.690310][T21741] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1622.696561][T21741] ? security_file_ioctl+0x93/0xc0 [ 1622.701768][T21741] ksys_ioctl+0xab/0xd0 [ 1622.706028][T21741] __x64_sys_ioctl+0x73/0xb0 [ 1622.710614][T21741] do_syscall_64+0x103/0x610 [ 1622.715210][T21741] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1622.721103][T21741] RIP: 0033:0x4582b9 [ 1622.725028][T21741] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1622.745349][T21741] RSP: 002b:00007fc66fa1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1622.753869][T21741] RAX: ffffffffffffffda RBX: 00007fc66fa1bc90 RCX: 00000000004582b9 [ 1622.762013][T21741] RDX: 0000000020000040 RSI: 0000000000005423 RDI: 0000000000000005 [ 1622.770190][T21741] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1622.778946][T21741] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc66fa1c6d4 [ 1622.786922][T21741] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 15:08:50 executing program 0 (fault-call:4 fault-nth:9): socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:08:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x4000, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:08:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a006801000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:08:50 executing program 1: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) [ 1622.924020][T21769] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b68920efd9a devid 0 transid 756082810144684242 /dev/loop2 [ 1622.985096][T21858] FAULT_INJECTION: forcing a failure. [ 1622.985096][T21858] name failslab, interval 1, probability 0, space 0, times 0 [ 1623.015612][T21858] CPU: 1 PID: 21858 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #56 [ 1623.023732][T21858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1623.033889][T21858] Call Trace: [ 1623.037207][T21858] dump_stack+0x172/0x1f0 [ 1623.041561][T21858] should_fail.cold+0xa/0x15 [ 1623.046157][T21858] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1623.051985][T21858] ? ___might_sleep+0x163/0x280 [ 1623.057097][T21858] __should_failslab+0x121/0x190 [ 1623.062052][T21858] should_failslab+0x9/0x14 [ 1623.066947][T21858] kmem_cache_alloc_node_trace+0x270/0x720 [ 1623.072954][T21858] __kmalloc_node_track_caller+0x3d/0x70 [ 1623.078678][T21858] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1623.084086][T21858] __alloc_skb+0x10b/0x5e0 [ 1623.088594][T21858] ? skb_trim+0x190/0x190 [ 1623.093014][T21858] ? kobject_uevent_env+0x2fb/0x1030 [ 1623.098311][T21858] ? rcu_read_lock_sched_held+0x110/0x130 [ 1623.104265][T21858] alloc_uevent_skb+0x83/0x1e2 [ 1623.109123][T21858] ? rx_queue_attr_store+0x90/0x90 [ 1623.114239][T21858] kobject_uevent_env+0xb96/0x1030 [ 1623.119905][T21858] kobject_uevent+0x20/0x26 [ 1623.124420][T21858] kobject_put.cold+0x177/0x2ec [ 1623.129543][T21858] net_rx_queue_update_kobjects+0x359/0x470 [ 1623.135635][T21858] netdev_unregister_kobject+0x155/0x1f0 [ 1623.141447][T21858] rollback_registered_many+0x7c9/0xfd0 [ 1623.146995][T21858] ? generic_xdp_install+0x3d0/0x3d0 [ 1623.152467][T21858] ? mutex_trylock+0x1e0/0x1e0 [ 1623.157318][T21858] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1623.162789][T21858] rollback_registered+0x109/0x1d0 [ 1623.168091][T21858] ? rollback_registered_many+0xfd0/0xfd0 [ 1623.173905][T21858] ? try_to_del_timer_sync+0xc1/0x110 [ 1623.179379][T21858] unregister_netdevice_queue+0x1ee/0x2c0 [ 1623.185440][T21858] unregister_netdev+0x1d/0x30 [ 1623.190209][T21858] slip_close+0x16d/0x1d0 [ 1623.194626][T21858] ? slip_ioctl+0x6d0/0x6d0 [ 1623.199224][T21858] tty_ldisc_close.isra.0+0x100/0x180 [ 1623.204689][T21858] tty_set_ldisc+0x1f8/0x690 [ 1623.209373][T21858] tty_ioctl+0x5dc/0x15c0 [ 1623.213762][T21858] ? tty_register_device+0x40/0x40 [ 1623.219072][T21858] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1623.225320][T21858] ? tomoyo_init_request_info+0x105/0x1d0 [ 1623.231050][T21858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1623.237522][T21858] ? tomoyo_path_number_perm+0x263/0x520 [ 1623.243171][T21858] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1623.248995][T21858] ? ___might_sleep+0x163/0x280 [ 1623.254031][T21858] ? tty_register_device+0x40/0x40 [ 1623.259340][T21858] do_vfs_ioctl+0xd6e/0x1390 [ 1623.264209][T21858] ? ioctl_preallocate+0x210/0x210 [ 1623.269407][T21858] ? selinux_file_mprotect+0x620/0x620 [ 1623.274951][T21858] ? __fget+0x381/0x550 [ 1623.279113][T21858] ? ksys_dup3+0x3e0/0x3e0 [ 1623.283828][T21858] ? tomoyo_file_ioctl+0x23/0x30 [ 1623.288780][T21858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1623.295025][T21858] ? security_file_ioctl+0x93/0xc0 [ 1623.300317][T21858] ksys_ioctl+0xab/0xd0 [ 1623.304481][T21858] __x64_sys_ioctl+0x73/0xb0 [ 1623.309077][T21858] do_syscall_64+0x103/0x610 [ 1623.314191][T21858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1623.320493][T21858] RIP: 0033:0x4582b9 [ 1623.324389][T21858] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1623.344534][T21858] RSP: 002b:00007fc66fa1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1623.353167][T21858] RAX: ffffffffffffffda RBX: 00007fc66fa1bc90 RCX: 00000000004582b9 [ 1623.361139][T21858] RDX: 0000000020000040 RSI: 0000000000005423 RDI: 0000000000000005 [ 1623.369117][T21858] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1623.377281][T21858] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc66fa1c6d4 [ 1623.385259][T21858] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 15:08:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0xd000, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:08:50 executing program 0 (fault-call:4 fault-nth:10): socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:08:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\b', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:08:50 executing program 1: r0 = socket$inet6(0xa, 0xffffffffffffffff, 0x7fff) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x7) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000000c0)={0x1, r2}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:08:50 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x18100, 0x0) clock_settime(0x2, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x200, 0x0) renameat(r1, &(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00') setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000140)={{0x3f, @loopback, 0x4e20, 0x0, 'sed\x00', 0x6, 0x7, 0x25}, {@multicast2, 0x4e20, 0x10000, 0x1, 0xfffffffffffffffd, 0x7}}, 0x44) 15:08:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x1a000, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1623.652441][T22007] FAULT_INJECTION: forcing a failure. [ 1623.652441][T22007] name failslab, interval 1, probability 0, space 0, times 0 [ 1623.708526][T22007] CPU: 0 PID: 22007 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #56 [ 1623.717368][T22007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1623.727707][T22007] Call Trace: [ 1623.731023][T22007] dump_stack+0x172/0x1f0 [ 1623.735394][T22007] should_fail.cold+0xa/0x15 [ 1623.741215][T22007] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1623.747567][T22007] ? ___might_sleep+0x163/0x280 [ 1623.752689][T22007] __should_failslab+0x121/0x190 [ 