/0x2030 [ 247.698131] ? blkpg_ioctl+0xc40/0xc40 [ 247.702032] ? lock_downgrade+0x8f0/0x8f0 [ 247.706195] ? kasan_check_read+0x11/0x20 [ 247.710336] ? rcu_is_watching+0x8c/0x150 [ 247.714479] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 247.718894] ? __fget+0x414/0x670 [ 247.722346] ? expand_files.part.8+0x9c0/0x9c0 [ 247.726929] block_ioctl+0xee/0x130 [ 247.730552] ? blkdev_fallocate+0x400/0x400 [ 247.734861] do_vfs_ioctl+0x1de/0x1720 [ 247.738736] ? rcu_is_watching+0x8c/0x150 [ 247.742875] ? ioctl_preallocate+0x300/0x300 [ 247.747274] ? __fget_light+0x2f7/0x440 [ 247.751239] ? fget_raw+0x20/0x20 [ 247.754678] ? putname+0xf2/0x130 [ 247.758152] ? rcu_read_lock_sched_held+0x108/0x120 [ 247.763158] ? kmem_cache_free+0x25c/0x2d0 [ 247.767394] ? putname+0xf7/0x130 [ 247.770850] ? do_sys_open+0x3cb/0x760 [ 247.774729] ? security_file_ioctl+0x94/0xc0 [ 247.779130] ksys_ioctl+0xa9/0xd0 [ 247.782587] __x64_sys_ioctl+0x73/0xb0 [ 247.786477] do_syscall_64+0x1b9/0x820 [ 247.790374] ? finish_task_switch+0x1d3/0x890 [ 247.794861] ? syscall_return_slowpath+0x5e0/0x5e0 [ 247.799781] ? syscall_return_slowpath+0x31d/0x5e0 [ 247.804717] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 247.810075] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 247.814928] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.820109] RIP: 0033:0x455a17 [ 247.823282] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 247.842630] RSP: 002b:00007f3b14630a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:59:06 executing program 7: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x200000000114, 0x5, &(0x7f0000000040)=""/1, &(0x7f0000000000)=0xfffffffffffffd40) 14:59:06 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, r1, 0x0, 0x0) r3 = syz_fuse_mount(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000000)=r2) dup2(r0, r2) 14:59:06 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = epoll_create(0x100) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) dup2(r0, r1) 14:59:06 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:06 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df821728d598bf6c2c702ff314", 0x20) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002580)=[{0x0, 0x0, &(0x7f00000013c0), 0x293, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f000000a700)=[{{0x0, 0x0, &(0x7f000000a680)=[{&(0x7f000000a580)=""/200, 0xc8}], 0x1}}], 0x40000000000015f, 0x0, 0x0) [ 247.850330] RAX: ffffffffffffffda RBX: 0000000020000328 RCX: 0000000000455a17 [ 247.857589] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 247.864856] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 247.872115] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 247.879384] R13: 0000000000000001 R14: 00000000004d3840 R15: 0000000000000012 14:59:06 executing program 7: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x80247008, &(0x7f0000000100)) 14:59:06 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:06 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:06 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) chdir(&(0x7f0000000080)='./file0\x00') syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f0000000740)) rmdir(&(0x7f0000000040)='./file0\x00') 14:59:06 executing program 7: r0 = socket$inet(0x2, 0x80001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00', 0x19, 0x4, 0xd70, [0x20001780, 0x0, 0x0, 0x200022b0, 0x200023e8], 0x0, &(0x7f0000000100), &(0x7f0000001780)=[{0x0, '\x00', 0x0, 0xfffff7fffffffffe, 0x2, [{{{0x3, 0x0, 0x0, 'ip6_vti0\x00', 'veth1_to_bond\x00', 'ipddp0\x00', 'veth0_to_team\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @empty, [], 0xb0, 0x120, 0x158, [@connbytes={'connbytes\x00', 0x18}]}, [@arpreply={'arpreply\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}}, @snat={'snat\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}]}, @arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2}}}}}, {{{0x9, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'irlan0\x00', 'gretap0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x970, 0x970, 0x9a8, [@among={'among\x00', 0x898, {{0x0, 0x0, 0x0, {[], 0x2, [{[], @dev={0xac, 0x14, 0x14}}, {}]}, {[], 0x8, [{[0x0, 0x7], @local={0xac, 0x14, 0x14, 0xaa}}, {[], @multicast1=0xe0000001}, {[], @dev={0xac, 0x14, 0x14}}, {[], @rand_addr}, {[], @dev={0xac, 0x14, 0x14}}, {}, {[], @dev={0xac, 0x14, 0x14}}, {[], @remote={0xac, 0x14, 0x14, 0xbb}}]}}}}, @mark_m={'mark_m\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="cb5581272429"}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'bond_slave_1\x00', 'team_slave_0\x00', 'veth0_to_bond\x00', 'sit0\x00', @random="0140176052e0", [], @empty, [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0xb, 0x0, 0x0, 'gre0\x00', 'bcsh0\x00', 'vcan0\x00', 'veth0\x00', @empty, [0x3], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0xe8, 0xe8, 0x120, [@cpu={'cpu\x00', 0x8}, @ip={'ip\x00', 0x20, {{@multicast2=0xe0000002, @rand_addr}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}}}}]}]}, 0xde8) 14:59:07 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:07 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cuse\x00', 0x121102, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000000)="10000000060000000000000000000000", 0x10}]) [ 248.188730] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 248.199610] FAT-fs (loop5): bogus number of reserved sectors [ 248.205583] FAT-fs (loop5): Can't find a valid FAT filesystem 14:59:07 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 248.310852] IPVS: ftp: loaded support on port[0] = 21 [ 248.322976] FAT-fs (loop5): bogus number of reserved sectors [ 248.328899] FAT-fs (loop5): Can't find a valid FAT filesystem 14:59:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:07 executing program 7: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000380)=""/150) 14:59:07 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:07 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cuse\x00', 0x121102, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000000)="10000000060000000000000000000000", 0x10}]) [ 248.944977] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.951375] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.958488] device bridge_slave_0 entered promiscuous mode [ 248.982658] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.989067] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.996165] device bridge_slave_1 entered promiscuous mode [ 249.019267] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 249.043297] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 249.107570] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 249.133069] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 249.233385] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 249.240505] team0: Port device team_slave_0 added [ 249.263519] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 249.270619] team0: Port device team_slave_1 added [ 249.293640] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.319155] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.343640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 249.368375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.578547] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.584943] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.591580] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.597930] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.351859] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.425593] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 250.501965] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 250.508187] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.515750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.585738] 8021q: adding VLAN 0 to HW filter on device team0 14:59:09 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, r1, 0x0, 0x0) r3 = syz_fuse_mount(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000000)=r2) dup2(r0, r2) 14:59:09 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = epoll_create(0x100) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) dup2(r0, r1) 14:59:09 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:09 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) chdir(&(0x7f0000000080)='./file0\x00') syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f0000000740)) rmdir(&(0x7f0000000040)='./file0\x00') 14:59:09 executing program 7: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="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", 0xfc) 14:59:09 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cuse\x00', 0x121102, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000000)="10000000060000000000000000000000", 0x10}]) 14:59:09 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btr.s\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 251.086889] FAT-fs (loop5): bogus number of reserved sectors [ 251.092859] FAT-fs (loop5): Can't find a valid FAT filesystem 14:59:10 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000), 0xc) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000000), &(0x7f0000000080)) 14:59:10 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:10 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cuse\x00', 0x121102, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000000)="10000000060000000000000000000000", 0x10}]) 14:59:10 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:10 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = epoll_create(0x100) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) dup2(r0, r1) 14:59:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btr/s\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:10 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) chdir(&(0x7f0000000080)='./file0\x00') syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f0000000740)) rmdir(&(0x7f0000000040)='./file0\x00') 14:59:10 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@loopback={0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0xa, 0x0, 0x1}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1=0xe0000001, 0x0, 0xff}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 14:59:10 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40040010000004c, &(0x7f0000000000)=0xfffffffffffffffe, 0x4) 14:59:10 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:10 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:10 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = epoll_create(0x100) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) dup2(r0, r1) [ 251.521391] FAT-fs (loop5): bogus number of reserved sectors [ 251.527340] FAT-fs (loop5): Can't find a valid FAT filesystem [ 251.538876] device bridge_slave_1 left promiscuous mode [ 251.544603] bridge0: port 2(bridge_slave_1) entered disabled state 14:59:10 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000), 0xc) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000000), &(0x7f0000000080)) [ 251.626925] device bridge_slave_0 left promiscuous mode [ 251.632572] bridge0: port 1(bridge_slave_0) entered disabled state 14:59:10 executing program 6: r0 = socket(0x1001000000010, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)=@newlink={0x40, 0x10, 0xda76b36b65dcf5df, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, [@IFLA_INFO_KIND={0x14, 0x1, "697036677265000000000000000600"}]}, @IFLA_NET_NS_FD={0x8, 0x10}]}, 0x40}, 0x1}, 0x0) 14:59:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfp\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:10 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) chdir(&(0x7f0000000080)='./file0\x00') syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f0000000740)) rmdir(&(0x7f0000000040)='./file0\x00') 14:59:10 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:10 executing program 4: socket(0x24, 0x0, 0x0) 14:59:10 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000), 0xc) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000000), &(0x7f0000000080)) [ 251.863661] FAT-fs (loop5): bogus number of reserved sectors [ 251.869660] FAT-fs (loop5): Can't find a valid FAT filesystem 14:59:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfo\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 251.938270] team0 (unregistering): Port device team_slave_1 removed 14:59:10 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000003000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r1, 0x8004510b, &(0x7f0000a07fff)) 14:59:10 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:10 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) recvmmsg(r1, &(0x7f000030efc4)=[{{&(0x7f0000413ffa)=@hci, 0x6, &(0x7f0000b60000), 0x0, &(0x7f00004f9000)}}], 0x375, 0x0, 0x0) [ 252.015715] IPVS: ftp: loaded support on port[0] = 21 [ 252.022942] team0 (unregistering): Port device team_slave_0 removed 14:59:10 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000), 0xc) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000000), &(0x7f0000000080)) [ 252.082622] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 252.139199] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 252.218537] bond0 (unregistering): Released all slaves [ 252.257275] netlink: 'syz-executor6': attribute type 16 has an invalid length. [ 252.942469] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.948923] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.956243] device bridge_slave_0 entered promiscuous mode [ 252.993822] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.000257] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.007618] device bridge_slave_1 entered promiscuous mode [ 253.044110] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 253.080895] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 253.198661] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 253.236877] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 253.305300] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 253.312233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.419473] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 253.426974] team0: Port device team_slave_0 added [ 253.462754] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 253.470650] team0: Port device team_slave_1 added [ 253.507517] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.545905] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.585006] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 253.592359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.600986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.629806] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 253.636973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.648153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.879172] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.885559] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.892208] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.898592] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.905831] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 254.303525] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 254.669784] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.746433] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.824210] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 254.830409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.838104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.908555] 8021q: adding VLAN 0 to HW filter on device team0 14:59:14 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x4) 14:59:14 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfX\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:14 executing program 7: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x2000000000010d, 0x4000800000000b, &(0x7f0000000280)='\a\x00\x00\x00', 0x4) 14:59:14 executing program 6: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000002c0)={0x1}, 0x8) shutdown(r0, 0x1) 14:59:14 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="4499"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:59:14 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)) 14:59:14 executing program 6: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000005c0)) 14:59:14 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000480), 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000100)="01", 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x6) 14:59:14 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)="627472667303", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:14 executing program 1: syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x1baf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0) 14:59:14 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf-\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:14 executing program 7: r0 = socket$inet(0x2b, 0x801, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2}, 0x10) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x6, 0x10, &(0x7f00000006c0)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 14:59:14 executing program 4: r0 = gettid() r1 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f000064effb)="8907040000", 0x5) bind$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) connect$inet(r1, &(0x7f0000000300)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000583ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000e60000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x15) 14:59:14 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000300)={0x9, 0x108, 0xfa00, {0xffffffff, 0x0, "fdfb1b", "7f2b0ee4e5d4c0efb4fcaccbb4e1140af6eff5876d286165147d81aff78938b013a2f9a1413181a322f458785db1c0403bf9bed068f98e490d0e6d137d9888048767eb584b4c55ea559b4dbc7532cb0241d490f7a22540e87bb46eba0c034c2efab945ebbe762a60a2888313edb73def3275e67b81fe3e150356f3f1e6bf557dd5e6070869d64278198705d23e1f9eb702eb550f8f7f3851da77427826375d6d2e2807491100d6bbc235e2c7db375d4555ed44d465540d8b3857d854c4e26e4e65a9e861c0971ca1c74da2d6467cafe1d5a6be1fda70fecd0448b344d087620ab4e187d8fe5bdfe777be0ab996cff4f10700"}}, 0x110) 14:59:14 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:14 executing program 1: syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x1baf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0) 14:59:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000140)="a4d50891ffd8b1d241f94a0bff080635", 0x10) io_setup(0x9, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340), 0x87}]) 14:59:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfi\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:14 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000600)='.\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='adfs\x00', 0x80000, &(0x7f00000006c0)) mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00008deff8)='/\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)="6e66730039ad695ab91f0928267795ce2b07ba848ecc6b7c69", 0x2007a00, &(0x7f0000000140)) umount2(&(0x7f0000000040)='./file0\x00', 0x2) 14:59:14 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:14 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000300)={0x9, 0x108, 0xfa00, {0xffffffff, 0x0, "fdfb1b", "7f2b0ee4e5d4c0efb4fcaccbb4e1140af6eff5876d286165147d81aff78938b013a2f9a1413181a322f458785db1c0403bf9bed068f98e490d0e6d137d9888048767eb584b4c55ea559b4dbc7532cb0241d490f7a22540e87bb46eba0c034c2efab945ebbe762a60a2888313edb73def3275e67b81fe3e150356f3f1e6bf557dd5e6070869d64278198705d23e1f9eb702eb550f8f7f3851da77427826375d6d2e2807491100d6bbc235e2c7db375d4555ed44d465540d8b3857d854c4e26e4e65a9e861c0971ca1c74da2d6467cafe1d5a6be1fda70fecd0448b344d087620ab4e187d8fe5bdfe777be0ab996cff4f10700"}}, 0x110) 14:59:14 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:14 executing program 1: syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x1baf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0) 14:59:14 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf0\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:15 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000300)={0x9, 0x108, 0xfa00, {0xffffffff, 0x0, "fdfb1b", "7f2b0ee4e5d4c0efb4fcaccbb4e1140af6eff5876d286165147d81aff78938b013a2f9a1413181a322f458785db1c0403bf9bed068f98e490d0e6d137d9888048767eb584b4c55ea559b4dbc7532cb0241d490f7a22540e87bb46eba0c034c2efab945ebbe762a60a2888313edb73def3275e67b81fe3e150356f3f1e6bf557dd5e6070869d64278198705d23e1f9eb702eb550f8f7f3851da77427826375d6d2e2807491100d6bbc235e2c7db375d4555ed44d465540d8b3857d854c4e26e4e65a9e861c0971ca1c74da2d6467cafe1d5a6be1fda70fecd0448b344d087620ab4e187d8fe5bdfe777be0ab996cff4f10700"}}, 0x110) 14:59:15 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) r1 = dup2(r0, r0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000100)={0x8}, 0x10) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 14:59:15 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x4, &(0x7f0000000040)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) 14:59:15 executing program 1: syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x1baf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0) 14:59:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)="62747266737f", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:15 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:15 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = timerfd_create(0x9, 0x0) dup3(r0, r1, 0x0) 14:59:15 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000300)={0x9, 0x108, 0xfa00, {0xffffffff, 0x0, "fdfb1b", "7f2b0ee4e5d4c0efb4fcaccbb4e1140af6eff5876d286165147d81aff78938b013a2f9a1413181a322f458785db1c0403bf9bed068f98e490d0e6d137d9888048767eb584b4c55ea559b4dbc7532cb0241d490f7a22540e87bb46eba0c034c2efab945ebbe762a60a2888313edb73def3275e67b81fe3e150356f3f1e6bf557dd5e6070869d64278198705d23e1f9eb702eb550f8f7f3851da77427826375d6d2e2807491100d6bbc235e2c7db375d4555ed44d465540d8b3857d854c4e26e4e65a9e861c0971ca1c74da2d6467cafe1d5a6be1fda70fecd0448b344d087620ab4e187d8fe5bdfe777be0ab996cff4f10700"}}, 0x110) 14:59:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf#\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:15 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2284, &(0x7f0000001480)={0x2, 0x0, 0xffffffffffffff88, 0x0, @scatter={0x0, 0x0, &(0x7f0000000280)}, &(0x7f0000000080), &(0x7f0000001400)=""/71, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) 14:59:15 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000140)="295ee1311f16f477671070") r1 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000a0cff4)={0x4400000010, 0x0, 0x0, 0x70a0}, 0xc) getsockopt$netlink(r1, 0x10e, 0x8000000009, &(0x7f00007e0000)=""/4, &(0x7f0000000080)=0x4) 14:59:15 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x11, 0x80002, 0x0) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000180)={0x0, 0x5}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xfffffdf7, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) shutdown(r3, 0x1) 14:59:15 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ffa0950000bfa100000000000007010000f8ffffffb702000008000000bf130000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000010000)={r0, 0x0, 0xe, 0x100, &(0x7f0000020000)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000030000)=""/256}, 0x28) 14:59:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:15 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x2f84) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000140)=@ethtool_link_settings={0x8}}) close(r2) close(r1) 14:59:15 executing program 4: r0 = memfd_create(&(0x7f000003e000)='\t', 0x0) r1 