1623.757636][T22007] should_failslab+0x9/0x14 [ 1623.762171][T22007] __kmalloc+0x2dc/0x740 [ 1623.766417][T22007] ? kobject_uevent_env+0x2fb/0x1030 [ 1623.771904][T22007] ? rcu_read_lock_sched_held+0x110/0x130 [ 1623.777625][T22007] ? kobject_get_path+0xc4/0x1b0 [ 1623.782739][T22007] kobject_get_path+0xc4/0x1b0 [ 1623.787509][T22007] kobject_uevent_env+0x31f/0x1030 [ 1623.798551][T22007] kobject_uevent+0x20/0x26 [ 1623.803305][T22007] kobject_put.cold+0x177/0x2ec [ 1623.808179][T22007] netdev_queue_update_kobjects+0x250/0x3d0 [ 1623.814110][T22007] netdev_unregister_kobject+0x162/0x1f0 [ 1623.819854][T22007] rollback_registered_many+0x7c9/0xfd0 [ 1623.825512][T22007] ? generic_xdp_install+0x3d0/0x3d0 [ 1623.831269][T22007] ? mutex_trylock+0x1e0/0x1e0 [ 1623.836037][T22007] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1623.841504][T22007] rollback_registered+0x109/0x1d0 [ 1623.846808][T22007] ? rollback_registered_many+0xfd0/0xfd0 [ 1623.852594][T22007] ? try_to_del_timer_sync+0xc1/0x110 [ 1623.858164][T22007] unregister_netdevice_queue+0x1ee/0x2c0 [ 1623.864309][T22007] unregister_netdev+0x1d/0x30 [ 1623.869104][T22007] slip_close+0x16d/0x1d0 [ 1623.873523][T22007] ? slip_ioctl+0x6d0/0x6d0 [ 1623.878145][T22007] tty_ldisc_close.isra.0+0x100/0x180 [ 1623.883523][T22007] tty_set_ldisc+0x1f8/0x690 [ 1623.888208][T22007] tty_ioctl+0x5dc/0x15c0 [ 1623.892894][T22007] ? tty_register_device+0x40/0x40 [ 1623.898189][T22007] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1623.904430][T22007] ? tomoyo_init_request_info+0x105/0x1d0 [ 1623.910300][T22007] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1623.916799][T22007] ? tomoyo_path_number_perm+0x263/0x520 [ 1623.922508][T22007] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1623.928336][T22007] ? ___might_sleep+0x163/0x280 [ 1623.933800][T22007] ? tty_register_device+0x40/0x40 [ 1623.938915][T22007] do_vfs_ioctl+0xd6e/0x1390 [ 1623.943654][T22007] ? ioctl_preallocate+0x210/0x210 [ 1623.948768][T22007] ? selinux_file_mprotect+0x620/0x620 [ 1623.954228][T22007] ? __fget+0x381/0x550 [ 1623.958570][T22007] ? ksys_dup3+0x3e0/0x3e0 [ 1623.963083][T22007] ? tomoyo_file_ioctl+0x23/0x30 [ 1623.968023][T22007] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1623.974266][T22007] ? security_file_ioctl+0x93/0xc0 [ 1623.979644][T22007] ksys_ioctl+0xab/0xd0 [ 1623.983807][T22007] __x64_sys_ioctl+0x73/0xb0 [ 1623.988398][T22007] do_syscall_64+0x103/0x610 [ 1623.992993][T22007] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1623.998973][T22007] RIP: 0033:0x4582b9 [ 1624.002955][T22007] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1624.022737][T22007] RSP: 002b:00007fc66fa1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1624.031332][T22007] RAX: ffffffffffffffda RBX: 00007fc66fa1bc90 RCX: 00000000004582b9 [ 1624.039562][T22007] RDX: 0000000020000040 RSI: 0000000000005423 RDI: 0000000000000005 [ 1624.047986][T22007] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 15:08:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a006c01000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:08:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b6c920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1624.056135][T22007] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc66fa1c6d4 [ 1624.064270][T22007] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 15:08:51 executing program 0 (fault-call:4 fault-nth:11): socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:08:51 executing program 1: r0 = socket$inet6(0xa, 0x6, 0xa4a2) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) setsockopt$inet_dccp_int(r1, 0x21, 