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) dup2(r1, r0) write$sndseq(r0, &(0x7f0000000080)=[{0xfeffffff, 0x8, 0x0, 0x3fd, @tick, {}, {}, @raw32}], 0x2aa) 14:59:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf+\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 256.879816] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 256.898739] BTRFS error (device loop3): superblock checksum mismatch 14:59:15 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in=@multicast1=0xe0000001, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in=@dev={0xac, 0x14, 0x14}}}, {{@in=@broadcast=0xffffffff}}}, 0xe8) 14:59:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000300)={[{@noacl='noacl', 0x2c}, {@quota='quota', 0x2c}]}) [ 256.946179] BTRFS error (device loop3): open_ctree failed 14:59:15 executing program 7: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) vmsplice(r0, &(0x7f00004e8000)=[{&(0x7f0000004980)=';', 0x1}], 0x1, 0x0) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, &(0x7f00000001c0), 0x20, 0x2) 14:59:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:15 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf%\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 257.095484] gfs2: not a GFS2 filesystem [ 257.166545] gfs2: not a GFS2 filesystem 14:59:16 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x7, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80000000000006, {0x2, 0x0, @loopback=0x7f000001}, 'veth1_to_bridge\x00'}) 14:59:16 executing program 7: sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendto$inet6(r1, &(0x7f0000bc2000)="81", 0x1, 0x0, &(0x7f0000606fe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x1}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f00006a7ffc), 0x4) [ 257.212980] BTRFS error (device loop3): superblock checksum mismatch 14:59:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)="627472667310", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 257.267630] BTRFS error (device loop3): open_ctree failed 14:59:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4040ae79, &(0x7f0000000000)={0x0, 0x0, [0x0, 0xffff8000]}) 14:59:16 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x7e1, 0x3, &(0x7f0000000640)=[{&(0x7f0000000280)='!', 0x1, 0x9}, {&(0x7f00000003c0)}, {&(0x7f0000000480), 0x0, 0x20}], 0x0, &(0x7f0000000700)={[{@adaptive_mode='mode=adaptive', 0x2c}, {@nodiscard='nodiscard', 0x2c}, {@nodiscard='nodiscard', 0x2c}]}) ptrace$peek(0x3, 0x0, &(0x7f00000001c0)) semget(0xffffffffffffffff, 0x0, 0x24) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) 14:59:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfu\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:16 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000500)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000280)={0x14, 0x1d, 0x1, 0x0, 0x0, {0x1b}}, 0x14}, 0x1}, 0x0) 14:59:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000840)=ANY=[@ANYBLOB="8149"]) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$fiemap(r1, 0x40086602, &(0x7f0000000280)=ANY=[]) 14:59:16 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f00001ed000/0x4000)=nil, 0x4000, 0x1000000003, 0x4013, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f00001ee000/0x2000)=nil, 0x2000}, &(0x7f0000000040)=0x10) [ 257.720934] BTRFS error (device loop3): superblock checksum mismatch [ 257.735644] F2FS-fs (loop5): Unable to read 1th superblock [ 257.766570] BTRFS error (device loop3): open_ctree failed [ 257.776813] F2FS-fs (loop5): Unable to read 2th superblock [ 257.791611] F2FS-fs (loop5): Unable to read 1th superblock 14:59:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfx\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 257.857933] F2FS-fs (loop5): Unable to read 2th superblock 14:59:16 executing program 6: r0 = socket$inet(0x2, 0x3, 0x6) recvfrom$inet(r0, &(0x7f0000000180)=""/248, 0xf3, 0x80000000010061, 0x0, 0x2f3) 14:59:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 257.965644] F2FS-fs (loop5): Unable to read 1th superblock 14:59:16 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0047fc2f07d82c99240970") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x19, &(0x7f0000000180)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) 14:59:16 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') getdents(r0, &(0x7f0000000040)=""/30, 0x1e) getdents64(r0, &(0x7f0000000080)=""/36, 0x24) [ 258.073507] F2FS-fs (loop5): Unable to read 2th superblock 14:59:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fb", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 258.121820] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 258.128977] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 258.204151] F2FS-fs (loop5): Unable to read 2th superblock 14:59:17 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt(r0, 0x10e, 0xb, &(0x7f0000f67000), 0x2) 14:59:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfc\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000840)=ANY=[@ANYBLOB="8149"]) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$fiemap(r1, 0x40086602, &(0x7f0000000280)=ANY=[]) 14:59:17 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000004061f001cfffd946fa2830020200a000900010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 14:59:17 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) accept4(r0, 0x0, &(0x7f0000000400), 0x0) 14:59:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000840)=ANY=[@ANYBLOB="8149"]) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$fiemap(r1, 0x40086602, &(0x7f0000000280)=ANY=[]) 14:59:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000440)="575e3eef3db62f994be589caa03f871b80d69d906e8fb20743e480318a71ea03e2e8626cddbc3bf8c686ce3871f229a7dba560efaa7ca2cc09e4aede9746c2453fcca21e311cca40b963701b5b0a1403ea", 0x0) fallocate(r0, 0x8000000000000003, 0x81bb, 0x7) 14:59:17 executing program 7: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0x94) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "010000090000001ffb4b01000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000000480), 0x0, &(0x7f00006e9c68)}, 0x0) [ 258.372108] netlink: 'syz-executor5': attribute type 1 has an invalid length. [ 258.379514] netlink: 4 bytes leftover after parsing attributes in process `syz-executor5'. 14:59:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x8, 0x0, 0xffffffffffffffad}}) 14:59:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 258.492058] netlink: 'syz-executor5': attribute type 1 has an invalid length. [ 258.499510] netlink: 4 bytes leftover after parsing attributes in process `syz-executor5'. 14:59:17 executing program 6: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000100)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x800000000004, 0x20011, r1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000000)=0x2c2) 14:59:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfl\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x2, 0x2000000088) bind(r1, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) setsockopt$inet_udp_int(r1, 0x11, 0xa, &(0x7f0000000000)=0x1, 0x4) recvmsg(r1, &(0x7f0000000400)={&(0x7f0000f10000)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000001680), 0x0, &(0x7f0000000100)=""/79, 0x4f}, 0x4000003e) sendto$inet(r1, &(0x7f0000000200)='X', 0x1, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) 14:59:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:17 executing program 5: r0 = memfd_create(&(0x7f0000000180)="5b805705ffff801d6540d1813d84ce30b70ec4fcfe", 0x3) fcntl$addseals(r0, 0x409, 0x6) fallocate(r0, 0x0, 0x0, 0x2) 14:59:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000580), 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x480}]}) 14:59:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfd\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:17 executing program 5: capset(&(0x7f00000fc000)={0x819980330}, &(0x7f000047efe8)) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000000c0)=@add_del={0x2, &(0x7f0000000080)='nr0\x00'}) 14:59:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000840)=ANY=[@ANYBLOB="8149"]) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$fiemap(r1, 0x40086602, &(0x7f0000000280)=ANY=[]) 14:59:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)="62747266730f", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:17 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@local={0xac, 0x14, 0x14, 0xaa}, @rand_addr}, 0xc) setsockopt$inet_tcp_int(r3, 0x6, 0x22, &(0x7f0000000000), 0x4) close(r3) dup3(r1, r2, 0x0) 14:59:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000840)=ANY=[@ANYBLOB="8149"]) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$fiemap(r1, 0x40086602, &(0x7f0000000280)=ANY=[]) 14:59:17 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xf}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000000)="df", &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) 14:59:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf*\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:18 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x1f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @in=@dev={0xac, 0x14}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}, 0x1}, 0x0) 14:59:18 executing program 6: r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f0000000000)=@nl=@unspec={0x2001001000000000}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="1400000000000000290000003e00000000000000"], 0x14}, 0x0) 14:59:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x127f, 0x0) 14:59:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf.\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000840)=ANY=[@ANYBLOB="8149"]) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$fiemap(r1, 0x40086602, &(0x7f0000000280)=ANY=[]) 14:59:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000840)=ANY=[@ANYBLOB="8149"]) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$fiemap(r1, 0x40086602, &(0x7f0000000280)=ANY=[]) 14:59:18 executing program 7: r0 = socket$inet(0x2, 0x80003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000004c0)='bridge_slave_0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) 14:59:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:18 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000180)="c7442400e9000000c744240200000100c7442406000000000f011c24450f088f09b895f665410f3248b8b8789b86000000000f23d00f21f835100000000f23f826420f080f20d835200000000f22d866430f50ed650fc718c421c812f8", 0x5d}], 0x1, 0x0, &(0x7f0000000080), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000280)="263ef30f524d02baf80c66b8c6b3c88b66efbafc0cb8ce5def3665dec9f4260f01ca66b9800000c00f326635000800000f306665670f1f00670f017cec35f40fb39adc00", 0x44}], 0x1, 0x0, &(0x7f0000000340), 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000000)={0x1, 0x0, [{0x7}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:59:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:18 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="b7859cb8eec705f2288a933d66593a060000000000000040c522b60bdfedb810", 0x20) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 14:59:18 executing program 5: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f00000005c0)=@setlink={0x30, 0x13, 0xf2f, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x10, 0x16, [{0xc, 0x1, [@typed={0x8, 0x0, @uid}]}]}]}, 0x30}, 0x1}, 0x0) 14:59:18 executing program 6: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x1, 0x0) pwritev(r0, &(0x7f0000000480)=[{&(0x7f0000000380)='c', 0x1}], 0x1, 0x0) 14:59:18 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(wp256-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x50) 14:59:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="62747266730f", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'md5-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000140)={&(0x7f0000000280)=@vsock={0x28, 0x0, 0x0, @any=0xffffffff}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000440)=ANY=[]}, 0xc000) accept(r1, 0x0, &(0x7f0000000200)) 14:59:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:19 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="b7859cb8eec705f2288a933d66593a060000000000000040c522b60bdfedb810", 0x20) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 14:59:19 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="b7859cb8eec705f2288a933d66593a060000000000000040c522b60bdfedb810", 0x20) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 14:59:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:19 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="b7859cb8eec705f2288a933d66593a060000000000000040c522b60bdfedb810", 0x20) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 14:59:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:19 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000000b061f001cfffd9467a23f297709000100060500000000a3a20404ff7e000000", 0x24}], 0x1}, 0x0) 14:59:19 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="b7859cb8eec705f2288a933d66593a060000000000000040c522b60bdfedb810", 0x20) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) [ 260.553522] netlink: 16 bytes leftover after parsing attributes in process `syz-executor6'. 14:59:19 executing program 7: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000005800)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000040)='bcsf0\x00') 14:59:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffffbf, 0x0, 0x0, 0x0, 0x2a, 0x6c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 14:59:19 executing program 4: bpf$OBJ_PIN_MAP(0x13, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00'}, 0x10) 14:59:19 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="b7859cb8eec705f2288a933d66593a060000000000000040c522b60bdfedb810", 0x20) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 14:59:19 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="b7859cb8eec705f2288a933d66593a060000000000000040c522b60bdfedb810", 0x20) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 14:59:19 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000380)="0ca43ef30fbd57b80f23c20f1366d26565df9d0500000066ba2000edc4e1d1fc37b8010000000f01d90fc75b05c744240098d30000c74424025f5539d6c7442406000000000f011424", 0x49}], 0x1, 0x24, &(0x7f00000002c0), 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text16={0x10, &(0x7f00000001c0)="640f602cd8a0020066b9800000c00f326635004000000f30dfdd65640f22930f01d1baf80c66b878ea428966efbafc0cb83e38ef262e642626360f2193cad3126766c7442400110900006766c74424021001c0fe6766c744240600000000670f011c24", 0x63}], 0x1, 0x0, &(0x7f00000002c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:59:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f4", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="45964a5c4f0f00fe000030492a768b88b40eda954797623745e004"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x12, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x4bb, &(0x7f0000000300)=""/187, 0x0, 0x0, [], 0x0, 0xb}, 0x48) 14:59:19 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)="6367726f75702e6d61782e64657074680048c1bfe2aea13dd481295390a8011170cf09f777131df189c94944fb4e637809099b2f02044e491250", 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x0) 14:59:19 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount$9p_tcp(&(0x7f0000000040)='224.20.20.20\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=', 'tcp', 0x2c, {'port', 0x3d}, 0x2c, {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d}, 0x2c, {[{@privport='privport', 0x2c}]}}) 14:59:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x5, &(0x7f0000d11000), &(0x7f0000000000)=0x4) [ 261.015960] 9pnet: p9_fd_create_tcp (16812): problem connecting socket to 224.20.20.20 14:59:19 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000400), &(0x7f0000000440)=0x4) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") close(r1) close(r0) 14:59:19 executing program 7: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000005800)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000040)='bcsf0\x00') 14:59:19 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000600)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x4000008912, &(0x7f00000000c0)="295ee1311f16f477671070") ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000340)={0x10, 0x0, &(0x7f00000001c0)=[@increfs={0x40046304}, @release={0x40046306}], 0x0, 0x0, &(0x7f0000000280)}) 14:59:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount$9p_tcp(&(0x7f0000000040)='224.20.20.20\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=', 'tcp', 0x2c, {'port', 0x3d}, 0x2c, {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d}, 0x2c, {[{@privport='privport', 0x2c}]}}) 14:59:20 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in=@remote}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000000c0)=0xe8) [ 261.221761] binder: tried to use weak ref as strong ref [ 261.227555] binder: 16840:16842 Release 1 refcount change on invalid ref 0 ret -22 14:59:20 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f0000f65000)=[{&(0x7f0000000140)="80fd060a743d", 0x6}], 0x1, 0x0) 14:59:20 executing program 7: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000005800)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000040)='bcsf0\x00') [ 261.333053] binder: BINDER_SET_CONTEXT_MGR already set [ 261.334590] 9pnet: p9_fd_create_tcp (16859): problem connecting socket to 224.20.20.20 14:59:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv4_newaddr={0x34, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6}, @IFA_LOCAL={0x8, 0x2, @loopback=0x7f000001}]}, 0x34}, 0x1}, 0x0) [ 261.381284] binder: 16840:16842 ioctl 40046207 0 returned -16 14:59:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount$9p_tcp(&(0x7f0000000040)='224.20.20.20\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=', 'tcp', 0x2c, {'port', 0x3d}, 0x2c, {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d}, 0x2c, {[{@privport='privport', 0x2c}]}}) 14:59:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x13, &(0x7f0000000000), 0x0) 14:59:20 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f0000f65000)=[{&(0x7f0000000140)="80fd060a743d", 0x6}], 0x1, 0x0) 14:59:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 261.579967] 9pnet: p9_fd_create_tcp (16896): problem connecting socket to 224.20.20.20 14:59:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000900)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x8, 0x12, [@IFLA_INFO_SLAVE_DATA={0x4, 0x5}]}]}, 0x28}, 0x1}, 0x0) 14:59:20 executing program 7: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000005800)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000040)='bcsf0\x00') 14:59:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c0045003, &(0x7f00006e1000)) 14:59:20 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x40101283, 0x0) 14:59:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount$9p_tcp(&(0x7f0000000040)='224.20.20.20\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=', 'tcp', 0x2c, {'port', 0x3d}, 0x2c, {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d}, 0x2c, {[{@privport='privport', 0x2c}]}}) 14:59:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f5", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:20 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f0000f65000)=[{&(0x7f0000000140)="80fd060a743d", 0x6}], 0x1, 0x0) [ 262.088748] 9pnet: p9_fd_create_tcp (16938): problem connecting socket to 224.20.20.20 14:59:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000bfef9b9d2a4b20079fffffffffffffe0002", 0x21) 14:59:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:21 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x40101283, 0x0) 14:59:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\a', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:21 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f0000f65000)=[{&(0x7f0000000140)="80fd060a743d", 0x6}], 0x1, 0x0) 14:59:21 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000101000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0xffffff84, 0x0, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}, [], "802a08000000006b"}}}}}}}, 0x0) 14:59:21 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = syz_fuseblk_mount(&(0x7f0000000480)='./file0\x00', &(0x7f0000004640)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r1) socketpair$inet(0x2, 0x3, 0xff, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_dccp_buf(r2, 0x21, 0xcf, &(0x7f0000000040)=""/93, &(0x7f00000000c0)=0x5d) ioctl$TIOCNOTTY(r2, 0x5422) 14:59:21 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x40101283, 0x0) 14:59:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fd", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:21 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'veth1_to_bond\x00', &(0x7f0000000000)=@ethtool_stats={0x4b, 0xf}}) 14:59:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:21 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x40101283, 0x0) 14:59:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000000c0)) write$sndseq(r1, &(0x7f0000000200)=[{0x81, 0x5, 0x0, 0x0, @tick, {}, {}, @raw8={"959546592b83c98a10d789af"}}], 0x30) 14:59:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 14:59:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:21 executing program 1: syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) close(0xffffffffffffffff) add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, &(0x7f0000000300), 0x0, 0xfffffffffffffffa) symlink(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000480)='./file0\x00') symlink(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000100)='./file1\x00') syz_fuseblk_mount(&(0x7f0000000440)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:59:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = getpgrp(0xffffffffffffffff) getpriority(0x1, r1) 14:59:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f762070") r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt(r1, 0xff, 0x1, &(0x7f0000000040)="18", 0x1) 14:59:21 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295e273b5abcf477671070") r2 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x3}}, 0xa) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00}, 0x20) 14:59:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000b8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000e4b000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) 14:59:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xc00caee0) 14:59:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)="6274726673c0", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f0000000a00)=@setlink={0x2c, 0x13, 0x409, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_GROUP={0x8, 0x1b}, @IFLA_XDP={0x4, 0x2b}]}, 0x2c}, 0x1}, 0x0) 14:59:21 executing program 1: r0 = socket$inet_sctp(0x2, 0x805, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}]}, &(0x7f0000000100)=0x10) 14:59:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)="627472667304", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:22 executing program 1 (fault-call:1 fault-nth:0): socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f6", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 263.328467] FAULT_INJECTION: forcing a failure. [ 263.328467] name failslab, interval 1, probability 0, space 0, times 0 [ 263.339805] CPU: 1 PID: 17144 Comm: syz-executor1 Not tainted 4.18.0-rc3+ #136 [ 263.347171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.356525] Call Trace: [ 263.359139] dump_stack+0x1c9/0x2b4 [ 263.362795] ? dump_stack_print_info.cold.2+0x52/0x52 [ 263.368011] should_fail.cold.4+0xa/0x1a [ 263.372079] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 263.377173] ? lock_downgrade+0x8f0/0x8f0 [ 263.381313] ? proc_fail_nth_write+0x9e/0x210 [ 263.385809] ? proc_cwd_link+0x1d0/0x1d0 [ 263.389880] ? __schedule+0x884/0x1ed0 [ 263.393765] ? find_held_lock+0x36/0x1c0 [ 263.397839] ? check_same_owner+0x340/0x340 [ 263.402160] ? rcu_note_context_switch+0x730/0x730 [ 263.407078] __should_failslab+0x124/0x180 [ 263.411304] should_failslab+0x9/0x14 [ 263.415105] __kmalloc+0x2c8/0x760 [ 263.418643] ? strncpy_from_user+0x510/0x510 [ 263.423043] ? fput+0x130/0x1a0 [ 263.426308] ? __x64_sys_memfd_create+0x142/0x4f0 [ 263.431152] __x64_sys_memfd_create+0x142/0x4f0 [ 263.435818] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 263.441342] ? memfd_fcntl+0x1400/0x1400 [ 263.445387] ? do_syscall_64+0x9a/0x820 [ 263.449350] do_syscall_64+0x1b9/0x820 [ 263.453236] ? syscall_slow_exit_work+0x500/0x500 [ 263.458078] ? syscall_return_slowpath+0x5e0/0x5e0 [ 263.463022] ? syscall_return_slowpath+0x31d/0x5e0 [ 263.467959] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 263.473322] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 263.478155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.483336] RIP: 0033:0x455ba9 [ 263.486517] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.505727] RSP: 002b:00007fa4b741ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 263.513421] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455ba9 [ 263.520673] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004ba7f0 14:59:22 executing program 1 (fault-call:1 fault-nth:1): socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) [ 263.527939] RBP: 000000000072bea0 R08: 0000000020000318 R09: 00000000fbad8001 [ 263.535208] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000014 [ 263.542477] R13: 00000000004c228c R14: 00000000004d3840 R15: 0000000000000000 [ 263.551421] BTRFS error (device loop4): superblock checksum mismatch [ 263.562589] BTRFS error (device loop4): open_ctree failed 14:59:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 263.648514] FAULT_INJECTION: forcing a failure. [ 263.648514] name failslab, interval 1, probability 0, space 0, times 0 [ 263.659875] CPU: 1 PID: 17159 Comm: syz-executor1 Not tainted 4.18.0-rc3+ #136 [ 263.667238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.676595] Call Trace: [ 263.679200] dump_stack+0x1c9/0x2b4 [ 263.682837] ? dump_stack_print_info.cold.2+0x52/0x52 [ 263.688026] ? print_usage_bug+0xc0/0xc0 [ 263.692088] should_fail.cold.4+0xa/0x1a [ 263.696137] ? trace_hardirqs_on+0x10/0x10 [ 263.700367] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 263.705466] ? find_held_lock+0x36/0x1c0 [ 263.709518] ? find_held_lock+0x36/0x1c0 [ 263.713575] ? check_same_owner+0x340/0x340 [ 263.717883] ? rcu_note_context_switch+0x730/0x730 [ 263.722799] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 263.727804] __should_failslab+0x124/0x180 [ 263.732031] should_failslab+0x9/0x14 [ 263.735817] kmem_cache_alloc+0x2af/0x760 [ 263.739956] __d_alloc+0xc8/0xd50 [ 263.743411] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 263.748423] ? do_raw_spin_unlock+0xa7/0x2f0 [ 263.752818] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 263.757398] ? __lock_is_held+0xb5/0x140 [ 263.761469] ? _raw_spin_unlock+0x22/0x30 [ 263.765601] ? __alloc_fd+0x34e/0x710 [ 263.769391] ? exit_files+0xb0/0xb0 [ 263.773012] d_alloc_pseudo+0x1d/0x30 [ 263.776805] __shmem_file_setup+0x1f3/0x700 [ 263.781112] ? check_same_owner+0x340/0x340 [ 263.785421] ? shmem_fill_super+0xa50/0xa50 [ 263.789733] ? get_unused_fd_flags+0x122/0x1a0 [ 263.794301] ? __alloc_fd+0x710/0x710 [ 263.798090] shmem_file_setup+0x2f/0x40 [ 263.802050] __x64_sys_memfd_create+0x2af/0x4f0 [ 263.806704] ? memfd_fcntl+0x1400/0x1400 [ 263.810754] ? do_syscall_64+0x9a/0x820 [ 263.814719] do_syscall_64+0x1b9/0x820 [ 263.818590] ? finish_task_switch+0x1d3/0x890 [ 263.823074] ? syscall_return_slowpath+0x5e0/0x5e0 [ 263.827990] ? syscall_return_slowpath+0x31d/0x5e0 [ 263.832924] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 263.838276] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 263.843114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.848298] RIP: 0033:0x455ba9 [ 263.851478] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.870718] RSP: 002b:00007fa4b741ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 263.878415] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455ba9 [ 263.885668] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004ba7f0 14:59:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 263.892936] RBP: 000000000072bea0 R08: 0000000020000318 R09: 00000000fbad8001 [ 263.900191] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000014 [ 263.907454] R13: 00000000004c228c R14: 00000000004d3840 R15: 0000000000000001 14:59:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="62747266737f", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:22 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:22 executing program 1 (fault-call:1 fault-nth:2): socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\b', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 264.019134] FAULT_INJECTION: forcing a failure. [ 264.019134] name failslab, interval 1, probability 0, space 0, times 0 [ 264.030427] CPU: 0 PID: 17179 Comm: syz-executor4 Not tainted 4.18.0-rc3+ #136 [ 264.037791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.047145] Call Trace: [ 264.049751] dump_stack+0x1c9/0x2b4 [ 264.053396] ? dump_stack_print_info.cold.2+0x52/0x52 [ 264.058609] should_fail.cold.4+0xa/0x1a [ 264.062687] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 264.067810] ? lock_downgrade+0x8f0/0x8f0 [ 264.071973] ? proc_fail_nth_write+0x9e/0x210 [ 264.076484] ? proc_cwd_link+0x1d0/0x1d0 [ 264.079707] FAULT_INJECTION: forcing a failure. [ 264.079707] name failslab, interval 1, probability 0, space 0, times 0 [ 264.080560] ? find_held_lock+0x36/0x1c0 [ 264.080599] ? check_same_owner+0x340/0x340 [ 264.080616] ? rcu_note_context_switch+0x730/0x730 [ 264.080641] __should_failslab+0x124/0x180 [ 264.109309] should_failslab+0x9/0x14 [ 264.113108] __kmalloc+0x2c8/0x760 [ 264.116641] ? strncpy_from_user+0x510/0x510 [ 264.121044] ? fput+0x130/0x1a0 [ 264.124332] ? __x64_sys_memfd_create+0x142/0x4f0 [ 264.129174] __x64_sys_memfd_create+0x142/0x4f0 [ 264.133839] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 264.139372] ? memfd_fcntl+0x1400/0x1400 [ 264.143428] ? do_syscall_64+0x9a/0x820 [ 264.147407] do_syscall_64+0x1b9/0x820 [ 264.151285] ? finish_task_switch+0x1d3/0x890 [ 264.155773] ? syscall_return_slowpath+0x5e0/0x5e0 [ 264.160704] ? syscall_return_slowpath+0x31d/0x5e0 [ 264.165632] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 264.171074] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.175966] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.181145] RIP: 0033:0x455ba9 [ 264.184321] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.203650] RSP: 002b:00007fc14091ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 264.211354] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455ba9 [ 264.218613] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004ba7f0 [ 264.225873] RBP: 000000000072bea0 R08: 0000000020000318 R09: 00000000fbad8001 [ 264.233131] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 264.240389] R13: 00000000004c228c R14: 00000000004d3840 R15: 0000000000000000 [ 264.247687] CPU: 1 PID: 17191 Comm: syz-executor1 Not tainted 4.18.0-rc3+ #136 [ 264.255053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.264424] Call Trace: [ 264.267019] dump_stack+0x1c9/0x2b4 [ 264.270655] ? dump_stack_print_info.cold.2+0x52/0x52 [ 264.275857] ? __kernel_text_address+0xd/0x40 [ 264.280367] should_fail.cold.4+0xa/0x1a [ 264.284439] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 264.289550] ? save_stack+0xa9/0xd0 [ 264.293184] ? save_stack+0x43/0xd0 [ 264.296817] ? kasan_kmalloc+0xc4/0xe0 [ 264.300706] ? kasan_slab_alloc+0x12/0x20 [ 264.304858] ? kmem_cache_alloc+0x12e/0x760 [ 264.309181] ? __d_alloc+0xc8/0xd50 [ 264.311761] FAULT_INJECTION: forcing a failure. [ 264.311761] name failslab, interval 1, probability 0, space 0, times 0 [ 264.312809] ? d_alloc_pseudo+0x1d/0x30 [ 264.312825] ? __shmem_file_setup+0x1f3/0x700 [ 264.312839] ? shmem_file_setup+0x2f/0x40 [ 264.312861] ? find_held_lock+0x36/0x1c0 [ 264.312884] ? cfg80211_gtk_rekey_notify+0x370/0x9e0 [ 264.312910] ? check_same_owner+0x340/0x340 [ 264.350061] ? rcu_note_context_switch+0x730/0x730 [ 264.354985] ? kasan_check_read+0x11/0x20 [ 264.359130] __should_failslab+0x124/0x180 [ 264.363362] should_failslab+0x9/0x14 [ 264.367156] kmem_cache_alloc+0x2af/0x760 [ 264.371305] ? rcu_read_lock_sched_held+0x108/0x120 [ 264.376313] ? kmem_cache_alloc+0x5fa/0x760 [ 264.380628] ? shmem_destroy_callback+0xc0/0xc0 [ 264.385296] shmem_alloc_inode+0x1b/0x40 [ 264.389351] alloc_inode+0x63/0x190 [ 264.392975] new_inode_pseudo+0x71/0x1a0 [ 264.397031] ? prune_icache_sb+0x1b0/0x1b0 [ 264.401263] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 264.406275] new_inode+0x1c/0x40 [ 264.409635] shmem_get_inode+0xf1/0x910 [ 264.413617] ? shmem_encode_fh+0x340/0x340 [ 264.417845] ? _raw_spin_unlock+0x22/0x30 [ 264.421983] ? __alloc_fd+0x34e/0x710 [ 264.425780] ? exit_files+0xb0/0xb0 [ 264.429403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.434938] __shmem_file_setup+0x259/0x700 [ 264.439251] ? check_same_owner+0x340/0x340 [ 264.443569] ? shmem_fill_super+0xa50/0xa50 [ 264.447885] ? get_unused_fd_flags+0x122/0x1a0 [ 264.452458] ? __alloc_fd+0x710/0x710 [ 264.456258] shmem_file_setup+0x2f/0x40 [ 264.460229] __x64_sys_memfd_create+0x2af/0x4f0 [ 264.464892] ? memfd_fcntl+0x1400/0x1400 [ 264.468950] ? do_syscall_64+0x9a/0x820 [ 264.472922] do_syscall_64+0x1b9/0x820 [ 264.476801] ? finish_task_switch+0x1d3/0x890 [ 264.481292] ? syscall_return_slowpath+0x5e0/0x5e0 [ 264.486216] ? syscall_return_slowpath+0x31d/0x5e0 [ 264.491146] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 264.496510] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.501723] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.506912] RIP: 0033:0x455ba9 [ 264.510087] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.529406] RSP: 002b:00007fa4b741ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 264.537110] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455ba9 [ 264.544370] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004ba7f0 [ 264.551630] RBP: 000000000072bea0 R08: 0000000020000318 R09: 00000000fbad8001 [ 264.558891] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000014 14:59:23 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 264.566150] R13: 00000000004c228c R14: 00000000004d3840 R15: 0000000000000002 [ 264.574041] CPU: 0 PID: 17194 Comm: syz-executor4 Not tainted 4.18.0-rc3+ #136 [ 264.581404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.590747] Call Trace: [ 264.593326] dump_stack+0x1c9/0x2b4 [ 264.596943] ? dump_stack_print_info.cold.2+0x52/0x52 [ 264.602122] ? print_usage_bug+0xc0/0xc0 [ 264.606233] should_fail.cold.4+0xa/0x1a [ 264.610279] ? trace_hardirqs_on+0x10/0x10 [ 264.614504] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 264.619609] ? find_held_lock+0x36/0x1c0 [ 264.623666] ? find_held_lock+0x36/0x1c0 [ 264.627746] ? check_same_owner+0x340/0x340 [ 264.632056] ? rcu_note_context_switch+0x730/0x730 [ 264.636972] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 264.641987] __should_failslab+0x124/0x180 [ 264.646222] should_failslab+0x9/0x14 [ 264.650011] kmem_cache_alloc+0x2af/0x760 [ 264.654171] __d_alloc+0xc8/0xd50 [ 264.657613] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 264.662624] ? do_raw_spin_unlock+0xa7/0x2f0 [ 264.667025] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 264.672146] ? __lock_is_held+0xb5/0x140 [ 264.676204] ? _raw_spin_unlock+0x22/0x30 [ 264.680336] ? __alloc_fd+0x34e/0x710 [ 264.684126] ? exit_files+0xb0/0xb0 [ 264.687741] d_alloc_pseudo+0x1d/0x30 [ 264.691543] __shmem_file_setup+0x1f3/0x700 [ 264.695852] ? check_same_owner+0x340/0x340 [ 264.700160] ? shmem_fill_super+0xa50/0xa50 [ 264.704470] ? get_unused_fd_flags+0x122/0x1a0 [ 264.709039] ? __alloc_fd+0x710/0x710 [ 264.712828] shmem_file_setup+0x2f/0x40 [ 264.716790] __x64_sys_memfd_create+0x2af/0x4f0 [ 264.721461] ? memfd_fcntl+0x1400/0x1400 [ 264.725510] ? do_syscall_64+0x9a/0x820 [ 264.729471] do_syscall_64+0x1b9/0x820 [ 264.733341] ? finish_task_switch+0x1d3/0x890 [ 264.737826] ? syscall_return_slowpath+0x5e0/0x5e0 [ 264.743091] ? syscall_return_slowpath+0x31d/0x5e0 [ 264.748014] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 264.753370] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.758201] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.763375] RIP: 0033:0x455ba9 [ 264.766544] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.785776] RSP: 002b:00007fc14091ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 264.793486] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455ba9 [ 264.800741] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004ba7f0 [ 264.808017] RBP: 000000000072bea0 R08: 0000000020000318 R09: 00000000fbad8001 [ 264.815275] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 14:59:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 264.822532] R13: 00000000004c228c R14: 00000000004d3840 R15: 0000000000000001 14:59:23 executing program 1 (fault-call:1 fault-nth:3): socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:23 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 264.930785] FAULT_INJECTION: forcing a failure. [ 264.930785] name failslab, interval 1, probability 0, space 0, times 0 [ 264.942098] CPU: 0 PID: 17207 Comm: syz-executor1 Not tainted 4.18.0-rc3+ #136 [ 264.949463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.958819] Call Trace: [ 264.961419] dump_stack+0x1c9/0x2b4 [ 264.965062] ? dump_stack_print_info.cold.2+0x52/0x52 [ 264.970269] ? __lock_acquire+0x7fc/0x5020 [ 264.974525] should_fail.cold.4+0xa/0x1a [ 264.978606] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 264.983734] ? find_held_lock+0x36/0x1c0 [ 264.987808] ? graph_lock+0x170/0x170 [ 264.991639] ? find_held_lock+0x36/0x1c0 [ 264.995731] ? check_same_owner+0x340/0x340 [ 265.000064] ? graph_lock+0x170/0x170 [ 265.003878] ? rcu_note_context_switch+0x730/0x730 [ 265.008816] ? kasan_check_read+0x11/0x20 [ 265.012981] __should_failslab+0x124/0x180 [ 265.017228] should_failslab+0x9/0x14 [ 265.021060] kmem_cache_alloc+0x2af/0x760 [ 265.025221] ? find_held_lock+0x36/0x1c0 [ 265.029301] get_empty_filp+0x12d/0x530 [ 265.033289] ? proc_nr_files+0x60/0x60 [ 265.037194] ? kasan_check_read+0x11/0x20 [ 265.041352] ? do_raw_spin_unlock+0xa7/0x2f0 [ 265.045771] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 265.050368] ? kasan_check_write+0x14/0x20 [ 265.054612] ? do_raw_spin_lock+0xc1/0x200 [ 265.058869] alloc_file+0x24/0x3e0 [ 265.062417] ? clear_nlink.part.9+0x65/0x80 [ 265.066757] __shmem_file_setup+0x313/0x700 [ 265.071085] ? check_same_owner+0x340/0x340 [ 265.075420] ? shmem_fill_super+0xa50/0xa50 [ 265.079759] ? get_unused_fd_flags+0x122/0x1a0 [ 265.084349] ? __alloc_fd+0x710/0x710 [ 265.088164] shmem_file_setup+0x2f/0x40 [ 265.092152] __x64_sys_memfd_create+0x2af/0x4f0 [ 265.096833] ? memfd_fcntl+0x1400/0x1400 [ 265.100903] ? do_syscall_64+0x9a/0x820 [ 265.104890] do_syscall_64+0x1b9/0x820 [ 265.108783] ? finish_task_switch+0x1d3/0x890 [ 265.109200] FAULT_INJECTION: forcing a failure. [ 265.109200] name failslab, interval 1, probability 0, space 0, times 0 [ 265.113309] ? syscall_return_slowpath+0x5e0/0x5e0 [ 265.113327] ? syscall_return_slowpath+0x31d/0x5e0 [ 265.113350] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 265.113369] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.113391] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.113411] RIP: 0033:0x455ba9 [ 265.152916] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 265.172231] RSP: 002b:00007fa4b741ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 265.179937] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455ba9 [ 265.187218] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004ba7f0 [ 265.194478] RBP: 000000000072bea0 R08: 0000000020000318 R09: 00000000fbad8001 [ 265.201742] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000014 [ 265.209018] R13: 00000000004c228c R14: 00000000004d3840 R15: 0000000000000003 [ 265.216301] CPU: 1 PID: 17222 Comm: syz-executor4 Not tainted 4.18.0-rc3+ #136 [ 265.223674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.233020] Call Trace: [ 265.235616] dump_stack+0x1c9/0x2b4 [ 265.239253] ? dump_stack_print_info.cold.2+0x52/0x52 [ 265.244449] ? __kernel_text_address+0xd/0x40 [ 265.248970] should_fail.cold.4+0xa/0x1a [ 265.253043] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 265.253778] FAULT_INJECTION: forcing a failure. [ 265.253778] name failslab, interval 1, probability 0, space 0, times 0 [ 265.258158] ? save_stack+0xa9/0xd0 [ 265.258175] ? save_stack+0x43/0xd0 [ 265.258191] ? kasan_kmalloc+0xc4/0xe0 [ 265.258203] ? kasan_slab_alloc+0x12/0x20 [ 265.258216] ? kmem_cache_alloc+0x12e/0x760 [ 265.258230] ? __d_alloc+0xc8/0xd50 [ 265.258254] ? d_alloc_pseudo+0x1d/0x30 [ 265.296521] ? __shmem_file_setup+0x1f3/0x700 [ 265.301010] ? shmem_file_setup+0x2f/0x40 [ 265.305158] ? find_held_lock+0x36/0x1c0 [ 265.309229] ? check_same_owner+0x340/0x340 [ 265.313545] ? rcu_note_context_switch+0x730/0x730 [ 265.318467] ? kasan_check_read+0x11/0x20 [ 265.322617] __should_failslab+0x124/0x180 [ 265.326845] should_failslab+0x9/0x14 [ 265.330638] kmem_cache_alloc+0x2af/0x760 [ 265.334784] ? rcu_read_lock_sched_held+0x108/0x120 [ 265.339795] ? kmem_cache_alloc+0x5fa/0x760 [ 265.344117] ? shmem_destroy_callback+0xc0/0xc0 [ 265.348811] shmem_alloc_inode+0x1b/0x40 [ 265.352873] alloc_inode+0x63/0x190 [ 265.356494] new_inode_pseudo+0x71/0x1a0 [ 265.360548] ? prune_icache_sb+0x1b0/0x1b0 [ 265.364779] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 265.369794] new_inode+0x1c/0x40 [ 265.373157] shmem_get_inode+0xf1/0x910 [ 265.377126] ? shmem_encode_fh+0x340/0x340 [ 265.381355] ? _raw_spin_unlock+0x22/0x30 [ 265.385512] ? __alloc_fd+0x34e/0x710 [ 265.389313] ? exit_files+0xb0/0xb0 [ 265.392937] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.398470] __shmem_file_setup+0x259/0x700 [ 265.402785] ? check_same_owner+0x340/0x340 [ 265.407106] ? shmem_fill_super+0xa50/0xa50 [ 265.411424] ? get_unused_fd_flags+0x122/0x1a0 [ 265.416001] ? __alloc_fd+0x710/0x710 [ 265.419805] shmem_file_setup+0x2f/0x40 [ 265.423794] __x64_sys_memfd_create+0x2af/0x4f0 [ 265.428459] ? memfd_fcntl+0x1400/0x1400 [ 265.432513] ? do_syscall_64+0x9a/0x820 [ 265.436485] do_syscall_64+0x1b9/0x820 [ 265.440364] ? finish_task_switch+0x1d3/0x890 [ 265.444856] ? syscall_return_slowpath+0x5e0/0x5e0 [ 265.449798] ? syscall_return_slowpath+0x31d/0x5e0 [ 265.454728] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 265.460114] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.464961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.470145] RIP: 0033:0x455ba9 14:59:24 executing program 1 (fault-call:1 fault-nth:4): socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) [ 265.473319] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 265.492631] RSP: 002b:00007fc14091ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 265.500332] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455ba9 [ 265.507592] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004ba7f0 [ 265.514853] RBP: 000000000072bea0 R08: 0000000020000318 R09: 00000000fbad8001 [ 265.522115] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 265.529374] R13: 00000000004c228c R14: 00000000004d3840 R15: 0000000000000002 [ 265.536654] CPU: 0 PID: 17228 Comm: syz-executor1 Not tainted 4.18.0-rc3+ #136 [ 265.544020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.553370] Call Trace: [ 265.555963] dump_stack+0x1c9/0x2b4 [ 265.559605] ? dump_stack_print_info.cold.2+0x52/0x52 [ 265.564802] ? __lock_acquire+0x7fc/0x5020 [ 265.569055] should_fail.cold.4+0xa/0x1a [ 265.573125] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 265.578255] ? find_held_lock+0x36/0x1c0 [ 265.582324] ? graph_lock+0x170/0x170 [ 265.586137] ? find_held_lock+0x36/0x1c0 [ 265.590220] ? check_same_owner+0x340/0x340 [ 265.594534] ? graph_lock+0x170/0x170 [ 265.598325] ? rcu_note_context_switch+0x730/0x730 [ 265.603244] ? kasan_check_read+0x11/0x20 [ 265.607384] __should_failslab+0x124/0x180 [ 265.611610] should_failslab+0x9/0x14 [ 265.615395] kmem_cache_alloc+0x2af/0x760 [ 265.619527] ? find_held_lock+0x36/0x1c0 [ 265.623581] get_empty_filp+0x12d/0x530 [ 265.627556] ? proc_nr_files+0x60/0x60 [ 265.631441] ? kasan_check_read+0x11/0x20 [ 265.635578] ? do_raw_spin_unlock+0xa7/0x2f0 [ 265.639971] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 265.644542] ? kasan_check_write+0x14/0x20 [ 265.648779] ? do_raw_spin_lock+0xc1/0x200 [ 265.653022] alloc_file+0x24/0x3e0 [ 265.656568] ? clear_nlink.part.9+0x65/0x80 [ 265.660890] __shmem_file_setup+0x313/0x700 [ 265.665198] ? check_same_owner+0x340/0x340 [ 265.669510] ? shmem_fill_super+0xa50/0xa50 [ 265.673819] ? get_unused_fd_flags+0x122/0x1a0 [ 265.678387] ? __alloc_fd+0x710/0x710 [ 265.682179] shmem_file_setup+0x2f/0x40 [ 265.686144] __x64_sys_memfd_create+0x2af/0x4f0 [ 265.690799] ? memfd_fcntl+0x1400/0x1400 [ 265.694848] ? do_syscall_64+0x9a/0x820 [ 265.698814] do_syscall_64+0x1b9/0x820 [ 265.702691] ? finish_task_switch+0x1d3/0x890 [ 265.707188] ? syscall_return_slowpath+0x5e0/0x5e0 [ 265.712103] ? syscall_return_slowpath+0x31d/0x5e0 [ 265.717028] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 265.722393] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.727226] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.732400] RIP: 0033:0x455ba9 [ 265.735597] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 265.754828] RSP: 002b:00007fa4b741ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 265.762526] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455ba9 [ 265.769784] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004ba7f0 [ 265.777042] RBP: 000000000072bea0 R08: 0000000020000318 R09: 00000000fbad8001 14:59:24 executing program 4 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 265.784297] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000014 [ 265.791598] R13: 00000000004c228c R14: 00000000004d3840 R15: 0000000000000004 [ 265.835520] FAULT_INJECTION: forcing a failure. [ 265.835520] name failslab, interval 1, probability 0, space 0, times 0 [ 265.846917] CPU: 1 PID: 17237 Comm: syz-executor4 Not tainted 4.18.0-rc3+ #136 [ 265.854279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.863631] Call Trace: [ 265.866233] dump_stack+0x1c9/0x2b4 [ 265.869877] ? dump_stack_print_info.cold.2+0x52/0x52 [ 265.875080] ? __lock_acquire+0x7fc/0x5020 [ 265.879333] should_fail.cold.4+0xa/0x1a [ 265.883407] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 265.888522] ? find_held_lock+0x36/0x1c0 [ 265.892597] ? graph_lock+0x170/0x170 [ 265.896419] ? find_held_lock+0x36/0x1c0 [ 265.900515] ? check_same_owner+0x340/0x340 [ 265.904844] ? graph_lock+0x170/0x170 [ 265.908657] ? rcu_note_context_switch+0x730/0x730 [ 265.913601] ? kasan_check_read+0x11/0x20 [ 265.917762] __should_failslab+0x124/0x180 [ 265.920594] FAULT_INJECTION: forcing a failure. [ 265.920594] name failslab, interval 1, probability 0, space 0, times 0 [ 265.922014] should_failslab+0x9/0x14 [ 265.936966] kmem_cache_alloc+0x2af/0x760 [ 265.941112] ? find_held_lock+0x36/0x1c0 [ 265.945173] get_empty_filp+0x12d/0x530 [ 265.949138] ? proc_nr_files+0x60/0x60 [ 265.953025] ? kasan_check_read+0x11/0x20 [ 265.957166] ? do_raw_spin_unlock+0xa7/0x2f0 [ 265.961564] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 265.966141] ? kasan_check_write+0x14/0x20 [ 265.970363] ? do_raw_spin_lock+0xc1/0x200 [ 265.974594] alloc_file+0x24/0x3e0 [ 265.978126] ? clear_nlink.part.9+0x65/0x80 [ 265.982443] __shmem_file_setup+0x313/0x700 [ 265.986758] ? check_same_owner+0x340/0x340 [ 265.991075] ? shmem_fill_super+0xa50/0xa50 [ 265.995391] ? get_unused_fd_flags+0x122/0x1a0 [ 265.999964] ? __alloc_fd+0x710/0x710 [ 266.003762] shmem_file_setup+0x2f/0x40 [ 266.007736] __x64_sys_memfd_create+0x2af/0x4f0 [ 266.012396] ? memfd_fcntl+0x1400/0x1400 [ 266.016452] ? do_syscall_64+0x9a/0x820 [ 266.020435] do_syscall_64+0x1b9/0x820 [ 266.024324] ? finish_task_switch+0x1d3/0x890 [ 266.028813] ? syscall_return_slowpath+0x5e0/0x5e0 [ 266.033735] ? syscall_return_slowpath+0x31d/0x5e0 [ 266.038663] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 266.044022] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.048863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.054044] RIP: 0033:0x455ba9 [ 266.057217] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.076525] RSP: 002b:00007fc14091ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 14:59:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:24 executing program 1 (fault-call:1 fault-nth:5): socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) [ 266.084230] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455ba9 [ 266.091490] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004ba7f0 [ 266.098750] RBP: 000000000072bea0 R08: 0000000020000318 R09: 00000000fbad8001 [ 266.106024] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 266.113295] R13: 00000000004c228c R14: 00000000004d3840 R15: 0000000000000003 [ 266.120575] CPU: 0 PID: 17244 Comm: syz-executor1 Not tainted 4.18.0-rc3+ #136 14:59:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 266.127942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.137291] Call Trace: [ 266.139884] dump_stack+0x1c9/0x2b4 [ 266.143515] ? dump_stack_print_info.cold.2+0x52/0x52 [ 266.148731] should_fail.cold.4+0xa/0x1a [ 266.152805] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 266.157918] ? __lock_acquire+0x7fc/0x5020 [ 266.162146] ? print_usage_bug+0xc0/0xc0 [ 266.166217] ? print_usage_bug+0xc0/0xc0 [ 266.170270] ? trace_hardirqs_on+0x10/0x10 [ 266.174511] ? lock_downgrade+0x8f0/0x8f0 [ 266.178659] ? __lock_acquire+0x7fc/0x5020 [ 266.182880] ? print_usage_bug+0xc0/0xc0 [ 266.186930] __should_failslab+0x124/0x180 [ 266.191169] should_failslab+0x9/0x14 [ 266.194958] kmem_cache_alloc+0x47/0x760 [ 266.199009] ? radix_tree_node_alloc.constprop.19+0x310/0x310 [ 266.204889] radix_tree_node_alloc.constprop.19+0x1e6/0x310 [ 266.210602] __radix_tree_create+0x4d6/0x840 [ 266.215001] ? radix_tree_maybe_preload_order+0x110/0x110 [ 266.220535] ? find_held_lock+0x36/0x1c0 [ 266.224586] ? graph_lock+0x170/0x170 [ 266.228369] ? __lock_is_held+0xb5/0x140 [ 266.232417] ? print_usage_bug+0xc0/0xc0 [ 266.236473] ? find_held_lock+0x36/0x1c0 [ 266.240526] __radix_tree_insert+0x107/0x8f0 [ 266.244920] ? graph_lock+0x170/0x170 [ 266.248718] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 266.253719] ? __radix_tree_create+0x840/0x840 [ 266.258290] ? lock_acquire+0x1e4/0x540 [ 266.262250] ? shmem_add_to_page_cache+0x49c/0xe00 [ 266.267167] ? lock_release+0xa30/0xa30 [ 266.271132] ? kasan_check_write+0x14/0x20 [ 266.275362] ? do_raw_spin_lock+0xc1/0x200 [ 266.279598] shmem_add_to_page_cache+0x988/0xe00 [ 266.284336] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 266.288744] ? shmem_put_link+0x280/0x280 [ 266.292889] ? percpu_ref_put_many+0x131/0x240 [ 266.297456] ? percpu_ref_tryget+0x2d0/0x2d0 [ 266.301855] ? mem_cgroup_try_charge+0x548/0xa70 [ 266.306599] ? mem_cgroup_protected+0xa60/0xa60 [ 266.311268] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 266.316790] ? shmem_alloc_and_acct_page+0x31a/0x820 [ 266.321881] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 266.326539] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 266.331540] ? __radix_tree_preload+0x173/0x1d0 [ 266.336199] shmem_getpage_gfp+0x81b/0x41e0 [ 266.340522] ? shmem_writepage+0x1380/0x1380 [ 266.344916] ? attach_entity_load_avg+0x860/0x860 [ 266.349751] ? print_usage_bug+0xc0/0xc0 [ 266.353800] ? __lock_acquire+0x7fc/0x5020 [ 266.358033] ? print_usage_bug+0xc0/0xc0 [ 266.362090] ? attach_entity_load_avg+0x860/0x860 [ 266.366917] ? __lock_acquire+0x7fc/0x5020 [ 266.371136] ? __lock_acquire+0x7fc/0x5020 [ 266.375357] ? check_noncircular+0x20/0x20 [ 266.379581] ? __lock_acquire+0x7fc/0x5020 [ 266.383815] ? __lock_acquire+0x7fc/0x5020 [ 266.388037] ? graph_lock+0x170/0x170 [ 266.391837] ? trace_hardirqs_on+0x10/0x10 [ 266.396054] ? print_usage_bug+0xc0/0xc0 [ 266.400098] ? find_held_lock+0x36/0x1c0 [ 266.404146] ? print_usage_bug+0xc0/0xc0 [ 266.408195] ? __lock_acquire+0x7fc/0x5020 [ 266.412415] ? print_usage_bug+0xc0/0xc0 [ 266.416473] ? __lock_acquire+0x7fc/0x5020 [ 266.420694] ? __lock_is_held+0xb5/0x140 [ 266.424743] ? __lock_acquire+0x7fc/0x5020 [ 266.428977] ? graph_lock+0x170/0x170 [ 266.432766] ? find_held_lock+0x36/0x1c0 [ 266.436818] ? print_usage_bug+0xc0/0xc0 [ 266.440873] ? lock_downgrade+0x8f0/0x8f0 [ 266.445006] ? kasan_check_read+0x11/0x20 [ 266.449157] ? lock_release+0xa30/0xa30 [ 266.453122] ? mark_held_locks+0xc9/0x160 [ 266.457256] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 266.462782] ? iov_iter_fault_in_readable+0x23d/0x460 [ 266.467956] ? copy_page_from_iter+0x890/0x890 [ 266.472529] ? __sanitizer_cov_trace_cmp8+0xd/0x20 [ 266.477454] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 266.482632] shmem_write_begin+0x110/0x1e0 [ 266.486855] generic_perform_write+0x3ae/0x6c0 [ 266.491429] ? add_page_wait_queue+0x2c0/0x2c0 [ 266.495994] ? file_update_time+0xe4/0x640 [ 266.500218] ? current_time+0x1b0/0x1b0 [ 266.504188] ? down_write+0x8f/0x130 [ 266.507892] __generic_file_write_iter+0x26e/0x630 [ 266.512810] generic_file_write_iter+0x438/0x870 [ 266.517555] ? __generic_file_write_iter+0x630/0x630 [ 266.522644] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 266.528167] ? iov_iter_init+0xc9/0x1f0 [ 266.532129] __vfs_write+0x6c6/0x9f0 [ 266.535839] ? kernel_read+0x120/0x120 [ 266.539716] ? __lock_is_held+0xb5/0x140 [ 266.543770] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.549293] ? __sb_start_write+0x17f/0x300 [ 266.553603] vfs_write+0x1f8/0x560 [ 266.557129] ksys_pwrite64+0x181/0x1b0 [ 266.561024] ? __ia32_sys_pread64+0xf0/0xf0 [ 266.565332] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 266.570857] ? fput+0x130/0x1a0 [ 266.574135] ? do_sys_ftruncate+0x44e/0x560 [ 266.578443] __x64_sys_pwrite64+0x97/0xf0 [ 266.582580] do_syscall_64+0x1b9/0x820 [ 266.586450] ? finish_task_switch+0x1d3/0x890 [ 266.590931] ? syscall_return_slowpath+0x5e0/0x5e0 [ 266.595860] ? syscall_return_slowpath+0x31d/0x5e0 [ 266.600788] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 266.606139] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.610975] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.616147] RIP: 0033:0x40fe67 [ 266.619317] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 266.638564] RSP: 002b:00007fa4b741ba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 266.646256] RAX: ffffffffffffffda RBX: 0000000020000310 RCX: 000000000040fe67 [ 266.653510] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000015 [ 266.660762] RBP: 0000000000000000 R08: 0000000020000318 R09: 00000000fbad8001 [ 266.668019] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000015 [ 266.675717] R13: 0000000000000001 R14: 00000000004d3840 R15: 0000000000000005 14:59:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:25 executing program 4 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 266.703476] BTRFS error (device loop0): superblock checksum mismatch [ 266.732936] BTRFS error (device loop0): open_ctree failed 14:59:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 266.796780] FAULT_INJECTION: forcing a failure. [ 266.796780] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 266.808703] CPU: 0 PID: 17264 Comm: syz-executor4 Not tainted 4.18.0-rc3+ #136 [ 266.816066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.825418] Call Trace: [ 266.828017] dump_stack+0x1c9/0x2b4 [ 266.831664] ? dump_stack_print_info.cold.2+0x52/0x52 [ 266.836862] ? __radix_tree_lookup+0x3dd/0x6e0 [ 266.841464] should_fail.cold.4+0xa/0x1a [ 266.845551] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 266.850664] ? __isolate_free_page+0x690/0x690 [ 266.855262] ? graph_lock+0x170/0x170 [ 266.859076] ? find_held_lock+0x36/0x1c0 [ 266.863151] ? find_held_lock+0x36/0x1c0 [ 266.867231] ? __lock_is_held+0xb5/0x140 [ 266.871318] ? check_same_owner+0x340/0x340 [ 266.875653] ? rcu_note_context_switch+0x730/0x730 [ 266.880613] __alloc_pages_nodemask+0x36e/0xdb0 [ 266.885301] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 266.890336] ? trace_hardirqs_on+0x10/0x10 [ 266.894591] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 266.899621] ? percpu_counter_add_batch+0xf2/0x150 [ 266.904571] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 266.909608] ? __vm_enough_memory+0x590/0x980 [ 266.914122] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 266.919675] alloc_pages_vma+0xdd/0x540 [ 266.923669] shmem_alloc_page+0xa8/0x190 [ 266.927738] ? shmem_swapin+0x230/0x230 [ 266.931725] ? print_usage_bug+0xc0/0xc0 [ 266.935826] shmem_alloc_and_acct_page+0x1f1/0x820 [ 266.940776] ? shmem_alloc_hugepage+0x4e0/0x4e0 14:59:25 executing program 1 (fault-call:1 fault-nth:6): socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) [ 266.945509] shmem_getpage_gfp+0x6ea/0x41e0 [ 266.949853] ? print_usage_bug+0xc0/0xc0 [ 266.953931] ? shmem_writepage+0x1380/0x1380 [ 266.958353] ? print_usage_bug+0xc0/0xc0 [ 266.962435] ? __lock_acquire+0x7fc/0x5020 [ 266.966695] ? print_usage_bug+0xc0/0xc0 [ 266.970771] ? __lock_acquire+0x7fc/0x5020 [ 266.975021] ? print_usage_bug+0xc0/0xc0 [ 266.979091] ? __lock_acquire+0x7fc/0x5020 [ 266.983329] ? __lock_acquire+0x7fc/0x5020 [ 266.987575] ? check_noncircular+0x20/0x20 [ 266.991813] ? __lock_acquire+0x7fc/0x5020 [ 266.996049] ? __lock_acquire+0x7fc/0x5020 [ 267.000285] ? trace_hardirqs_on+0x10/0x10 [ 267.004504] ? print_usage_bug+0xc0/0xc0 [ 267.008549] ? __lock_acquire+0x7fc/0x5020 [ 267.012782] ? print_usage_bug+0xc0/0xc0 [ 267.016839] ? print_usage_bug+0xc0/0xc0 [ 267.020885] ? graph_lock+0x170/0x170 [ 267.024683] ? print_usage_bug+0xc0/0xc0 [ 267.028731] ? __lock_acquire+0x7fc/0x5020 [ 267.032952] ? __lock_acquire+0x7fc/0x5020 [ 267.037185] ? graph_lock+0x170/0x170 [ 267.040974] ? find_held_lock+0x36/0x1c0 [ 267.045035] ? print_usage_bug+0xc0/0xc0 [ 267.049091] ? lock_downgrade+0x8f0/0x8f0 [ 267.053229] ? kasan_check_read+0x11/0x20 [ 267.057359] ? lock_release+0xa30/0xa30 [ 267.061329] ? mark_held_locks+0xc9/0x160 [ 267.065480] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 267.071005] ? iov_iter_fault_in_readable+0x23d/0x460 [ 267.076189] ? copy_page_from_iter+0x890/0x890 [ 267.080772] ? __sanitizer_cov_trace_cmp8+0xd/0x20 [ 267.085718] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 267.090926] shmem_write_begin+0x110/0x1e0 [ 267.095150] generic_perform_write+0x3ae/0x6c0 [ 267.099739] ? add_page_wait_queue+0x2c0/0x2c0 [ 267.104326] ? file_update_time+0xe4/0x640 [ 267.108547] ? current_time+0x1b0/0x1b0 [ 267.112514] ? down_write+0x8f/0x130 [ 267.116215] __generic_file_write_iter+0x26e/0x630 [ 267.121133] generic_file_write_iter+0x438/0x870 [ 267.125875] ? __generic_file_write_iter+0x630/0x630 [ 267.130964] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 267.136483] ? iov_iter_init+0xc9/0x1f0 [ 267.140450] __vfs_write+0x6c6/0x9f0 [ 267.144148] ? kernel_read+0x120/0x120 [ 267.148037] ? __lock_is_held+0xb5/0x140 [ 267.152092] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.157616] ? __sb_start_write+0x17f/0x300 [ 267.161952] vfs_write+0x1f8/0x560 [ 267.165478] ksys_pwrite64+0x181/0x1b0 [ 267.169361] ? __ia32_sys_pread64+0xf0/0xf0 [ 267.173679] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 267.179198] ? fput+0x130/0x1a0 [ 267.182467] ? do_sys_ftruncate+0x44e/0x560 [ 267.186784] __x64_sys_pwrite64+0x97/0xf0 [ 267.190921] do_syscall_64+0x1b9/0x820 [ 267.194801] ? finish_task_switch+0x1d3/0x890 [ 267.199293] ? syscall_return_slowpath+0x5e0/0x5e0 [ 267.204227] ? syscall_return_slowpath+0x31d/0x5e0 [ 267.209147] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 267.214500] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.219328] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.224501] RIP: 0033:0x40fe67 [ 267.227673] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 267.246859] RSP: 002b:00007fc14091ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 267.254550] RAX: ffffffffffffffda RBX: 0000000020000310 RCX: 000000000040fe67 [ 267.261803] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000014 [ 267.269068] RBP: 0000000000000000 R08: 0000000020000318 R09: 00000000fbad8001 [ 267.276320] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 267.283582] R13: 0000000000000001 R14: 00000000004d3840 R15: 0000000000000004 [ 267.299180] FAULT_INJECTION: forcing a failure. [ 267.299180] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 267.311001] CPU: 1 PID: 17279 Comm: syz-executor1 Not tainted 4.18.0-rc3+ #136 [ 267.318352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.327692] Call Trace: [ 267.330289] dump_stack+0x1c9/0x2b4 [ 267.333904] ? dump_stack_print_info.cold.2+0x52/0x52 [ 267.339088] should_fail.cold.4+0xa/0x1a [ 267.343135] ? find_held_lock+0x36/0x1c0 [ 267.347205] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 267.352298] ? lock_downgrade+0x8f0/0x8f0 [ 267.356450] ? find_held_lock+0x36/0x1c0 [ 267.360498] ? graph_lock+0x170/0x170 [ 267.364297] ? lock_acquire+0x1e4/0x540 [ 267.368262] ? lock_downgrade+0x8f0/0x8f0 [ 267.372409] __alloc_pages_nodemask+0x36e/0xdb0 [ 267.377067] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 267.382081] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 267.386497] ? rcu_read_unlock+0x35/0x70 [ 267.390546] ? mem_cgroup_handle_over_high+0x130/0x130 [ 267.395818] ? print_usage_bug+0xc0/0xc0 [ 267.399863] ? print_usage_bug+0xc0/0xc0 [ 267.403913] ? lock_downgrade+0x8f0/0x8f0 [ 267.408059] ? __lock_acquire+0x7fc/0x5020 [ 267.412294] ? kasan_unpoison_shadow+0x35/0x50 [ 267.416864] cache_grow_begin+0x91/0x710 [ 267.420915] kmem_cache_alloc+0x689/0x760 [ 267.425053] ? radix_tree_node_alloc.constprop.19+0x310/0x310 [ 267.430933] radix_tree_node_alloc.constprop.19+0x1e6/0x310 [ 267.436633] __radix_tree_create+0x4d6/0x840 [ 267.441035] ? radix_tree_maybe_preload_order+0x110/0x110 [ 267.446559] ? find_held_lock+0x36/0x1c0 [ 267.450609] ? graph_lock+0x170/0x170 [ 267.454393] ? __lock_is_held+0xb5/0x140 [ 267.458441] ? print_usage_bug+0xc0/0xc0 [ 267.462498] ? find_held_lock+0x36/0x1c0 [ 267.466545] __radix_tree_insert+0x107/0x8f0 [ 267.470940] ? graph_lock+0x170/0x170 [ 267.474726] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 267.479729] ? __radix_tree_create+0x840/0x840 [ 267.484297] ? lock_acquire+0x1e4/0x540 [ 267.488276] ? shmem_add_to_page_cache+0x49c/0xe00 [ 267.493196] ? lock_release+0xa30/0xa30 [ 267.497159] ? kasan_check_write+0x14/0x20 [ 267.501379] ? do_raw_spin_lock+0xc1/0x200 [ 267.505615] shmem_add_to_page_cache+0x988/0xe00 [ 267.510357] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 267.514754] ? shmem_put_link+0x280/0x280 [ 267.518887] ? percpu_ref_put_many+0x131/0x240 [ 267.523467] ? percpu_ref_tryget+0x2d0/0x2d0 [ 267.527867] ? mem_cgroup_try_charge+0x548/0xa70 [ 267.532613] ? mem_cgroup_protected+0xa60/0xa60 [ 267.537284] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 267.542809] ? shmem_alloc_and_acct_page+0x31a/0x820 [ 267.547919] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 267.552577] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 267.557590] ? __radix_tree_preload+0x173/0x1d0 [ 267.562248] shmem_getpage_gfp+0x81b/0x41e0 [ 267.566567] ? shmem_writepage+0x1380/0x1380 [ 267.570962] ? print_usage_bug+0xc0/0xc0 [ 267.575012] ? __lock_acquire+0x7fc/0x5020 [ 267.579250] ? print_usage_bug+0xc0/0xc0 [ 267.583297] ? __lock_acquire+0x7fc/0x5020 [ 267.587532] ? print_usage_bug+0xc0/0xc0 [ 267.591581] ? __lock_acquire+0x7fc/0x5020 [ 267.595801] ? __lock_acquire+0x7fc/0x5020 [ 267.600030] ? check_noncircular+0x20/0x20 [ 267.604251] ? __lock_acquire+0x7fc/0x5020 [ 267.608474] ? __lock_acquire+0x7fc/0x5020 [ 267.612715] ? trace_hardirqs_on+0x10/0x10 [ 267.616937] ? print_usage_bug+0xc0/0xc0 [ 267.620986] ? __lock_acquire+0x7fc/0x5020 [ 267.625220] ? print_usage_bug+0xc0/0xc0 [ 267.629267] ? print_usage_bug+0xc0/0xc0 [ 267.633312] ? graph_lock+0x170/0x170 [ 267.637101] ? print_usage_bug+0xc0/0xc0 [ 267.641152] ? __lock_acquire+0x7fc/0x5020 [ 267.645389] ? __lock_acquire+0x7fc/0x5020 [ 267.649614] ? graph_lock+0x170/0x170 [ 267.653413] ? find_held_lock+0x36/0x1c0 [ 267.657463] ? print_usage_bug+0xc0/0xc0 [ 267.661517] ? lock_downgrade+0x8f0/0x8f0 [ 267.665651] ? kasan_check_read+0x11/0x20 [ 267.669787] ? lock_release+0xa30/0xa30 [ 267.673751] ? mark_held_locks+0xc9/0x160 [ 267.677888] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 267.683427] ? iov_iter_fault_in_readable+0x23d/0x460 [ 267.688613] ? copy_page_from_iter+0x890/0x890 [ 267.693179] ? __sanitizer_cov_trace_cmp8+0xd/0x20 [ 267.698097] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 267.703273] shmem_write_begin+0x110/0x1e0 [ 267.707499] generic_perform_write+0x3ae/0x6c0 [ 267.712075] ? add_page_wait_queue+0x2c0/0x2c0 [ 267.716644] ? file_update_time+0xe4/0x640 [ 267.720864] ? current_time+0x1b0/0x1b0 [ 267.724829] ? down_write+0x8f/0x130 [ 267.728531] __generic_file_write_iter+0x26e/0x630 [ 267.733451] generic_file_write_iter+0x438/0x870 [ 267.738207] ? __generic_file_write_iter+0x630/0x630 [ 267.743307] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 267.748829] ? iov_iter_init+0xc9/0x1f0 [ 267.752789] __vfs_write+0x6c6/0x9f0 [ 267.756491] ? kernel_read+0x120/0x120 [ 267.760366] ? __lock_is_held+0xb5/0x140 [ 267.764419] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.769943] ? __sb_start_write+0x17f/0x300 [ 267.774253] vfs_write+0x1f8/0x560 [ 267.777798] ksys_pwrite64+0x181/0x1b0 [ 267.781685] ? __ia32_sys_pread64+0xf0/0xf0 [ 267.785993] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 267.791516] ? fput+0x130/0x1a0 [ 267.794785] ? do_sys_ftruncate+0x44e/0x560 [ 267.799092] __x64_sys_pwrite64+0x97/0xf0 [ 267.803227] do_syscall_64+0x1b9/0x820 [ 267.807109] ? finish_task_switch+0x1d3/0x890 [ 267.811592] ? syscall_return_slowpath+0x5e0/0x5e0 [ 267.816507] ? syscall_return_slowpath+0x31d/0x5e0 [ 267.821430] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 267.826781] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.831625] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.836798] RIP: 0033:0x40fe67 [ 267.839966] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 267.859215] RSP: 002b:00007fa4b741ba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 267.866911] RAX: ffffffffffffffda RBX: 0000000020000310 RCX: 000000000040fe67 [ 267.874163] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000015 [ 267.881416] RBP: 0000000000000000 R08: 0000000020000318 R09: 00000000fbad8001 [ 267.888672] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000015 14:59:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 267.895925] R13: 0000000000000001 R14: 00000000004d3840 R15: 0000000000000006 14:59:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)="627472667306", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btr.s\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 268.012202] BTRFS error (device loop1): superblock checksum mismatch 14:59:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 268.067325] BTRFS error (device loop1): open_ctree failed 14:59:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btr/s\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:27 executing program 7 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getsockopt(0xffffffffffffffff, 0x114, 0x2711, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0x19a) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='\\]vmnet0@lo,/\x00', 0xffffffffffffff9c}, 0x10) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f00000000c0)=""/249, &(0x7f00000001c0)=0xf9) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000080)) 14:59:27 executing program 6: clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) futex(&(0x7f000000cffc)=0x4, 0x800000000008, 0x4, &(0x7f0000000040)={r0, r1+10000000}, &(0x7f0000000080), 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, &(0x7f0000000000)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) 14:59:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 268.186653] FAULT_INJECTION: forcing a failure. [ 268.186653] name failslab, interval 1, probability 0, space 0, times 0 [ 268.197973] CPU: 0 PID: 17331 Comm: syz-executor7 Not tainted 4.18.0-rc3+ #136 [ 268.205343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.214703] Call Trace: [ 268.217310] dump_stack+0x1c9/0x2b4 [ 268.220958] ? dump_stack_print_info.cold.2+0x52/0x52 [ 268.226174] should_fail.cold.4+0xa/0x1a [ 268.230256] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.235382] ? lock_downgrade+0x8f0/0x8f0 [ 268.239551] ? proc_fail_nth_write+0x9e/0x210 [ 268.244058] ? proc_cwd_link+0x1d0/0x1d0 [ 268.248144] ? find_held_lock+0x36/0x1c0 [ 268.252237] ? check_same_owner+0x340/0x340 [ 268.256575] ? rcu_note_context_switch+0x730/0x730 [ 268.261521] __should_failslab+0x124/0x180 [ 268.265774] should_failslab+0x9/0x14 [ 268.269588] __kmalloc+0x2c8/0x760 [ 268.273141] ? strncpy_from_user+0x510/0x510 [ 268.277561] ? fput+0x130/0x1a0 [ 268.280853] ? __x64_sys_memfd_create+0x142/0x4f0 [ 268.285814] __x64_sys_memfd_create+0x142/0x4f0 [ 268.290495] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 268.296042] ? memfd_fcntl+0x1400/0x1400 [ 268.300115] ? do_syscall_64+0x9a/0x820 [ 268.304110] do_syscall_64+0x1b9/0x820 [ 268.308006] ? finish_task_switch+0x1d3/0x890 [ 268.312519] ? syscall_return_slowpath+0x5e0/0x5e0 [ 268.317461] ? syscall_return_slowpath+0x31d/0x5e0 [ 268.322407] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 268.327786] ? trace_hardirqs_off_thunk+0x1a/0x1c 14:59:27 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x40) ioctl$TIOCSTI(r0, 0x5412, 0x0) 14:59:27 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="24000000100007031dfffd946fa2830020200a0009000300001c85680c1ba3a20400ff7e28000000020affffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) [ 268.332640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.337829] RIP: 0033:0x455ba9 [ 268.341018] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.360412] RSP: 002b:00007f258d161a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 268.368130] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455ba9 [ 268.375403] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004ba7f0 14:59:27 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:27 executing program 7 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 268.382677] RBP: 000000000072bea0 R08: 0000000020000318 R09: 00000000fbad8001 [ 268.389949] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 268.397221] R13: 00000000004c228c R14: 00000000004d3840 R15: 0000000000000000 [ 268.463617] FAULT_INJECTION: forcing a failure. [ 268.463617] name failslab, interval 1, probability 0, space 0, times 0 [ 268.474935] CPU: 0 PID: 17355 Comm: syz-executor7 Not tainted 4.18.0-rc3+ #136 [ 268.482301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.491668] Call Trace: [ 268.494276] dump_stack+0x1c9/0x2b4 [ 268.497923] ? dump_stack_print_info.cold.2+0x52/0x52 [ 268.503127] ? print_usage_bug+0xc0/0xc0 [ 268.507210] should_fail.cold.4+0xa/0x1a [ 268.511285] ? trace_hardirqs_on+0x10/0x10 [ 268.515541] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.520665] ? find_held_lock+0x36/0x1c0 [ 268.524747] ? find_held_lock+0x36/0x1c0 [ 268.528844] ? check_same_owner+0x340/0x340 [ 268.533182] ? rcu_note_context_switch+0x730/0x730 [ 268.538121] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 268.543150] __should_failslab+0x124/0x180 [ 268.547399] should_failslab+0x9/0x14 [ 268.551212] kmem_cache_alloc+0x2af/0x760 [ 268.555383] __d_alloc+0xc8/0xd50 [ 268.558851] ? shrink_dcache_for_umount+0x2b0/0x2b0 14:59:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x5d, &(0x7f0000000580), 0x0) uname(&(0x7f00000000c0)=""/119) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REGS(r3, 0x8090ae81, &(0x7f00000002c0)) 14:59:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:27 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000680)={[{@resize_auto='resize=auto', 0x2c}]}) [ 268.563870] ? do_raw_spin_unlock+0xa7/0x2f0 [ 268.568281] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 268.572875] ? __lock_is_held+0xb5/0x140 [ 268.573350] netlink: 20 bytes leftover after parsing attributes in process `syz-executor6'. [ 268.576961] ? _raw_spin_unlock+0x22/0x30 [ 268.576980] ? __alloc_fd+0x34e/0x710 [ 268.577005] ? exit_files+0xb0/0xb0 [ 268.597095] d_alloc_pseudo+0x1d/0x30 [ 268.600889] __shmem_file_setup+0x1f3/0x700 [ 268.605205] ? check_same_owner+0x340/0x340 [ 268.609528] ? shmem_fill_super+0xa50/0xa50 [ 268.613859] ? get_unused_fd_flags+0x122/0x1a0 [ 268.618444] ? __alloc_fd+0x710/0x710 [ 268.622253] shmem_file_setup+0x2f/0x40 [ 268.626215] __x64_sys_memfd_create+0x2af/0x4f0 [ 268.630881] ? memfd_fcntl+0x1400/0x1400 [ 268.634940] ? do_syscall_64+0x9a/0x820 [ 268.638909] do_syscall_64+0x1b9/0x820 [ 268.642788] ? syscall_slow_exit_work+0x500/0x500 [ 268.647623] ? syscall_return_slowpath+0x5e0/0x5e0 [ 268.652550] ? syscall_return_slowpath+0x31d/0x5e0 [ 268.657480] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 268.662841] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.667680] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.673374] RIP: 0033:0x455ba9 [ 268.676546] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.695731] RSP: 002b:00007f258d161a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 268.703426] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455ba9 [ 268.710677] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004ba7f0 [ 268.717935] RBP: 000000000072bea0 R08: 0000000020000318 R09: 00000000fbad8001 [ 268.725192] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 268.732445] R13: 00000000004c228c R14: 00000000004d3840 R15: 0000000000000001 14:59:27 executing program 7 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 268.781942] BTRFS error (device loop1): superblock checksum mismatch [ 268.819259] BTRFS error (device loop1): open_ctree failed [ 268.830572] print_req_error: I/O error, dev loop2, sector 128 14:59:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf-\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 268.879438] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 268.888971] FAULT_INJECTION: forcing a failure. [ 268.888971] name failslab, interval 1, probability 0, space 0, times 0 [ 268.900303] CPU: 0 PID: 17388 Comm: syz-executor7 Not tainted 4.18.0-rc3+ #136 [ 268.907670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.917024] Call Trace: [ 268.919628] dump_stack+0x1c9/0x2b4 [ 268.923284] ? dump_stack_print_info.cold.2+0x52/0x52 14:59:27 executing program 6: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000240)=ANY=[]) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) ioctl(r0, 0x1, &(0x7f0000000000)="a0040ad8") [ 268.928505] ? __kernel_text_address+0xd/0x40 [ 268.933020] should_fail.cold.4+0xa/0x1a [ 268.937109] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.942228] ? save_stack+0xa9/0xd0 [ 268.945867] ? save_stack+0x43/0xd0 [ 268.949496] ? kasan_kmalloc+0xc4/0xe0 [ 268.953375] ? kasan_slab_alloc+0x12/0x20 [ 268.957517] ? kmem_cache_alloc+0x12e/0x760 [ 268.961831] ? __d_alloc+0xc8/0xd50 [ 268.965444] ? d_alloc_pseudo+0x1d/0x30 [ 268.969406] ? __shmem_file_setup+0x1f3/0x700 [ 268.973885] ? shmem_file_setup+0x2f/0x40 [ 268.978030] ? find_held_lock+0x36/0x1c0 [ 268.982084] ? ZSTD_compressBlock_btopt_extDict+0x1b30/0x88f0 [ 268.987960] ? check_same_owner+0x340/0x340 [ 268.992269] ? rcu_note_context_switch+0x730/0x730 [ 268.997188] ? kasan_check_read+0x11/0x20 [ 269.001328] __should_failslab+0x124/0x180 [ 269.005552] should_failslab+0x9/0x14 [ 269.009358] kmem_cache_alloc+0x2af/0x760 [ 269.013514] ? rcu_read_lock_sched_held+0x108/0x120 [ 269.018520] ? kmem_cache_alloc+0x5fa/0x760 [ 269.022829] ? shmem_destroy_callback+0xc0/0xc0 [ 269.027501] shmem_alloc_inode+0x1b/0x40 [ 269.031553] alloc_inode+0x63/0x190 [ 269.035166] new_inode_pseudo+0x71/0x1a0 [ 269.039219] ? prune_icache_sb+0x1b0/0x1b0 [ 269.043441] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 269.048463] new_inode+0x1c/0x40 [ 269.051818] shmem_get_inode+0xf1/0x910 [ 269.055784] ? shmem_encode_fh+0x340/0x340 [ 269.060006] ? _raw_spin_unlock+0x22/0x30 [ 269.064142] ? __alloc_fd+0x34e/0x710 [ 269.068024] ? exit_files+0xb0/0xb0 [ 269.071641] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.077179] __shmem_file_setup+0x259/0x700 [ 269.081485] ? check_same_owner+0x340/0x340 [ 269.085796] ? shmem_fill_super+0xa50/0xa50 [ 269.090104] ? get_unused_fd_flags+0x122/0x1a0 [ 269.094669] ? __alloc_fd+0x710/0x710 [ 269.098457] shmem_file_setup+0x2f/0x40 [ 269.102421] __x64_sys_memfd_create+0x2af/0x4f0 [ 269.107079] ? memfd_fcntl+0x1400/0x1400 [ 269.111125] ? do_syscall_64+0x9a/0x820 [ 269.115087] do_syscall_64+0x1b9/0x820 [ 269.118958] ? finish_task_switch+0x1d3/0x890 [ 269.123439] ? syscall_return_slowpath+0x5e0/0x5e0 [ 269.128356] ? syscall_return_slowpath+0x31d/0x5e0 [ 269.133279] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 269.138644] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.143479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.148650] RIP: 0033:0x455ba9 [ 269.151823] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.171072] RSP: 002b:00007f258d161a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 14:59:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 269.178765] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455ba9 [ 269.186032] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004ba7f0 [ 269.193286] RBP: 000000000072bea0 R08: 0000000020000318 R09: 00000000fbad8001 [ 269.200537] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 269.207789] R13: 00000000004c228c R14: 00000000004d3840 R15: 0000000000000002 14:59:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 269.312891] EXT4-fs warning (device sda1): ext4_block_to_path:107: block 3624535200 > max in inode 16559 14:59:28 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='.trfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfX\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:28 executing program 7 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 269.354016] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 269.448827] FAULT_INJECTION: forcing a failure. [ 269.448827] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 269.460692] CPU: 1 PID: 17430 Comm: syz-executor7 Not tainted 4.18.0-rc3+ #136 [ 269.468059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.477416] Call Trace: [ 269.480023] dump_stack+0x1c9/0x2b4 [ 269.483671] ? dump_stack_print_info.cold.2+0x52/0x52 [ 269.488939] ? __lock_acquire+0x7fc/0x5020 [ 269.493187] should_fail.cold.4+0xa/0x1a [ 269.497240] ? find_held_lock+0x36/0x1c0 [ 269.501296] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 269.506390] ? lock_downgrade+0x8f0/0x8f0 [ 269.510531] ? find_held_lock+0x36/0x1c0 [ 269.514579] ? graph_lock+0x170/0x170 [ 269.518374] ? lock_acquire+0x1e4/0x540 [ 269.522338] ? lock_downgrade+0x8f0/0x8f0 [ 269.526487] __alloc_pages_nodemask+0x36e/0xdb0 [ 269.531144] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 269.536145] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 269.540547] ? rcu_read_unlock+0x35/0x70 [ 269.544605] ? check_same_owner+0x340/0x340 [ 269.548929] cache_grow_begin+0x91/0x710 [ 269.552992] kmem_cache_alloc+0x689/0x760 [ 269.557131] ? rcu_read_lock_sched_held+0x108/0x120 [ 269.562135] ? shmem_destroy_callback+0xc0/0xc0 [ 269.566790] shmem_alloc_inode+0x1b/0x40 [ 269.570840] alloc_inode+0x63/0x190 [ 269.574457] new_inode_pseudo+0x71/0x1a0 [ 269.578503] ? prune_icache_sb+0x1b0/0x1b0 [ 269.582725] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 269.587737] new_inode+0x1c/0x40 [ 269.591097] shmem_get_inode+0xf1/0x910 [ 269.595059] ? shmem_encode_fh+0x340/0x340 [ 269.599279] ? _raw_spin_unlock+0x22/0x30 [ 269.603419] ? __alloc_fd+0x34e/0x710 [ 269.607212] ? exit_files+0xb0/0xb0 [ 269.610830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.616358] __shmem_file_setup+0x259/0x700 [ 269.620678] ? check_same_owner+0x340/0x340 [ 269.624997] ? shmem_fill_super+0xa50/0xa50 [ 269.629311] ? get_unused_fd_flags+0x122/0x1a0 [ 269.633888] ? __alloc_fd+0x710/0x710 [ 269.637680] shmem_file_setup+0x2f/0x40 [ 269.641640] __x64_sys_memfd_create+0x2af/0x4f0 [ 269.646306] ? memfd_fcntl+0x1400/0x1400 [ 269.650373] ? do_syscall_64+0x9a/0x820 [ 269.654337] do_syscall_64+0x1b9/0x820 [ 269.658210] ? finish_task_switch+0x1d3/0x890 [ 269.662710] ? syscall_return_slowpath+0x5e0/0x5e0 [ 269.667634] ? syscall_return_slowpath+0x31d/0x5e0 [ 269.672556] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 269.677920] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.682753] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.687929] RIP: 0033:0x455ba9 [ 269.691101] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.710334] RSP: 002b:00007f258d161a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 269.718029] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000455ba9 [ 269.725284] RDX: 0000000020000318 RSI: 0000000000000000 RDI: 00000000004ba7f0 [ 269.732537] RBP: 000000000072bea0 R08: 0000000020000318 R09: 00000000fbad8001 [ 269.739789] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 269.747055] R13: 00000000004c228c R14: 00000000004d3840 R15: 0000000000000003 14:59:28 executing program 6: unshare(0x400) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x2) getsockopt(r1, 0x0, 0xce, &(0x7f0000000080)=""/203, &(0x7f0000000000)=0xcb) 14:59:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendmsg(r0, &(0x7f0000000340)={&(0x7f0000000100)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "61351d643b369955f251624eb015f8e92363918062fb550c3e287e3258a54bf24acbf5d0d0603550316c4ea957f8daa8354a08eaa4fdcd5f8c22c7d79e0283"}, 0x80, &(0x7f0000000400)=[{&(0x7f0000001400)="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", 0x387}], 0x1, &(0x7f0000002400)=[{0xb8, 0x111, 0x1, "cf9dd4f9143fdb63cf0f4a1397cf1e9241b6b034bbf9097c0a91a3798994a8558621061cbdb80b77d5f14b918fe79decf69af1983b9d20fd4c44fe66570434480b4df703f755e815a423f7ba82a56e061d350587999039fb6d0c769dabe1219df33b20119aaca794ccbca4fca9b8f29ea833c236231fc5c9149acb66eb95e1951342929a65197e6caeaa37f87ac02f62e535db08146a0060c8f1164fef21197891aa70ac091f"}, {0xc0, 0x19d, 0x7fffffff, "87dc1dd13f964271170bd3eb588aab55a4a9f6919741aa555d0619d9c180ff5b31ee0abeb39190b01be3663b7333df493c8e4baea00383f83bf3c91ce1d6529ebdfcdf5a21fede7669eb43d9a95485e42388de7e1d782d84c5ebdcb70ae1841890de7d26857b251637a3095d457ca7f6c25ef512e88ea5303e451a943165f99d64f5cdac80c65da01332617ae80c9e3e774c8ab64a3c8cc6a2aed1406bdd839b9b0f5605eb1e533e79"}, {0xa8, 0x0, 0x200, "e30c6b75535ae570e68b157b0de4c6ef01e32dfbd6d3c268e81d0aa55dc8ebfebd9b09a4dd8db274cfb74c5d8518d96245c3e0dfe7c74b3dddb4b1f5e5df73ad14161b085a81fb8ebc633efcda6b458efa3cd684a559b7376e47f17e710e2acf1662229b22637ba16fb54ab1ef010f55f90a3e77bad5613cd416d6d3ffba99fb544610ff590e1fa9ff25c92d3c32b36c9c50f7e4"}, {0x1010, 0x84, 0x2, "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"}], 0x1230, 0x20000000}, 0x40) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x19fd, 0x124) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x2) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)="01", 0x1}], 0x1}, 0x0) 14:59:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:28 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='/trfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) [ 269.920463] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:59:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="390000001100094701bb61e1c30500ff0700000002000000d7efffff08009b0019001a000f00000073544ec00000000004e9f50006000d0005", 0x39}], 0x1) 14:59:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfx\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:29 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="720af8ff40000000bfa100000000000007010000f8ffffffb702000000000000bf13000000000000850000002d000000b7000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00'}, 0x48) 14:59:29 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='\ntrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x8) 14:59:29 executing program 7 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 270.286794] FAULT_INJECTION: forcing a failure. [ 270.286794] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 270.298765] CPU: 0 PID: 17519 Comm: syz-executor7 Not tainted 4.18.0-rc3+ #136 [ 270.306135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.315496] Call Trace: [ 270.318101] dump_stack+0x1c9/0x2b4 [ 270.321745] ? dump_stack_print_info.cold.2+0x52/0x52 [ 270.326950] ? __radix_tree_lookup+0x3dd/0x6e0 [ 270.331554] should_fail.cold.4+0xa/0x1a [ 270.335617] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 270.340711] ? __isolate_free_page+0x690/0x690 [ 270.345291] ? graph_lock+0x170/0x170 [ 270.349087] ? find_held_lock+0x36/0x1c0 [ 270.353139] ? find_held_lock+0x36/0x1c0 [ 270.357192] ? __lock_is_held+0xb5/0x140 [ 270.361248] ? check_same_owner+0x340/0x340 [ 270.365558] ? rcu_note_context_switch+0x730/0x730 [ 270.370481] __alloc_pages_nodemask+0x36e/0xdb0 [ 270.375141] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 270.380191] ? trace_hardirqs_on+0x10/0x10 [ 270.384420] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 270.389424] ? percpu_counter_add_batch+0xf2/0x150 [ 270.394343] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 270.399348] ? __vm_enough_memory+0x590/0x980 [ 270.403837] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 270.409374] alloc_pages_vma+0xdd/0x540 [ 270.413341] shmem_alloc_page+0xa8/0x190 [ 270.417389] ? shmem_swapin+0x230/0x230 [ 270.421360] ? print_usage_bug+0xc0/0xc0 [ 270.425427] shmem_alloc_and_acct_page+0x1f1/0x820 [ 270.430351] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 270.435035] shmem_getpage_gfp+0x6ea/0x41e0 [ 270.439355] ? print_usage_bug+0xc0/0xc0 [ 270.443408] ? shmem_writepage+0x1380/0x1380 [ 270.447805] ? print_usage_bug+0xc0/0xc0 [ 270.451855] ? __lock_acquire+0x7fc/0x5020 [ 270.456081] ? print_usage_bug+0xc0/0xc0 [ 270.460128] ? __lock_acquire+0x7fc/0x5020 [ 270.464350] ? print_usage_bug+0xc0/0xc0 [ 270.468396] ? __lock_acquire+0x7fc/0x5020 [ 270.472618] ? __lock_acquire+0x7fc/0x5020 [ 270.476842] ? check_noncircular+0x20/0x20 [ 270.481066] ? __lock_acquire+0x7fc/0x5020 [ 270.485291] ? __lock_acquire+0x7fc/0x5020 [ 270.489520] ? trace_hardirqs_on+0x10/0x10 [ 270.493738] ? print_usage_bug+0xc0/0xc0 [ 270.497785] ? __lock_acquire+0x7fc/0x5020 [ 270.502019] ? print_usage_bug+0xc0/0xc0 [ 270.506072] ? print_usage_bug+0xc0/0xc0 [ 270.510129] ? graph_lock+0x170/0x170 [ 270.513946] ? print_usage_bug+0xc0/0xc0 [ 270.517992] ? __lock_acquire+0x7fc/0x5020 [ 270.522220] ? __lock_acquire+0x7fc/0x5020 [ 270.526444] ? graph_lock+0x170/0x170 [ 270.530233] ? find_held_lock+0x36/0x1c0 [ 270.534285] ? print_usage_bug+0xc0/0xc0 [ 270.538335] ? lock_downgrade+0x8f0/0x8f0 [ 270.542469] ? kasan_check_read+0x11/0x20 [ 270.546606] ? lock_release+0xa30/0xa30 [ 270.550568] ? mark_held_locks+0xc9/0x160 [ 270.554704] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 270.560229] ? iov_iter_fault_in_readable+0x23d/0x460 [ 270.565415] ? copy_page_from_iter+0x890/0x890 [ 270.569982] ? __sanitizer_cov_trace_cmp8+0xd/0x20 [ 270.574900] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 270.580088] shmem_write_begin+0x110/0x1e0 [ 270.584325] generic_perform_write+0x3ae/0x6c0 [ 270.588903] ? add_page_wait_queue+0x2c0/0x2c0 [ 270.593471] ? file_update_time+0xe4/0x640 [ 270.597690] ? current_time+0x1b0/0x1b0 [ 270.601656] ? down_write+0x8f/0x130 [ 270.605362] __generic_file_write_iter+0x26e/0x630 [ 270.610284] generic_file_write_iter+0x438/0x870 [ 270.615034] ? __generic_file_write_iter+0x630/0x630 [ 270.620126] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 270.625653] ? iov_iter_init+0xc9/0x1f0 [ 270.629619] __vfs_write+0x6c6/0x9f0 [ 270.633323] ? kernel_read+0x120/0x120 [ 270.637199] ? __lock_is_held+0xb5/0x140 [ 270.641255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.646779] ? __sb_start_write+0x17f/0x300 [ 270.651089] vfs_write+0x1f8/0x560 [ 270.654616] ksys_pwrite64+0x181/0x1b0 [ 270.658490] ? __ia32_sys_pread64+0xf0/0xf0 [ 270.662810] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 270.668331] ? fput+0x130/0x1a0 [ 270.671598] ? do_sys_ftruncate+0x44e/0x560 [ 270.675906] __x64_sys_pwrite64+0x97/0xf0 [ 270.680042] do_syscall_64+0x1b9/0x820 [ 270.683931] ? finish_task_switch+0x1d3/0x890 [ 270.688429] ? syscall_return_slowpath+0x5e0/0x5e0 [ 270.693360] ? syscall_return_slowpath+0x31d/0x5e0 [ 270.698280] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 270.703631] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.708462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.713635] RIP: 0033:0x40fe67 [ 270.716819] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 14:59:29 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='%trfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="627472667305", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 270.736061] RSP: 002b:00007f258d161a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 270.743754] RAX: ffffffffffffffda RBX: 0000000020000310 RCX: 000000000040fe67 [ 270.751009] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000014 [ 270.759175] RBP: 0000000000000000 R08: 0000000020000318 R09: 00000000fbad8001 [ 270.766434] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 270.773685] R13: 0000000000000001 R14: 00000000004d3840 R15: 0000000000000004 14:59:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$setname(0xf, &(0x7f0000000140)='vboxnet1\v\x00securityeth1vmnet1\x00') 14:59:29 executing program 7 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:29 executing program 6: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x41, &(0x7f0000000040), 0x4) [ 271.000324] FAULT_INJECTION: forcing a failure. [ 271.000324] name failslab, interval 1, probability 0, space 0, times 0 [ 271.011580] CPU: 0 PID: 17550 Comm: syz-executor7 Not tainted 4.18.0-rc3+ #136 [ 271.018945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.028299] Call Trace: [ 271.030880] dump_stack+0x1c9/0x2b4 [ 271.034497] ? dump_stack_print_info.cold.2+0x52/0x52 [ 271.039681] should_fail.cold.4+0xa/0x1a [ 271.043743] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 271.048841] ? __lock_acquire+0x7fc/0x5020 [ 271.053065] ? print_usage_bug+0xc0/0xc0 [ 271.057129] ? print_usage_bug+0xc0/0xc0 [ 271.061179] ? trace_hardirqs_on+0x10/0x10 [ 271.065402] ? lock_downgrade+0x8f0/0x8f0 [ 271.069554] ? __lock_acquire+0x7fc/0x5020 [ 271.073784] ? print_usage_bug+0xc0/0xc0 [ 271.077837] __should_failslab+0x124/0x180 [ 271.082080] should_failslab+0x9/0x14 [ 271.085874] kmem_cache_alloc+0x47/0x760 [ 271.089924] ? radix_tree_node_alloc.constprop.19+0x310/0x310 [ 271.095804] radix_tree_node_alloc.constprop.19+0x1e6/0x310 [ 271.101522] __radix_tree_create+0x4d6/0x840 [ 271.105925] ? radix_tree_maybe_preload_order+0x110/0x110 [ 271.111454] ? find_held_lock+0x36/0x1c0 [ 271.115502] ? graph_lock+0x170/0x170 [ 271.119310] ? __lock_is_held+0xb5/0x140 [ 271.123359] ? print_usage_bug+0xc0/0xc0 [ 271.127418] ? find_held_lock+0x36/0x1c0 [ 271.131469] __radix_tree_insert+0x107/0x8f0 [ 271.135866] ? graph_lock+0x170/0x170 [ 271.139655] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 271.144659] ? __radix_tree_create+0x840/0x840 [ 271.149232] ? lock_acquire+0x1e4/0x540 [ 271.153196] ? shmem_add_to_page_cache+0x49c/0xe00 [ 271.158142] ? lock_release+0xa30/0xa30 [ 271.162116] ? kasan_check_write+0x14/0x20 [ 271.166341] ? do_raw_spin_lock+0xc1/0x200 [ 271.170565] shmem_add_to_page_cache+0x988/0xe00 [ 271.175319] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 271.179721] ? shmem_put_link+0x280/0x280 [ 271.184037] ? percpu_ref_put_many+0x131/0x240 [ 271.188605] ? percpu_ref_tryget+0x2d0/0x2d0 [ 271.193007] ? mem_cgroup_try_charge+0x548/0xa70 [ 271.197758] ? mem_cgroup_protected+0xa60/0xa60 [ 271.202429] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 271.207951] ? shmem_alloc_and_acct_page+0x31a/0x820 [ 271.213044] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 271.217701] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 271.222703] ? __radix_tree_preload+0x173/0x1d0 [ 271.227364] shmem_getpage_gfp+0x81b/0x41e0 [ 271.231694] ? shmem_writepage+0x1380/0x1380 [ 271.236100] ? print_usage_bug+0xc0/0xc0 [ 271.240151] ? __lock_acquire+0x7fc/0x5020 [ 271.244377] ? print_usage_bug+0xc0/0xc0 [ 271.248437] ? __lock_acquire+0x7fc/0x5020 [ 271.252658] ? print_usage_bug+0xc0/0xc0 [ 271.256720] ? __lock_acquire+0x7fc/0x5020 [ 271.260940] ? __lock_acquire+0x7fc/0x5020 [ 271.265163] ? check_noncircular+0x20/0x20 [ 271.269383] ? __lock_acquire+0x7fc/0x5020 [ 271.273605] ? __lock_acquire+0x7fc/0x5020 [ 271.277832] ? trace_hardirqs_on+0x10/0x10 [ 271.282049] ? print_usage_bug+0xc0/0xc0 [ 271.286100] ? __lock_acquire+0x7fc/0x5020 [ 271.290322] ? print_usage_bug+0xc0/0xc0 [ 271.294371] ? print_usage_bug+0xc0/0xc0 [ 271.298418] ? graph_lock+0x170/0x170 [ 271.302206] ? print_usage_bug+0xc0/0xc0 [ 271.306252] ? __lock_acquire+0x7fc/0x5020 [ 271.310493] ? __lock_acquire+0x7fc/0x5020 [ 271.314729] ? graph_lock+0x170/0x170 [ 271.318530] ? find_held_lock+0x36/0x1c0 [ 271.322580] ? print_usage_bug+0xc0/0xc0 [ 271.326644] ? lock_downgrade+0x8f0/0x8f0 [ 271.330792] ? kasan_check_read+0x11/0x20 [ 271.334930] ? lock_release+0xa30/0xa30 [ 271.338893] ? mark_held_locks+0xc9/0x160 [ 271.343046] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 271.348570] ? iov_iter_fault_in_readable+0x23d/0x460 [ 271.353743] ? copy_page_from_iter+0x890/0x890 [ 271.358321] ? __sanitizer_cov_trace_cmp8+0xd/0x20 [ 271.363237] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 271.368416] shmem_write_begin+0x110/0x1e0 [ 271.372651] generic_perform_write+0x3ae/0x6c0 [ 271.377230] ? add_page_wait_queue+0x2c0/0x2c0 [ 271.381798] ? file_update_time+0xe4/0x640 [ 271.386035] ? current_time+0x1b0/0x1b0 [ 271.390013] ? down_write+0x8f/0x130 [ 271.393719] __generic_file_write_iter+0x26e/0x630 [ 271.398638] generic_file_write_iter+0x438/0x870 [ 271.403383] ? __generic_file_write_iter+0x630/0x630 [ 271.408475] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 271.414010] ? iov_iter_init+0xc9/0x1f0 [ 271.417977] __vfs_write+0x6c6/0x9f0 [ 271.421679] ? kernel_read+0x120/0x120 [ 271.425556] ? __lock_is_held+0xb5/0x140 [ 271.429621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.435146] ? __sb_start_write+0x17f/0x300 [ 271.439464] vfs_write+0x1f8/0x560 [ 271.443006] ksys_pwrite64+0x181/0x1b0 [ 271.446888] ? __ia32_sys_pread64+0xf0/0xf0 [ 271.451196] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 271.456719] ? fput+0x130/0x1a0 [ 271.459986] ? do_sys_ftruncate+0x44e/0x560 [ 271.464298] __x64_sys_pwrite64+0x97/0xf0 [ 271.468436] do_syscall_64+0x1b9/0x820 [ 271.472309] ? finish_task_switch+0x1d3/0x890 [ 271.476790] ? syscall_return_slowpath+0x5e0/0x5e0 [ 271.481706] ? syscall_return_slowpath+0x31d/0x5e0 [ 271.486628] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 271.491979] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.496811] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.501997] RIP: 0033:0x40fe67 [ 271.505175] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 271.524405] RSP: 002b:00007f258d161a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 271.532100] RAX: ffffffffffffffda RBX: 0000000020000310 RCX: 000000000040fe67 [ 271.539363] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000014 14:59:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r2 = syz_open_pts(r0, 0x0) read(r0, &(0x7f0000000280)=""/1, 0xfffffd25) read(r2, &(0x7f00000000c0)=""/106, 0x6a) ioctl$TIOCSETD(r2, 0x5437, &(0x7f0000fd0ffc)) 14:59:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf.\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 271.546615] RBP: 0000000000000000 R08: 0000000020000318 R09: 00000000fbad8001 [ 271.553867] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 271.561121] R13: 0000000000000001 R14: 00000000004d3840 R15: 0000000000000005 14:59:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:30 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='b/rfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:30 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000500)={0x0, {0x2, 0x0, @broadcast=0xffffffff}, {0x2, 0x0, @broadcast=0xffffffff}, {0x2, 0x0, @broadcast=0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)='ip6gretap0\x00'}) 14:59:30 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000080)="2e2f66696c65302f662e2e2e30f0ff00", 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='codepage=864']) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) creat(&(0x7f0000000100)="2e2f66696c65302f662e2e2e30f0ff00", 0x0) creat(&(0x7f0000000140)="2e2f66696c65302f2e2e2e2e30f0ff00", 0x0) 14:59:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:30 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf0\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:30 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='b\nrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) poll(&(0x7f0000000100)=[{r1}, {r0}, {r1}, {r0}], 0x4, 0x7) 14:59:30 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btr/s\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfc\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:31 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000, &(0x7f0000000140), &(0x7f00000001c0)=[0x0]}}], 0x0, 0x0, &(0x7f0000000300)}) 14:59:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)="627472667302", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:31 executing program 5: sync() 14:59:31 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='b%rfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:31 executing program 6: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000449fd0)={0x0, 0x0, &(0x7f00004f1f94), 0x1, 0x0, &(0x7f0000901000)="05"}) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000016) close(r0) 14:59:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfd\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:31 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btr.s\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 272.677989] binder: 17716:17719 ioctl 40046205 0 returned -22 [ 272.712414] binder: 17705:17722 got transaction with invalid offsets ptr 14:59:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f6", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:31 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='bt\nfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfp\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:31 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfo\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 272.768508] binder: 17705:17722 transaction failed 29201/-14, size 0-12288 line 2995 [ 272.800579] binder_alloc: binder_alloc_mmap_handler: 17705 20002000-20006000 already mapped failed -16 [ 272.848470] binder: BINDER_SET_CONTEXT_MGR already set [ 272.856874] binder: 17705:17722 ioctl 40046207 0 returned -16 [ 272.863323] binder_alloc: 17705: binder_alloc_buf, no vma [ 272.868998] binder: 17705:17740 transaction failed 29189/-3, size 0-12288 line 2967 14:59:31 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x1, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000140)={{0x1000000, 0x0, 0x7, 0x0, 'syz0\x00'}, 0x3, 0xfffffffffffffffe, 0xa, 0x0, 0x1, 0x0, 'syz1\x00', &(0x7f00000000c0)=["07e646d40000000000"], 0x9}) 14:59:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)="627472667305", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 272.921246] binder: undelivered TRANSACTION_ERROR: 29189 [ 272.927284] binder: undelivered TRANSACTION_ERROR: 29201 14:59:31 executing program 5: sync() 14:59:31 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='bt%fs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:31 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x2}, 0x8, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) msgrcv(r0, &(0x7f0000000100)={0x0, ""/76}, 0x54, 0x0, 0x0) 14:59:32 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='bt/fs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:32 executing program 5: sync() 14:59:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x1e, 0x2, 0x0) close(r1) 14:59:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfl\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:32 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) 14:59:32 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrf-\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:32 executing program 5: sync() 14:59:32 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btr\ns\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 273.494589] binder: 17716:17719 ioctl 40046205 0 returned -22 14:59:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:32 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) 14:59:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:32 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btr%s\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:32 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") unshare(0x2000400) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) ioctl$KVM_HAS_DEVICE_ATTR(r3, 0x4018aee3, &(0x7f0000000340)={0x0, 0x1, 0x1, &(0x7f0000000300)}) 14:59:32 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrf*\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x1e, 0x2, 0x0) close(r1) 14:59:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfu\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:32 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) 14:59:32 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r1 = dup2(r0, r0) ioctl$LOOP_CLR_FD(r1, 0x8907) 14:59:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:32 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btr.s\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:32 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrf+\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:33 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) 14:59:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x1e, 0x2, 0x0) close(r1) 14:59:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf*\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:33 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip_tables_matches\x00') pread64(r1, &(0x7f0000000200), 0x5000000, 0x7) 14:59:33 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btr/s\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:33 executing program 3: r0 = socket$inet6(0xa, 0x800, 0x9) r1 = socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) r2 = socket$key(0xf, 0x3, 0x2) r3 = socket$inet6(0xa, 0x1000000000003, 0x2000000000000008) getsockopt$inet6_udp_int(r3, 0x11, 0x65, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl(r2, 0x0, &(0x7f0000000240)="0047fc2f07d82c99240970") sendmsg$key(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000500)={0x2, 0xb, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_ident={0x2, 0xa}]}, 0x20}, 0x1}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) r5 = socket$inet6(0xa, 0x1, 0x0) ioctl(r5, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x307182, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r6, 0xae78, &(0x7f0000000340)=0x2) unshare(0x8000400) ioctl$KVM_XEN_HVM_CONFIG(r6, 0x4038ae7a, &(0x7f00000004c0)={0xfffffffffffffffa, 0x2c5, &(0x7f0000000400)="fc8732adf36f64ccaafa6759b2698a030ef9e1473f03efae0ca449ec9663dd97329fa554f5f3835036c1e774c83784f6204c1a9beb2c77c0c044db8c03d1e94d890e14fa9066cec7c9ae", &(0x7f0000000480)="f60e86aa020ae9b4a779b4c00b248904e190963ef9722662f6ae7f7a55e5ad", 0x4a, 0x1f}) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000380)={r5, r6}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_GET_VRING_BASE(r6, 0xc0045878, &(0x7f00000003c0)) sendmsg$key(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0xa, 0x1, 0x6, 0x280, 0x0, 0x70bd29, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e20}]}, 0x18}, 0x1}, 0x4) accept4(r4, 0x0, &(0x7f0000000280), 0x800) sendfile(r1, r4, &(0x7f00000002c0)=0x56, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='htcp\x00', 0x5) ioctl(r0, 0x8912, &(0x7f0000000040)="0047123007d82c99240970") socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000740)) r7 = socket$key(0xf, 0x3, 0x2) ioctl$TCSBRKP(r6, 0x5425, 0xffffffff) socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000180)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 14:59:33 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @dev={0xac, 0x14}}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000002240)={0x1, [0x0]}, &(0x7f0000003a40)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x11, &(0x7f0000000040)={r2, 0x100000000000000}, &(0x7f0000000100)=0x8) 14:59:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x1e, 0x2, 0x0) close(r1) 14:59:33 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfi\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfo\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:33 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfc\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsz', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:33 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfu\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:33 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x4) 14:59:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfi\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:33 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfl\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000100)) r1 = open(&(0x7f0000000600)='./file0/file0\x00', 0x3fffa, 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) write$cgroup_subtree(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="91"], 0x1) r2 = open(&(0x7f0000000000)="2e2f66696c65302f662e6c6530f0", 0x40003ffd, 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x100000213) write$cgroup_subtree(r2, &(0x7f0000000200)={[{0x0, 'pids', 0x20}]}, 0x6) 14:59:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsr', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:33 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrf%\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 275.263934] FAT-fs (loop3): error, clusters badly computed (3 != 1) [ 275.270827] FAT-fs (loop3): Filesystem has been set read-only [ 275.332624] FAT-fs (loop3): error, clusters badly computed (4 != 2) [ 275.366209] FAT-fs (loop3): error, clusters badly computed (5 != 3) [ 275.381159] FAT-fs (loop3): error, clusters badly computed (6 != 4) [ 275.388786] FAT-fs (loop3): error, clusters badly computed (7 != 5) [ 275.403317] FAT-fs (loop3): error, clusters badly computed (8 != 6) [ 275.410643] FAT-fs (loop3): error, clusters badly computed (9 != 7) [ 275.417418] FAT-fs (loop3): error, clusters badly computed (10 != 8) [ 275.430567] FAT-fs (loop3): error, clusters badly computed (11 != 9) [ 275.441295] FAT-fs (loop3): error, clusters badly computed (12 != 10) [ 275.448253] FAT-fs (loop3): error, clusters badly computed (13 != 11) [ 275.455622] FAT-fs (loop3): error, clusters badly computed (14 != 12) [ 275.463510] FAT-fs (loop3): error, clusters badly computed (15 != 13) [ 275.471553] FAT-fs (loop3): error, clusters badly computed (16 != 14) 14:59:34 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'veth1_to_bond\x00', &(0x7f0000000000)=@ethtool_stats={0x33}}) close(r2) close(r1) 14:59:34 executing program 6: r0 = socket$inet6(0xa, 0x100000005, 0x0) r1 = dup(r0) sendmmsg$inet_sctp(r1, &(0x7f00000040c0)=[{&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c, &(0x7f0000000cc0)=[{&(0x7f0000000c80)="d5", 0x1}], 0x1, &(0x7f0000000ec0)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x0, 0x200}}], 0x30}], 0x1, 0x0) 14:59:34 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfd\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf%\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:34 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrf0\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 275.478366] FAT-fs (loop3): error, clusters badly computed (17 != 15) [ 275.494796] FAT-fs (loop3): error, clusters badly computed (18 != 16) [ 275.501605] FAT-fs (loop3): error, clusters badly computed (19 != 17) [ 275.531651] FAT-fs (loop3): error, clusters badly computed (20 != 18) [ 275.545581] FAT-fs (loop3): error, clusters badly computed (21 != 19) 14:59:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 275.619243] FAT-fs (loop3): error, clusters badly computed (22 != 20) 14:59:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf#\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") futex(&(0x7f000000cffc)=0x2000000000000004, 0x109, 0x4, &(0x7f0000000000)={0x77359400}, &(0x7f0000000040), 0x8002) futex(&(0x7f000000cffc), 0xa, 0x0, &(0x7f00006f7000)={0xfffffffffffffffc, 0x100000000000000}, &(0x7f0000000080), 0x23) 14:59:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 275.680251] FAT-fs (loop3): error, clusters badly computed (23 != 21) 14:59:34 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrf%\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) [ 275.735868] FAT-fs (loop3): error, clusters badly computed (24 != 22) [ 275.803796] FAT-fs (loop3): error, clusters badly computed (25 != 23) [ 275.859270] FAT-fs (loop3): error, clusters badly computed (26 != 24) [ 275.909721] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000c00) [ 275.934427] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000c00) 14:59:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000040)}}, &(0x7f0000000140)) timer_delete(0x0) [ 275.984203] FAT-fs (loop3): error, fat_bmap_cluster: request beyond EOF (i_pos 1041) [ 276.016784] FAT-fs (loop3): error, fat_bmap_cluster: request beyond EOF (i_pos 1041) 14:59:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf+\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:34 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfx\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000e15000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000133ffc)="71e67a15", 0x4) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto(r1, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) recvmmsg(r1, &(0x7f0000007a80)=[{{&(0x7f0000005f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000007140)=[{&(0x7f0000006040)=""/4096, 0x1000}], 0x1, &(0x7f0000007180)=""/201, 0xc9}}], 0x1, 0x0, 0x0) 14:59:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:35 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrf*\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80}, 0x1}]}, &(0x7f0000000200)=0x10) listen(r1, 0x46) r2 = accept4(r1, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) sendmsg$kcm(r2, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000300)="a6", 0x1}], 0x1, &(0x7f0000001300)}, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x1}, 0x8) shutdown(r2, 0x1) 14:59:35 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfc\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="627472667306", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="627472667303", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:35 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfp\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:35 executing program 6: r0 = socket$inet(0x2, 0x3, 0x800000800000001) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x6, 0xfffffffffffffffc}, 0x2c) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x28) 14:59:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:35 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfu\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsh', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:35 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80084502, &(0x7f0000000640)=""/216) 14:59:35 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfX\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:36 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@fat=@showexec='showexec', 0x2c}]}) 14:59:36 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrf/\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:36 executing program 6: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x80000000040, 0x4) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000200)=0x4, 0x4) 14:59:36 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrf.\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:36 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[]}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f3, &(0x7f0000000000)={'ip6tnl0\x00', @ifru_data=&(0x7f00000000c0)="a325d3c91116bf66fed2b246a94500aa6593352d29be1746fd84168b6ef37b32"}) 14:59:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:36 executing program 6: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(r0, &(0x7f0000000040)=@ax25, &(0x7f00000000c0)=0x80, 0x0) 14:59:36 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)={0x2, 0x5, 0x0, 0x8, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 14:59:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 277.744379] FAT-fs (loop5): bogus number of reserved sectors [ 277.750313] FAT-fs (loop5): Can't find a valid FAT filesystem 14:59:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:36 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrf-\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:36 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfd\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:36 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000)={0x1d}, 0x1) 14:59:36 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) mremap(&(0x7f0000a94000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000000000/0x2000)=nil) ioctl$VHOST_GET_FEATURES(r1, 0x805c4d65, &(0x7f0000000100)) 14:59:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='//file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:36 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfi\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0xcb) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0xffffffffffffffd6, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = socket$inet(0x10, 0x3, 0x4) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001200ff09fffefd956fa264b724a6007e00000000000000683540150024001d001fc41180b598be593ab6821148a730bb1aa49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) 14:59:37 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrf#\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:37 executing program 5: socketpair(0x1, 0x80003, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000040)="256472b0eeb708339cf725b9b2c4bc20e22389fa72246e8f9706f877ffa1c85cd913303af9eeaece2cddeee3b37f47") [ 278.296996] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:59:37 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x7a44) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000080), 0x0) recvmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000000)=@hci, 0x80, &(0x7f0000000400)=[{&(0x7f0000000300)=""/239, 0xef}], 0x1, &(0x7f0000000480)=""/142, 0x8e}, 0x0) 14:59:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./.ile1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsL', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:37 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfo\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:37 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r1, 0x541f, 0x6f3000) 14:59:37 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfl\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='.//ile1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs#', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:37 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)="62747266c000", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) write(r2, &(0x7f00000001c0)='?', 0x1) fcntl$dupfd(r1, 0x0, r1) dup3(r2, r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 14:59:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./fi.e1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:38 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f5", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:38 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000380), 0x0, 0x10001}], 0x0, &(0x7f00000004c0)={[{@usrquota='usrquota', 0x2c}, {@errors_continue='errors=continue', 0x2c}, {@resize='resize', 0x2c}]}) 14:59:38 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrf\n\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./fi/e1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:38 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write$sndseq(r2, &(0x7f0000458000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote={{}, 0x0, &(0x7f0000def000)={0x0, 0x0, 0x0, 0x0, @time={0x77359400}}}}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @quote={{}, 0x0, &(0x7f00008e3000)={0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @connect}}}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @quote}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @time}, {0x0, 0x0, 0x0, 0x0, @time={0x0, 0x989680}, {}, {}, @quote={{}, 0x0, &(0x7f00004f8000)={0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @result}}}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @queue}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @result}], 0xff9a) recvmmsg(r1, &(0x7f0000002a00)=[{{&(0x7f0000002640)=@vsock, 0x10, &(0x7f00000028c0)=[{&(0x7f00000027c0)=""/196, 0xc4}], 0x1, &(0x7f0000002940)=""/154, 0x9a}}], 0x1, 0x0, &(0x7f0000002ac0)) [ 279.338960] resize option for remount only 14:59:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:38 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfX\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:38 executing program 6: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) pselect6(0x40, &(0x7f0000f33fc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f0000086000), &(0x7f0000349000), &(0x7f0000f14000)={&(0x7f00000000c0), 0x8}) [ 279.416151] resize option for remount only 14:59:38 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:38 executing program 3: mprotect(&(0x7f0000033000/0x1000)=nil, 0x1000, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4002, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)={'syz1'}, 0x3e00406000) 14:59:38 executing program 5: r0 = memfd_create(&(0x7f0000033ff3)='\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0xc0bc5351, &(0x7f0000000100)={0x12, @time={0x77359400}}) 14:59:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:38 executing program 6: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) pselect6(0x40, &(0x7f0000f33fc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f0000086000), &(0x7f0000349000), &(0x7f0000f14000)={&(0x7f00000000c0), 0x8}) 14:59:38 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfx\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:38 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)="2e2f66696c6531ff", 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:38 executing program 3: r0 = gettid() getpriority(0x1, r0) 14:59:38 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cpuset\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000013c0)=""/4096, 0xb93}], 0x1, 0x0) 14:59:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:38 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000000080), 0x30b, 0x0) 14:59:38 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrf.\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:38 executing program 6: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) pselect6(0x40, &(0x7f0000f33fc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f0000086000), &(0x7f0000349000), &(0x7f0000f14000)={&(0x7f00000000c0), 0x8}) 14:59:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:39 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:39 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 14:59:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\a', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:39 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r1, 0x400000) mmap(&(0x7f00001c1000/0x2000)=nil, 0x2000, 0x0, 0x100011, r1, 0x0) 14:59:39 executing program 6: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) pselect6(0x40, &(0x7f0000f33fc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f0000086000), &(0x7f0000349000), &(0x7f0000f14000)={&(0x7f00000000c0), 0x8}) 14:59:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:39 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrf+\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x10, 0x701, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 14:59:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:39 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x20, 0x32, 0xb03, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2}]}, 0x20}, 0x1}, 0x0) 14:59:39 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrf#\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:39 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)="2f70726f632f76657273696f6e005aa2ac0000b8b5a28a29aecbf843385a51250398ce12d984f52a149eaf9866f3c33828fe73d4f319528bbd89fcefb625adac46df7522ebb23c98ad69bdc82509df6f43791702000000ca02988905b672c3a20d10f890b9f57724340b384eca6136eae4fd4a015e073076b8f1cde45eea0f0f0c3ca64ebdd0cefc0d9e8ea91d0bbba500000000000000000000000000000000", 0x2, 0x0) sendfile(r0, r1, &(0x7f0000000300)=0x10, 0x100) 14:59:39 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="62747266730f", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs#', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 280.801379] tc_dump_action: action bad kind 14:59:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x5d, &(0x7f0000000580), 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f00000002c0)=ANY=[@ANYBLOB="3bf620"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:59:39 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000280)) fcntl$notify(r0, 0x402, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffdc1) fcntl$setlease(r0, 0x400, 0x2) 14:59:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsz', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:39 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)="2f70726f632f76657273696f6e005aa2ac0000b8b5a28a29aecbf843385a51250398ce12d984f52a149eaf9866f3c33828fe73d4f319528bbd89fcefb625adac46df7522ebb23c98ad69bdc82509df6f43791702000000ca02988905b672c3a20d10f890b9f57724340b384eca6136eae4fd4a015e073076b8f1cde45eea0f0f0c3ca64ebdd0cefc0d9e8ea91d0bbba500000000000000000000000000000000", 0x2, 0x0) sendfile(r0, r1, &(0x7f0000000300)=0x10, 0x100) 14:59:39 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrf0\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:39 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:40 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)="2f70726f632f76657273696f6e005aa2ac0000b8b5a28a29aecbf843385a51250398ce12d984f52a149eaf9866f3c33828fe73d4f319528bbd89fcefb625adac46df7522ebb23c98ad69bdc82509df6f43791702000000ca02988905b672c3a20d10f890b9f57724340b384eca6136eae4fd4a015e073076b8f1cde45eea0f0f0c3ca64ebdd0cefc0d9e8ea91d0bbba500000000000000000000000000000000", 0x2, 0x0) sendfile(r0, r1, &(0x7f0000000300)=0x10, 0x100) 14:59:40 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)="2e2f66696c6531fb", 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:40 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfp\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:40 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) read$eventfd(r0, &(0x7f0000000000), 0x8) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') sendfile(r0, r1, &(0x7f0000000280)=0x29, 0x2000000004) 14:59:40 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)="2f70726f632f76657273696f6e005aa2ac0000b8b5a28a29aecbf843385a51250398ce12d984f52a149eaf9866f3c33828fe73d4f319528bbd89fcefb625adac46df7522ebb23c98ad69bdc82509df6f43791702000000ca02988905b672c3a20d10f890b9f57724340b384eca6136eae4fd4a015e073076b8f1cde45eea0f0f0c3ca64ebdd0cefc0d9e8ea91d0bbba500000000000000000000000000000000", 0x2, 0x0) sendfile(r0, r1, &(0x7f0000000300)=0x10, 0x100) 14:59:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="62747266737f", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:40 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x1, 0x4, 0xf728}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, &(0x7f00000001c0)="ed", &(0x7f0000000080)=""/164}, 0x18) 14:59:40 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:40 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="627472667302", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:40 executing program 3: ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000001000)={{0x0, 0x0, 0x0, 0x0, "1fa81bdfc5693eaacc403eec0ebb14069da82c46b9813b79a6bb872e811c474e9e1f68d7e3ad316b235a8651"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e7ad6a30f0efb3a8f2f1256dcb0c09c578524021857b879d300ee8a096c658540ed7e3898814aeaed1611e728d6809376f03ff0306b84c23a50bca46a74d3c2d", &(0x7f000000cff7), 0x9, [], [0x8, 0x0, 0x6]}) r0 = syz_open_dev$sndctrl(&(0x7f0000012000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000), 0x2}, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) 14:59:40 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000001840)) 14:59:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="627472667302", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000000)={0x77359400}) close(r1) socket$key(0xf, 0x3, 0x2) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0xf000000}]) [ 282.146608] BTRFS error (device loop1): superblock checksum mismatch 14:59:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f4", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:41 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 282.300694] BTRFS error (device loop1): open_ctree failed 14:59:41 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="45945a5c4f0f0000000030e12924ad83aa67fe51a76dabe473416c"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000280)='GPL\x00', 0x9, 0x27d, &(0x7f0000000480)=""/187}, 0x48) 14:59:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x200000002, 0x0) getsockopt$inet_int(r1, 0x0, 0x22, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 14:59:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="45964a5c4f0f00fe000030492a768b88b40eda954797623745e01c"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x12, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x4bb, &(0x7f0000000300)=""/187, 0x0, 0x0, [], 0x0, 0xb}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x7, &(0x7f0000000400)=@framed={{0x18}, [@initr0={0x18}, @call={0x85, 0x0, 0x0, 0x3c}], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x2, 0x93, &(0x7f0000000480)=""/147}, 0x48) 14:59:41 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)="2e2f66696c6531ff", 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:41 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 282.657085] BTRFS error (device loop1): superblock checksum mismatch 14:59:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") prctl$intptr(0x19, 0xa07000) 14:59:41 executing program 5: bpf$MAP_UPDATE_ELEM(0x12, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) 14:59:41 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000100)=0x4, 0x1) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x6) [ 282.721224] BTRFS error (device loop1): open_ctree failed 14:59:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:41 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:41 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000700)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = accept4(r0, 0x0, &(0x7f0000000380), 0x0) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 14:59:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:41 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000140)) 14:59:41 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000040)) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)) 14:59:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 283.073788] BTRFS error (device loop1): superblock checksum mismatch 14:59:42 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000003940)="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", 0xdf7, 0x9}]) 14:59:42 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 283.155587] BTRFS error (device loop1): open_ctree failed 14:59:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:42 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_procfs(0x0, &(0x7f0000000380)='ns\x00') getdents64(r1, &(0x7f0000000100)=""/225, 0xe1) getdents64(r1, &(0x7f0000000340)=""/57, 0x39) [ 283.281268] loop5: [CUMANA/ADFS] p1 [ADFS] p1 [ 283.285995] loop5: partition table partially beyond EOD, truncated 14:59:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:42 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:42 executing program 6: r0 = syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000001c0)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:59:42 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 283.407837] loop5: p1 size 2557237941 extends beyond EOD, truncated 14:59:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="627472667306", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:42 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) rt_sigqueueinfo(r1, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) ptrace(0x420d, r1) [ 283.561014] BTRFS error (device loop1): superblock checksum mismatch 14:59:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fd", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 283.632907] loop5: [CUMANA/ADFS] p1 [ADFS] p1 [ 283.637594] loop5: partition table partially beyond EOD, truncated [ 283.647922] BTRFS error (device loop1): open_ctree failed 14:59:42 executing program 3: sched_setattr(0x0, &(0x7f0000000040)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x1000, 0x800) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7, 0x400a02) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x207e, 0x0) dup2(r0, r1) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x101d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="b400000092f868f9974cc791000000008700000000000000000000eb2fa20000000000950000000200aab41b000000008500db9c807c8d71115c66bc4631306acf42607e5292305f7102b7b4dcf88ce1396f86361966ec0472851c624246c0f06550"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r2 = memfd_create(&(0x7f0000033ff3)='\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x9, 0x10000003, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r4 = dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) syz_open_dev$adsp(&(0x7f00000012c0)='/dev/adsp#\x00', 0x0, 0x501080) write$sndseq(r2, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, 0x0, 0x0, r5) r7 = socket$inet6(0xa, 0x1000400000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r8 = socket(0x10, 0x803, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8923, &(0x7f0000000040)={'team0\x00', 0xc201}) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, r6) ioctl(r4, 0x3, &(0x7f0000000340)="99c94476dd37ed594eeaeb6a7ae04b399337c71b90dc3ad288cb17547931d7d1e20af5f983d2c2dd1cebb4e67e43f8f9bf1a4fe49d120f9e0e8a740e75424902bf4b7eba6afa6a1a94ccda04beed7a1f1ac45abe1ee57f0dc46fc8c5ab164f314053401226e6fa0016f04a02739186105d594210e770a595dd63953ed095f5528c55fd9af6266023cf74b2e8cda62be6d62b8a7d4ef5bbcff4e64cb767a49c5e1bf4bc3f01a43796b19836073fe9feb971a708b71134918817f00ea810b7bf7a666d0f7dc96f188073df518060d48c8f360214300e646ea9") sendmsg$nl_route(r2, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="70000000210000022cbd7000fbdbdf250a148004010000000700000011faffff13000100fe8000000000000000000000000000bb14000200fe80000000000200000000000000001a14000100000000000000000000000000000000001400020000000000000000000000001800000001"], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f0000000080)={0x4a48b125e13656b}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x400000, 0x0) 14:59:42 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f4", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)="2e2f66696c653106", 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 283.726565] loop5: p1 size 2557237941 extends beyond EOD, truncated [ 283.884878] sched: DL replenish lagged too much 14:59:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(aegis256)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b300000000000000e6000000000000000000000000000000", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000002d40)={&(0x7f0000001540)={0x10}, 0xc, &(0x7f0000002d00)={&(0x7f0000002b80)={0x5c, 0x0, 0x0, 0x0, 0x0, {0x1}, [{{0xffffffffffffffc6, 0x1}, {0x40, 0x2}}]}, 0x5c}, 0x1}, 0x0) recvmmsg(r1, &(0x7f00000013c0)=[{{&(0x7f0000000040)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000280)=""/67, 0x43}}, {{&(0x7f0000000e00)=@generic, 0x80, &(0x7f0000001040)=[{&(0x7f0000000fc0)=""/103, 0x67}], 0x1, &(0x7f0000001080)=""/147, 0x93}}], 0x2, 0x0, &(0x7f0000000000)={0x77359400}) 14:59:42 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") setrlimit(0x40000000000008, &(0x7f0000000000)={0x4847, 0xfffffffffffff001}) mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mlock2(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0) mlock2(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) 14:59:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:42 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:43 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x2, 0x71, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mprotect(&(0x7f00005ae000/0xe000)=nil, 0xe000, 0x0) [ 284.116566] BTRFS error (device loop1): superblock checksum mismatch 14:59:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast6-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b300000000000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000047c0)=[{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000018c0)="f9999c1192ad6e81630a3237b66ddcfea3263c332ffa500f4dfbec09357fcd89", 0x20}], 0x1, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 14:59:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 284.201737] BTRFS error (device loop1): open_ctree failed 14:59:43 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:43 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:43 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x223, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0x14, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000040)) 14:59:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:43 executing program 6: syz_mount_image$xfs(&(0x7f0000000380)='xfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f00000016c0)=[{&(0x7f0000000500)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000001740)) 14:59:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:43 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fc", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:43 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x2, 0x1) 14:59:43 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='cgroup\\--\x00') [ 284.621694] BTRFS error (device loop1): superblock checksum mismatch 14:59:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 284.700762] BTRFS error (device loop1): open_ctree failed 14:59:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x12, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 14:59:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f00000000c0)="65f30f70c80066b97e03000066b800c0ffff66baffffffff0f30b814008ed8f2640a8d0c000f01df0f070f22c2260f67e466b9110a000066b80200010066ba000000000f30baf80c66b87436958166efbafc0c66ed", 0x55}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 284.845438] XFS (loop6): Invalid superblock magic number 14:59:43 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:43 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsH', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:43 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket(0x10, 0x3, 0xc) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) write(r1, &(0x7f00000001c0)="130000001000ffdde200f49ff60f050000230a009d000000119dc53022e5f9ec364f0000c0ff030000001c24e175cc463437101101bd81dc3181ddd83f8d3d1f2c53e45fca5ab94018975d7db75411543e1226408e88cac1f2cbefbb693d8a0c8efc28ceb4ec3ff429592e5de7e4f28bca763acd06f40ad03226af55e3129849ae2d726cf46a629bf91efdb19a5faccffe8090d92237be9951be4bd7c2a1c1a2b5b2684ade4025622c962d916c000000000000003400000000000000d5ba641663ac6847d35b8779c6903efd7800e86ccc2b5bbc156c2a1976a0f57350aeb0775fa06f769670fe98", 0xe8) [ 285.020151] XFS (loop6): Invalid superblock magic number [ 285.130373] BTRFS error (device loop1): superblock checksum mismatch 14:59:44 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x2c) 14:59:44 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 285.179826] BTRFS error (device loop1): open_ctree failed 14:59:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f00000000c0)="65f30f70c80066b97e03000066b800c0ffff66baffffffff0f30b814008ed8f2640a8d0c000f01df0f070f22c2260f67e466b9110a000066b80200010066ba000000000f30baf80c66b87436958166efbafc0c66ed", 0x55}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:59:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f00000000c0)="65f30f70c80066b97e03000066b800c0ffff66baffffffff0f30b814008ed8f2640a8d0c000f01df0f070f22c2260f67e466b9110a000066b80200010066ba000000000f30baf80c66b87436958166efbafc0c66ed", 0x55}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:59:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)="2e2f66696c653102", 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:44 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet(0x10, 0xf, 0xffffffffffffffff) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0xfffffffffffffffd, &(0x7f0000000280)=0x3e80000000, 0x4) fcntl$dupfd(r3, 0x0, r1) r4 = dup(r3) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r2, 0x800442d2, &(0x7f0000000200)={0x7, &(0x7f0000001ac0)=[{0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @link_local}]}) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x10000000000000, 0x0) io_setup(0x80000001, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$inet6(0xa, 0x2100000000000002, 0x0) ioctl$sock_ifreq(r7, 0x8943, &(0x7f0000000380)={'syz_tun\x00', @ifru_names='rose0\x00'}) io_destroy(r6) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x800) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r4, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r8 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r8, 0x80080) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r8) recvmsg$kcm(r4, &(0x7f0000000840)={&(0x7f00000000c0)=@pptp, 0x80, &(0x7f0000001900)=[{&(0x7f0000000300)=""/93, 0x5d}, {&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000440)=""/2, 0x2}, {&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000480)=""/247, 0xf7}, {&(0x7f0000000580)=""/218, 0xda}, {&(0x7f0000000680)=""/235, 0xeb}, {&(0x7f0000000780)=""/54, 0x36}, {&(0x7f00000007c0)=""/77, 0x4d}], 0x9, &(0x7f00000019c0)=""/247, 0xf7, 0xb2d}, 0x20) sendfile(r4, r8, &(0x7f0000d83ff8), 0x2008000fffffffe) 14:59:44 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:44 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) [ 285.518811] syz_tun: refused to change device tx_queue_len 14:59:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f00000000c0)="65f30f70c80066b97e03000066b800c0ffff66baffffffff0f30b814008ed8f2640a8d0c000f01df0f070f22c2260f67e466b9110a000066b80200010066ba000000000f30baf80c66b87436958166efbafc0c66ed", 0x55}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 285.592969] BTRFS error (device loop1): superblock checksum mismatch [ 285.611903] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:59:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f4", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f00000000c0)="65f30f70c80066b97e03000066b800c0ffff66baffffffff0f30b814008ed8f2640a8d0c000f01df0f070f22c2260f67e466b9110a000066b80200010066ba000000000f30baf80c66b87436958166efbafc0c66ed", 0x55}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 285.674814] BTRFS error (device loop1): open_ctree failed 14:59:44 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsl', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:44 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f00000000c0)="65f30f70c80066b97e03000066b800c0ffff66baffffffff0f30b814008ed8f2640a8d0c000f01df0f070f22c2260f67e466b9110a000066b80200010066ba000000000f30baf80c66b87436958166efbafc0c66ed", 0x55}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:59:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="627472667397", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 285.954406] BTRFS error (device loop1): superblock checksum mismatch 14:59:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f00000000c0)="65f30f70c80066b97e03000066b800c0ffff66baffffffff0f30b814008ed8f2640a8d0c000f01df0f070f22c2260f67e466b9110a000066b80200010066ba000000000f30baf80c66b87436958166efbafc0c66ed", 0x55}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 286.013197] BTRFS error (device loop1): open_ctree failed [ 286.356861] syz_tun: refused to change device tx_queue_len 14:59:45 executing program 6: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00000d3fe8)) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000100), 