0x1, &(0x7f0000000040)=0x40, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:08:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:08:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x100000, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1624.260019][T22095] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b6c920efd9a devid 0 transid 756082810144684242 /dev/loop2 15:08:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x3d, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e23, 0x6, @rand_addr="aebc12730309087772a5e2b9af403dc4", 0xca}, 0x1c) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x4000) write$P9_RATTACH(r1, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x8, 0x0, 0x6}}, 0x14) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f0000000140)=0x40) [ 1624.312991][T22193] FAULT_INJECTION: forcing a failure. [ 1624.312991][T22193] name failslab, interval 1, probability 0, space 0, times 0 [ 1624.327090][T22193] CPU: 0 PID: 22193 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #56 [ 1624.335496][T22193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1624.346569][T22193] Call Trace: [ 1624.349860][T22193] dump_stack+0x172/0x1f0 [ 1624.354323][T22193] should_fail.cold+0xa/0x15 [ 1624.359220][T22193] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1624.365050][T22193] ? ___might_sleep+0x163/0x280 [ 1624.369915][T22193] __should_failslab+0x121/0x190 [ 1624.374939][T22193] should_failslab+0x9/0x14 [ 1624.379459][T22193] kmem_cache_alloc_node+0x264/0x710 [ 1624.385092][T22193] ? vprintk_func+0x86/0x189 [ 1624.389870][T22193] __alloc_skb+0xd5/0x5e0 [ 1624.394197][T22193] ? skb_trim+0x190/0x190 [ 1624.398692][T22193] ? kobject_uevent_env+0x2fb/0x1030 [ 1624.403968][T22193] ? rcu_read_lock_sched_held+0x110/0x130 [ 1624.409685][T22193] alloc_uevent_skb+0x83/0x1e2 [ 1624.414463][T22193] ? netdev_queue_attr_store+0x90/0x90 [ 1624.419945][T22193] kobject_uevent_env+0xb96/0x1030 [ 1624.425069][T22193] kobject_uevent+0x20/0x26 [ 1624.429650][T22193] kobject_put.cold+0x177/0x2ec [ 1624.434497][T22193] netdev_queue_update_kobjects+0x250/0x3d0 [ 1624.440408][T22193] netdev_unregister_kobject+0x162/0x1f0 [ 1624.446036][T22193] rollback_registered_many+0x7c9/0xfd0 [ 1624.451804][T22193] ? generic_xdp_install+0x3d0/0x3d0 [ 1624.457391][T22193] ? mutex_trylock+0x1e0/0x1e0 [ 1624.462330][T22193] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1624.467796][T22193] rollback_registered+0x109/0x1d0 [ 1624.473096][T22193] ? rollback_registered_many+0xfd0/0xfd0 [ 1624.478898][T22193] ? try_to_del_timer_sync+0xc1/0x110 [ 1624.484280][T22193] unregister_netdevice_queue+0x1ee/0x2c0 [ 1624.490042][T22193] unregister_netdev+0x1d/0x30 [ 1624.494812][T22193] slip_close+0x16d/0x1d0 [ 1624.499141][T22193] ? slip_ioctl+0x6d0/0x6d0 [ 1624.503745][T22193] tty_ldisc_close.isra.0+0x100/0x180 [ 1624.509120][T22193] tty_set_ldisc+0x1f8/0x690 [ 1624.513744][T22193] tty_ioctl+0x5dc/0x15c0 [ 1624.518089][T22193] ? tty_register_device+0x40/0x40 [ 1624.523350][T22193] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1624.529588][T22193] ? tomoyo_init_request_info+0x105/0x1d0 [ 1624.535318][T22193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1624.541575][T22193] ? tomoyo_path_number_perm+0x263/0x520 [ 1624.547721][T22193] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1624.553622][T22193] ? ___might_sleep+0x163/0x280 [ 1624.558476][T22193] ? tty_register_device+0x40/0x40 [ 1624.566138][T22193] do_vfs_ioctl+0xd6e/0x1390 [ 1624.581088][T22193] ? ioctl_preallocate+0x210/0x210 [ 1624.586335][T22193] ? selinux_file_mprotect+0x620/0x620 [ 1624.591894][T22193] ? __fget+0x381/0x550 [ 