0x4) 14:59:45 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:45 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mprotect(&(0x7f00000db000/0x2000)=nil, 0x2000, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) 14:59:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfst', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsr', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:45 executing program 5: r0 = memfd_create(&(0x7f0000033ff3)='\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x1, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000100)={0x12, @tick=0xfffffffffffffffe}) 14:59:45 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffefffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write(r2, &(0x7f0000000000)="f5", 0x1) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8) write$binfmt_misc(r2, &(0x7f0000000240)={'syz1'}, 0x34000) 14:59:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={&(0x7f00000012c0)=@alg, 0x80, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/187, 0xbb}], 0x1, &(0x7f0000fb3fa9)=""/87, 0x57}, 0x0) 14:59:45 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)="2e2f66696c6531f5", 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:45 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="627472667305", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:45 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c80)=[{0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmsg(r1, &(0x7f0000000300)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000001880)=""/4096, 0x1000}], 0x1, &(0x7f0000000180)=""/2, 0x2}, 0x0) [ 286.865359] BTRFS error (device loop1): superblock checksum mismatch 14:59:45 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fd", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:45 executing program 3: r0 = socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$sock_buf(r0, 0x1, 0x1f, &(0x7f0000000000)=""/44, &(0x7f0000000040)=0x2c) [ 286.964621] BTRFS error (device loop1): open_ctree failed 14:59:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:45 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f4", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:46 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setitimer(0x0, &(0x7f0000000180)={{0x77359400}, {0x77359400}}, 0x0) 14:59:46 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="627472667397", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:46 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) r2 = fcntl$dupfd(r0, 0x0, r0) sendmsg$key(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 14:59:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)="2e2f66696c65317f", 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:46 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:46 executing program 3: creat(&(0x7f00006e9ff8)='./file0\x00', 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000b29f57)=@known="73656375726974792e6361706162696c69747900c9bd3012983e02155960196a2a84585f19c1c826172982a8de1ccc4cdc6987ffc9715cef22cee4c673d4388d5e5604a0b838afb35bd352e4c9ee649a771208309ca436bf919fd9636bfa255ff4b31f40f88ecc9c2d812171c412624f0c142fc54f65f49239f27686c17d489e925da19bf31e30ec75cd92237957661ce8a1568418e6d3d428174f89a11cc821fbf64122a36f6b411c", &(0x7f0000227f74)=""/140, 0x2) 14:59:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:46 executing program 6: r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) close(r1) dup2(r1, r0) 14:59:46 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='cgroup\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 14:59:46 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="627472667304", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:46 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:46 executing program 3: r0 = getpid() r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") sched_setscheduler(r0, 0x5, &(0x7f0000000040)) r2 = memfd_create(&(0x7f0000000300)="8eb549d6602c4f7bd34748897dad3c5294756c657aa1baf428787ea7eae01666ffe43bbab9f3caa0730258bd4eb40346521c4339f0e539461e7ce69120e5718903381385e95fa44ac967863ab437c34caed94d016de3db13f017355776b8eff79e7cbf9d7da31daac1d834d5b45bde344e0a26452a0946fc939ca34ea8d3cdcb5e37a3b89dada0b0598fdfd7514e32a1060005326799ce85686f5d184e8fd3384099fbf3cc1153bdd7c7baad0026c2390c739f716ac2264022b76e46f7709d471a5d765ea03d6ff41d7b", 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='wchan\x00') sendfile(r2, r3, &(0x7f0000000000), 0x40000000009) 14:59:46 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00003cf000)={&(0x7f0000f4dff4)={0x10}, 0xc, &(0x7f00005ad000)={&(0x7f00008d8000)=@migrate={0x50, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @in6=@dev={0xfe, 0x80}}}}, 0x50}, 0x1}, 0x0) [ 287.875202] BTRFS error (device loop1): superblock checksum mismatch 14:59:46 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000300)="29d7e1311f160577651070") syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000240)={[{@type={'type', 0x3d, "27da2c2a"}, 0x2c}]}) 14:59:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 287.962082] BTRFS error (device loop1): open_ctree failed 14:59:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 288.030988] hfsplus: type requires a 4 character value [ 288.036666] hfsplus: unable to parse mount options 14:59:46 executing program 3: r0 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100000007, 0x8001}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 14:59:47 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x2}, 0x14) close(r2) close(r1) 14:59:47 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 288.193818] hfsplus: type requires a 4 character value [ 288.199198] hfsplus: unable to parse mount options 14:59:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:47 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000eccfa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f000048f000)="ad56b6c5824c8eb995298992ea54c7beef9f5d56530f90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000c2bfc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) [ 288.355284] BTRFS error (device loop1): superblock checksum mismatch [ 288.395147] BTRFS error (device loop1): open_ctree failed 14:59:47 executing program 3: r0 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100000007, 0x8001}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 14:59:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsl', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:47 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:47 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:47 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x73, 0x0, 0x0, 0x0, 0x0, 0x25, 0x0, 0xc200}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 14:59:47 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:47 executing program 3: r0 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100000007, 0x8001}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 14:59:47 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 288.939858] BTRFS error (device loop1): superblock checksum mismatch [ 288.982935] BTRFS error (device loop1): open_ctree failed 14:59:48 executing program 5: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000680)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000640)={&(0x7f00000001c0)=@newtclass={0x24, 0x28, 0x311, 0x0, 0x0, {0x0, r1, {0x0, 0xb}, {0x0, 0xb}}}, 0x24}, 0x1}, 0x0) 14:59:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="627472667397", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:48 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r2, r3, &(0x7f00000002c0), 0x10000000000443) 14:59:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:48 executing program 3: r0 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100000007, 0x8001}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 14:59:48 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:48 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) [ 289.314188] BTRFS error (device loop1): superblock checksum mismatch 14:59:48 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000002fc8)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a06000000a8430891000000390002000a000c00060000001900a30700000000000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000000280)}, 0x0) 14:59:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673c0", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)="2e2f66696c6531ff", 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:48 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 289.375775] BTRFS error (device loop1): open_ctree failed 14:59:48 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") socket$inet6(0xa, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r1, 0x40045109, &(0x7f0000a07fff)) 14:59:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x19) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000000004, 0x400031, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000100), 0x1, 0x0) [ 289.492256] IPv6: Can't replace route, no match found 14:59:48 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)="627472667310", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:48 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000040)={'veth0\x00'}) 14:59:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\b', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:48 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x9, 0x4) sendto$inet(r0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) setsockopt$inet_int(r0, 0x0, 0x19, &(0x7f0000000180)=0x1000000000003f, 0x3) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0xfffffffffffffe58, &(0x7f0000000000), 0x0, &(0x7f0000000040)=""/81, 0x4b}, 0x40002102) 14:59:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:48 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:48 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:48 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x2}) ppoll(&(0x7f0000000200)=[{r0}], 0x1, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280), 0x8) 14:59:48 executing program 6: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) r2 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ff9000/0x2000)=nil) shmctl$SHM_LOCK(r2, 0xb) 14:59:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:48 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:48 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f06762070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) clock_gettime(0x0, &(0x7f0000004000)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000003e40)=[{{&(0x7f0000002b80)=@alg, 0x80, &(0x7f0000002d00), 0x0, &(0x7f0000002d40)=""/4096, 0x1000}}, {{&(0x7f0000003d40)=@nfc_llcp, 0x80, &(0x7f0000003e00)}}], 0x2, 0x0, &(0x7f0000004040)={0x0, r2+30000000}) 14:59:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 290.105225] BTRFS error (device loop1): superblock checksum mismatch 14:59:49 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r1, 0x0) accept(r1, &(0x7f00000000c0)=@nfc_llcp, &(0x7f0000000140)=0x80) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 14:59:49 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x2}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x15, &(0x7f00000000c0), 0x3) [ 290.249305] BTRFS error (device loop1): open_ctree failed 14:59:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:49 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xb, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000006f07)=""/249, 0xff50}], 0x333) fcntl$setstatus(r0, 0x4, 0x20000000802) readv(r0, &(0x7f0000a6fff0)=[{&(0x7f0000000180)=""/110, 0xfffffec7}], 0x1000000000000258) ioctl$int_in(r0, 0x80000000005001, &(0x7f0000003ff8)) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") close(r0) 14:59:49 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\b', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:49 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f5", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-des3_ede-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000200)=[{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="502da457d6d9e3097bdc90ddf3247273e876b18d6f21768bfc170b27166eaf3f0bc8fdd0cacef007", 0x28}], 0x1, &(0x7f00000001c0)}], 0x1, 0x0) recvmsg(r2, &(0x7f0000b2f000)={&(0x7f00008e8000)=@nfc, 0x10, &(0x7f0000030fa0)=[{&(0x7f000009f000)=""/87, 0x57}], 0x1, &(0x7f0000590000)}, 0x0) [ 290.532931] BTRFS error (device loop1): superblock checksum mismatch 14:59:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 290.590318] BTRFS error (device loop1): open_ctree failed 14:59:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:49 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:49 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:49 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x1, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1c}, 'bridge0\x00'}}, 0x1e) write(r0, &(0x7f0000000080), 0x0) 14:59:49 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 290.871976] BTRFS error (device loop1): superblock checksum mismatch [ 290.956126] BTRFS error (device loop1): open_ctree failed 14:59:49 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000022c0)=[{0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) readv(r1, &(0x7f0000000680)=[{&(0x7f0000000280)=""/129, 0x81}], 0x1) 14:59:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="627472667303", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:49 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = dup3(r1, r0, 0x0) ioctl$TIOCSCTTY(r2, 0x8902, 0x70700000000000) 14:59:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioprio_set$pid(0x1, 0x0, 0x2000) 14:59:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:50 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:50 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="627472667305", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:50 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) connect$inet6(r1, &(0x7f00008c0000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$sock_buf(r1, 0x1, 0x4, &(0x7f0000000100)=""/4096, &(0x7f0000001100)=0x1c) 14:59:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:50 executing program 6: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x8, 0x0, 0x7fff) [ 291.426177] BTRFS error (device loop1): superblock checksum mismatch 14:59:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 291.504306] BTRFS error (device loop1): open_ctree failed 14:59:50 executing program 5: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) fallocate(r0, 0x1, 0x80000000, 0x20000005) fallocate(r0, 0x0, 0x0, 0x80003ff) 14:59:50 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000040)) 14:59:50 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:50 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) unshare(0x2000400) ioctl$int_out(r1, 0x80004520, &(0x7f0000000080)) 14:59:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:50 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000040)) 14:59:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 291.868180] BTRFS error (device loop1): superblock checksum mismatch 14:59:50 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\a', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 291.957125] BTRFS error (device loop1): open_ctree failed 14:59:50 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000040)) 14:59:50 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000040)) 14:59:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)="2e2f66696c6531ff", 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:50 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f4", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:51 executing program 5: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) fallocate(r0, 0x1, 0x80000000, 0x20000005) fallocate(r0, 0x0, 0x0, 0x80003ff) 14:59:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\b', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:51 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000040)) 14:59:51 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000040)) 14:59:51 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:51 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsH', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="627472667310", &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) [ 292.552420] BTRFS error (device loop1): superblock checksum mismatch 14:59:51 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086610, 0x0) 14:59:51 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000040)) [ 292.594528] BTRFS error (device loop1): open_ctree failed 14:59:51 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)="2e2f66696c653105", 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:51 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) 14:59:51 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000f, &(0x7f00001c9fff)="03", 0x1) [ 292.959129] BTRFS error (device loop1): superblock checksum mismatch [ 292.980747] BTRFS error (device loop1): open_ctree failed 14:59:51 executing program 5: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) fallocate(r0, 0x1, 0x80000000, 0x20000005) fallocate(r0, 0x0, 0x0, 0x80003ff) 14:59:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:59:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:51 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) 14:59:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f"]) 14:59:51 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)=ANY=[]) [ 293.099324] WARNING: CPU: 1 PID: 20780 at fs/btrfs/volumes.c:1071 close_fs_devices+0xbf0/0xfd0 [ 293.108128] Kernel panic - not syncing: panic_on_warn set ... [ 293.108128] [ 293.115508] CPU: 1 PID: 20780 Comm: syz-executor0 Not tainted 4.18.0-rc3+ #136 [ 293.122873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.132229] Call Trace: [ 293.134837] dump_stack+0x1c9/0x2b4 [ 293.138484] ? dump_stack_print_info.cold.2+0x52/0x52 [ 293.143702] panic+0x238/0x4e7 [ 293.146911] ? add_taint.cold.5+0x16/0x16 [ 293.151079] ? __warn.cold.8+0x148/0x1ba [ 293.155157] ? close_fs_devices+0xbf0/0xfd0 [ 293.159488] __warn.cold.8+0x163/0x1ba [ 293.163383] ? close_fs_devices+0xbf0/0xfd0 [ 293.167727] report_bug+0x252/0x2d0 [ 293.171371] do_error_trap+0x1fc/0x4d0 [ 293.175272] ? trace_hardirqs_on+0xd/0x10 [ 293.179433] ? math_error+0x3e0/0x3e0 [ 293.183248] ? note_gp_changes+0x550/0x550 [ 293.187496] ? __blkdev_put+0x3f1/0x830 [ 293.191492] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 293.196349] do_invalid_op+0x1b/0x20 [ 293.200076] invalid_op+0x14/0x20 [ 293.203538] RIP: 0010:close_fs_devices+0xbf0/0xfd0 [ 293.208463] Code: 54 af fe 0f 0b e8 30 54 af fe 0f 0b 48 89 f7 e8 56 2e ed fe e9 de f5 ff ff e8 1c 54 af fe 0f 0b e9 fd fd ff ff e8 10 54 af fe <0f> 0b e9 a8 fd ff ff 48 8b bd 58 fd ff ff e8 ed 2e ed fe e9 35 fd [ 293.227862] RSP: 0018:ffff880184b47050 EFLAGS: 00010212 [ 293.233236] RAX: 0000000000040000 RBX: 0000000000000001 RCX: ffffc90001e04000 [ 293.240516] RDX: 00000000000040cf RSI: ffffffff82ccb7c0 RDI: 0000000000000007 [ 293.247797] RBP: ffff880184b47350 R08: ffff8801ad5ec140 R09: 0000000000000006 [ 293.255070] R10: ffff8801ad5ec140 R11: 0000000000000000 R12: ffffed0030968e2d [ 293.262341] R13: 1ffff10030968e1d R14: ffff880184b470e8 R15: ffff8801d2c3d688 [ 293.269629] ? close_fs_devices+0xbf0/0xfd0 [ 293.273971] ? btrfs_alloc_device+0x8e0/0x8e0 [ 293.278478] ? do_raw_spin_unlock+0xa7/0x2f0 [ 293.282900] ? kasan_check_write+0x14/0x20 [ 293.287140] ? wake_up_q+0xb3/0x100 [ 293.290774] ? __mutex_unlock_slowpath+0x439/0x8c0 [ 293.295699] ? wait_for_completion+0x8d0/0x8d0 [ 293.300289] btrfs_close_devices+0x29/0x150 [ 293.304601] btrfs_mount_root+0x143c/0x1e90 [ 293.308927] ? btrfs_decode_error+0x70/0x70 [ 293.313252] ? save_stack+0x43/0xd0 [ 293.316865] ? __kasan_slab_free+0x11a/0x170 [ 293.321254] ? kasan_slab_free+0xe/0x10 [ 293.325211] ? kfree+0xd9/0x260 [ 293.328477] ? mount_fs+0xae/0x328 [ 293.332002] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 293.336748] ? do_mount+0x581/0x30e0 [ 293.340444] ? ksys_mount+0x12d/0x140 [ 293.344228] ? __x64_sys_mount+0xbe/0x150 [ 293.348361] ? do_syscall_64+0x1b9/0x820 [ 293.352411] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.357764] ? kasan_check_read+0x11/0x20 [ 293.361898] ? do_raw_spin_unlock+0xa7/0x2f0 [ 293.366290] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 293.370859] ? do_raw_spin_lock+0xc1/0x200 [ 293.375084] mount_fs+0xae/0x328 [ 293.378440] ? debug_check_no_obj_freed+0x30b/0x595 [ 293.383449] vfs_kern_mount.part.34+0xdc/0x4e0 [ 293.388023] ? may_umount+0xb0/0xb0 [ 293.391656] ? kfree+0x111/0x260 [ 293.395010] ? btrfs_mount+0x84c/0x215e [ 293.398975] vfs_kern_mount+0x40/0x60 [ 293.402762] btrfs_mount+0x4a9/0x215e [ 293.406551] ? kasan_check_read+0x11/0x20 [ 293.410681] ? rcu_is_watching+0x8c/0x150 [ 293.414823] ? btrfs_remount+0x1710/0x1710 [ 293.419046] ? __lockdep_init_map+0x105/0x590 [ 293.423529] ? __lockdep_init_map+0x105/0x590 [ 293.428014] ? lockdep_init_map+0x9/0x10 [ 293.432064] ? __init_waitqueue_head+0x9e/0x150 [ 293.436719] ? init_wait_entry+0x1c0/0x1c0 [ 293.440938] ? memcpy+0x45/0x50 [ 293.444209] ? alloc_vfsmnt+0x779/0x9f0 [ 293.448166] ? mnt_free_id.isra.27+0x60/0x60 [ 293.452563] ? graph_lock+0x170/0x170 [ 293.456347] ? rcu_pm_notify+0xc0/0xc0 [ 293.460219] ? qxl_cursor_atomic_update+0x2c0/0x1430 [ 293.465317] ? find_held_lock+0x36/0x1c0 [ 293.469371] ? lock_downgrade+0x8f0/0x8f0 [ 293.473508] mount_fs+0xae/0x328 [ 293.476859] ? btrfs_remount+0x1710/0x1710 [ 293.481091] ? mount_fs+0xae/0x328 [ 293.484616] ? mpi_free.cold.1+0x19/0x19 [ 293.488665] vfs_kern_mount.part.34+0xdc/0x4e0 [ 293.493235] ? may_umount+0xb0/0xb0 [ 293.496851] ? _raw_read_unlock+0x22/0x30 [ 293.500981] ? __get_fs_type+0x97/0xc0 [ 293.504871] do_mount+0x581/0x30e0 [ 293.508398] ? do_raw_spin_unlock+0xa7/0x2f0 [ 293.512796] ? copy_mount_string+0x40/0x40 [ 293.517040] ? copy_mount_options+0x5f/0x380 [ 293.521438] ? rcu_read_lock_sched_held+0x108/0x120 [ 293.526440] ? kmem_cache_alloc_trace+0x616/0x780 [ 293.531272] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 293.536797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.542318] ? copy_mount_options+0x285/0x380 [ 293.546813] ksys_mount+0x12d/0x140 [ 293.550429] __x64_sys_mount+0xbe/0x150 [ 293.554389] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 293.559394] do_syscall_64+0x1b9/0x820 [ 293.563268] ? finish_task_switch+0x1d3/0x890 [ 293.567748] ? syscall_return_slowpath+0x5e0/0x5e0 [ 293.572661] ? syscall_return_slowpath+0x31d/0x5e0 [ 293.577579] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.583104] ? retint_user+0x18/0x18 [ 293.586817] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 293.591655] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.596846] RIP: 0033:0x4585da [ 293.600019] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 293.619251] RSP: 002b:00007f3b14630a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 293.626960] RAX: ffffffffffffffda RBX: 00007f3b14630b30 RCX: 00000000004585da [ 293.634216] RDX: 00007f3b14630ad0 RSI: 0000000020000100 RDI: 00007f3b14630af0 [ 293.641486] RBP: 0000000020000100 R08: 00007f3b14630b30 R09: 00007f3b14630ad0 [ 293.648743] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000013 [ 293.655995] R13: 0000000000000000 R14: 00000000004d3840 R15: 0000000000000000 [ 293.664161] Dumping ftrace buffer: [ 293.667905] (ftrace buffer empty) [ 293.671597] Kernel Offset: disabled [ 293.675207] Rebooting in 86400 seconds..