1624.596304][T22193] ? ksys_dup3+0x3e0/0x3e0 [ 1624.600876][T22193] ? tomoyo_file_ioctl+0x23/0x30 [ 1624.605811][T22193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1624.612061][T22193] ? security_file_ioctl+0x93/0xc0 [ 1624.617184][T22193] ksys_ioctl+0xab/0xd0 [ 1624.621346][T22193] __x64_sys_ioctl+0x73/0xb0 [ 1624.626114][T22193] do_syscall_64+0x103/0x610 [ 1624.630975][T22193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1624.637446][T22193] RIP: 0033:0x4582b9 [ 1624.641450][T22193] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1624.661906][T22193] RSP: 002b:00007fc66fa1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1624.670318][T22193] RAX: ffffffffffffffda RBX: 00007fc66fa1bc90 RCX: 00000000004582b9 [ 1624.678500][T22193] RDX: 0000000020000040 RSI: 0000000000005423 RDI: 0000000000000005 [ 1624.686660][T22193] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1624.694635][T22193] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc66fa1c6d4 [ 1624.702600][T22193] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 15:08:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a007401000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:08:52 executing program 0 (fault-call:4 fault-nth:12): socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:08:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b74920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:08:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x3ffdb8, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1624.937483][T22278] FAULT_INJECTION: forcing a failure. [ 1624.937483][T22278] name failslab, interval 1, probability 0, space 0, times 0 [ 1624.968403][T22278] CPU: 0 PID: 22278 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #56 [ 1624.976762][T22278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1624.987169][T22278] Call Trace: [ 1624.987197][T22278] dump_stack+0x172/0x1f0 [ 1624.987224][T22278] should_fail.cold+0xa/0x15 [ 1624.999507][T22278] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1625.005322][T22278] ? ___might_sleep+0x163/0x280 [ 1625.005343][T22278] __should_failslab+0x121/0x190 [ 1625.005357][T22278] should_failslab+0x9/0x14 [ 1625.005372][T22278] __kmalloc+0x2dc/0x740 [ 1625.005388][T22278] ? kobject_uevent_env+0x2fb/0x1030 [ 1625.005408][T22278] ? rcu_read_lock_sched_held+0x110/0x130 [ 1625.035484][T22278] ? kobject_get_path+0xc4/0x1b0 [ 1625.040570][T22278] kobject_get_path+0xc4/0x1b0 [ 1625.045339][T22278] kobject_uevent_env+0x31f/0x1030 [ 1625.050463][T22278] kobject_uevent+0x20/0x26 [ 1625.055053][T22278] kobject_put.cold+0x177/0x2ec [ 1625.059930][T22278] netdev_queue_update_kobjects+0x250/0x3d0 [ 1625.065834][T22278] netdev_unregister_kobject+0x162/0x1f0 [ 1625.071559][T22278] rollback_registered_many+0x7c9/0xfd0 [ 1625.077370][T22278] ? generic_xdp_install+0x3d0/0x3d0 [ 1625.082758][T22278] ? mutex_trylock+0x1e0/0x1e0 [ 1625.087548][T22278] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1625.092844][T22278] rollback_registered+0x109/0x1d0 [ 1625.097968][T22278] ? rollback_registered_many+0xfd0/0xfd0 [ 1625.104735][T22278] ? try_to_del_timer_sync+0xc1/0x110 [ 1625.110427][T22278] unregister_netdevice_queue+0x1ee/0x2c0 [ 1625.116156][T22278] unregister_netdev+0x1d/0x30 [ 1625.121067][T22278] slip_close+0x16d/0x1d0 [ 1625.125684][T22278] ? slip_ioctl+0x6d0/0x6d0 [ 1625.130306][T22278] tty_ldisc_close.isra.0+0x100/0x180 [ 1625.135687][T22278] tty_set_ldisc+0x1f8/0x690 [ 1625.140372][T22278] tty_ioctl+0x5dc/0x15c0 [ 1625.144810][T22278] ? tty_register_device+0x40/0x40 [ 1625.150022][T22278] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1625.156266][T22278] ? tomoyo_init_request_info+0x105/0x1d0 [ 1625.162102][T22278] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1625.168736][T22278] ? tomoyo_path_number_perm+0x263/0x520 [ 1625.174385][T22278] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1625.180295][T22278] ? ___might_sleep+0x163/0x280 [ 1625.185540][T22278] ? tty_register_device+0x40/0x40 [ 1625.190655][T22278] do_vfs_ioctl+0xd6e/0x1390 [ 1625.195358][T22278] ? ioctl_preallocate+0x210/0x210 [ 1625.200472][T22278] ? selinux_file_mprotect+0x620/0x620 [ 1625.205936][T22278] ? __fget+0x381/0x550 [ 1625.210274][T22278] ? ksys_dup3+0x3e0/0x3e0 [ 1625.214701][T22278] ? tomoyo_file_ioctl+0x23/0x30 [ 1625.219815][T22278] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1625.226221][T22278] ? security_file_ioctl+0x93/0xc0 [ 1625.231641][T22278] ksys_ioctl+0xab/0xd0 [ 1625.235831][T22278] __x64_sys_ioctl+0x73/0xb0 [ 1625.240951][T22278] do_syscall_64+0x103/0x610 [ 1625.245549][T22278] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1625.251473][T22278] RIP: 0033:0x4582b9 [ 1625.255460][T22278] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1625.275436][T22278] RSP: 002b:00007fc66fa1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1625.283849][T22278] RAX: ffffffffffffffda RBX: 00007fc66fa1bc90 RCX: 00000000004582b9 [ 1625.292239][T22278] RDX: 0000000020000040 RSI: 0000000000005423 RDI: 0000000000000005 [ 1625.300477][T22278] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1625.308546][T22278] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc66fa1c6d4 [ 1625.316693][T22278] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 15:08:52 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000040)="3e465ff7e166d6f8f5e3fb090001ca19cfe44bbad46de666fd61870481def91c0ca4196fea9a0c195db4c2dd3bc969e7564ebaff0f30006e3e3b3d82350f7d317fe01a1f107a9c2c3d79c2dc12576c59") connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:08:52 executing program 0 (fault-call:4 fault-nth:13): socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:08:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a007a01000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1625.459300][T22319] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b74920efd9a devid 0 transid 756082810144684242 /dev/loop2 15:08:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0xa00100, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1625.520640][T22423] FAULT_INJECTION: forcing a failure. [ 1625.520640][T22423] name failslab, interval 1, probability 0, space 0, times 0 [ 1625.553777][T22423] CPU: 1 PID: 22423 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #56 [ 1625.561907][T22423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1625.571973][T22423] Call Trace: [ 1625.575290][T22423] dump_stack+0x172/0x1f0 [ 1625.579643][T22423] should_fail.cold+0xa/0x15 [ 1625.584259][T22423] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1625.590097][T22423] ? ___might_sleep+0x163/0x280 [ 1625.594964][T22423] __should_failslab+0x121/0x190 [ 1625.599910][T22423] should_failslab+0x9/0x14 [ 1625.604419][T22423] kmem_cache_alloc_trace+0x2d1/0x760 [ 1625.610023][T22423] ? mutex_trylock+0x1e0/0x1e0 [ 1625.614796][T22423] ? kasan_check_write+0x14/0x20 [ 1625.620028][T22423] kobject_uevent_env+0x2fb/0x1030 [ 1625.631719][T22423] ? wait_for_completion+0x440/0x440 [ 1625.637286][T22423] kobject_uevent+0x20/0x26 [ 1625.642261][T22423] device_del+0x758/0xc40 [ 1625.646646][T22423] ? __device_links_no_driver+0x250/0x250 [ 1625.652606][T22423] ? mutex_unlock+0xd/0x10 [ 1625.657117][T22423] ? pm_runtime_set_memalloc_noio+0x11a/0x180 [ 1625.663469][T22423] netdev_unregister_kobject+0x19e/0x1f0 [ 1625.669197][T22423] rollback_registered_many+0x7c9/0xfd0 [ 1625.674852][T22423] ? generic_xdp_install+0x3d0/0x3d0 [ 1625.680241][T22423] ? mutex_trylock+0x1e0/0x1e0 [ 1625.685021][T22423] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1625.690327][T22423] rollback_registered+0x109/0x1d0 [ 1625.695549][T22423] ? rollback_registered_many+0xfd0/0xfd0 [ 1625.701282][T22423] ? try_to_del_timer_sync+0xc1/0x110 [ 1625.706946][T22423] unregister_netdevice_queue+0x1ee/0x2c0 [ 1625.712677][T22423] unregister_netdev+0x1d/0x30 [ 1625.718049][T22423] slip_close+0x16d/0x1d0 [ 1625.722389][T22423] ? slip_ioctl+0x6d0/0x6d0 [ 1625.727160][T22423] tty_ldisc_close.isra.0+0x100/0x180 [ 1625.733433][T22423] tty_set_ldisc+0x1f8/0x690 [ 1625.738258][T22423] tty_ioctl+0x5dc/0x15c0 [ 1625.742861][T22423] ? tty_register_device+0x40/0x40 [ 1625.748416][T22423] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1625.754768][T22423] ? tomoyo_init_request_info+0x105/0x1d0 [ 1625.760494][T22423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1625.766825][T22423] ? tomoyo_path_number_perm+0x263/0x520 [ 1625.772554][T22423] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1625.778462][T22423] ? ___might_sleep+0x163/0x280 [ 1625.783495][T22423] ? tty_register_device+0x40/0x40 [ 1625.788617][T22423] do_vfs_ioctl+0xd6e/0x1390 [ 1625.798866][T22423] ? ioctl_preallocate+0x210/0x210 [ 1625.803982][T22423] ? selinux_file_mprotect+0x620/0x620 [ 1625.809454][T22423] ? __fget+0x381/0x550 [ 1625.813630][T22423] ? ksys_dup3+0x3e0/0x3e0 [ 1625.818084][T22423] ? tomoyo_file_ioctl+0x23/0x30 [ 1625.823025][T22423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1625.829369][T22423] ? security_file_ioctl+0x93/0xc0 [ 1625.834530][T22423] ksys_ioctl+0xab/0xd0 [ 1625.838788][T22423] __x64_sys_ioctl+0x73/0xb0 [ 1625.843386][T22423] do_syscall_64+0x103/0x610 [ 1625.848085][T22423] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1625.853973][T22423] RIP: 0033:0x4582b9 [ 1625.857871][T22423] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1625.877788][T22423] RSP: 002b:00007fc66fa1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1625.886205][T22423] RAX: ffffffffffffffda RBX: 00007fc66fa1bc90 RCX: 00000000004582b9 [ 1625.894182][T22423] RDX: 0000000020000040 RSI: 0000000000005423 RDI: 0000000000000005 [ 1625.902162][T22423] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1625.910147][T22423] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc66fa1c6d4 15:08:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\n', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:08:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) socketpair$unix(0x1, 0x100000000000003, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="c4000000288a00"/16, 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmsg(r2, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c80)=""/74, 0x4a}, {&(0x7f0000000e00)=""/220, 0xdc}], 0x2}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x8) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80, 0x0) ioctl$IOC_PR_CLEAR(r4, 0x401070cd, &(0x7f0000000100)={0x80000000}) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000080)=""/113) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) [ 1625.918133][T22423] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 15:08:53 executing program 0 (fault-call:4 fault-nth:14): socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:08:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b7a920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:08:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0fff01000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:08:53 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) fstat(r0, &(0x7f00000000c0)) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @local, 0x8001}, 0x1c) [ 1626.190462][T22480] FAULT_INJECTION: forcing a failure. [ 1626.190462][T22480] name failslab, interval 1, probability 0, space 0, times 0 [ 1626.253848][T22480] CPU: 0 PID: 22480 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #56 [ 1626.262360][T22480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1626.272560][T22480] Call Trace: [ 1626.275962][T22480] dump_stack+0x172/0x1f0 [ 1626.275989][T22480] should_fail.cold+0xa/0x15 [ 1626.285016][T22480] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1626.291158][T22480] ? ___might_sleep+0x163/0x280 [ 1626.296110][T22480] __should_failslab+0x121/0x190 [ 1626.301208][T22480] should_failslab+0x9/0x14 [ 1626.306168][T22480] kmem_cache_alloc_node_trace+0x270/0x720 [ 1626.312169][T22480] __kmalloc_node_track_caller+0x3d/0x70 [ 1626.317911][T22480] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1626.323284][T22480] __alloc_skb+0x10b/0x5e0 [ 1626.327862][T22480] ? skb_trim+0x190/0x190 [ 1626.332772][T22480] ? kobject_uevent_env+0x2fb/0x1030 [ 1626.338146][T22480] ? rcu_read_lock_sched_held+0x110/0x130 [ 1626.344131][T22480] alloc_uevent_skb+0x83/0x1e2 [ 1626.349074][T22480] ? netdev_queue_attr_store+0x90/0x90 [ 1626.354632][T22480] kobject_uevent_env+0xb96/0x1030 [ 1626.359860][T22480] kobject_uevent+0x20/0x26 [ 1626.364477][T22480] kobject_put.cold+0x177/0x2ec [ 1626.369425][T22480] netdev_queue_update_kobjects+0x250/0x3d0 [ 1626.375430][T22480] netdev_unregister_kobject+0x162/0x1f0 [ 1626.381088][T22480] rollback_registered_many+0x7c9/0xfd0 [ 1626.386811][T22480] ? generic_xdp_install+0x3d0/0x3d0 [ 1626.392148][T22480] ? mutex_trylock+0x1e0/0x1e0 [ 1626.397142][T22480] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1626.402430][T22480] rollback_registered+0x109/0x1d0 [ 1626.407558][T22480] ? rollback_registered_many+0xfd0/0xfd0 [ 1626.413643][T22480] ? try_to_del_timer_sync+0xc1/0x110 [ 1626.419265][T22480] unregister_netdevice_queue+0x1ee/0x2c0 [ 1626.425116][T22480] unregister_netdev+0x1d/0x30 [ 1626.430233][T22480] slip_close+0x16d/0x1d0 [ 1626.434641][T22480] ? slip_ioctl+0x6d0/0x6d0 [ 1626.439227][T22480] tty_ldisc_close.isra.0+0x100/0x180 [ 1626.444656][T22480] tty_set_ldisc+0x1f8/0x690 [ 1626.449358][T22480] tty_ioctl+0x5dc/0x15c0 [ 1626.453803][T22480] ? tty_register_device+0x40/0x40 [ 1626.459528][T22480] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1626.465969][T22480] ? tomoyo_init_request_info+0x105/0x1d0 [ 1626.471775][T22480] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1626.478008][T22480] ? tomoyo_path_number_perm+0x263/0x520 [ 1626.483820][T22480] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1626.489765][T22480] ? ___might_sleep+0x163/0x280 [ 1626.494623][T22480] ? tty_register_device+0x40/0x40 [ 1626.499734][T22480] do_vfs_ioctl+0xd6e/0x1390 [ 1626.504432][T22480] ? ioctl_preallocate+0x210/0x210 [ 1626.509753][T22480] ? selinux_file_mprotect+0x620/0x620 [ 1626.515489][T22480] ? __fget+0x381/0x550 [ 1626.519813][T22480] ? ksys_dup3+0x3e0/0x3e0 [ 1626.524255][T22480] ? tomoyo_file_ioctl+0x23/0x30 [ 1626.529229][T22480] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1626.535829][T22480] ? security_file_ioctl+0x93/0xc0 [ 1626.542021][T22480] ksys_ioctl+0xab/0xd0 [ 1626.546317][T22480] __x64_sys_ioctl+0x73/0xb0 [ 1626.551162][T22480] do_syscall_64+0x103/0x610 [ 1626.556019][T22480] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1626.562013][T22480] RIP: 0033:0x4582b9 [ 1626.565927][T22480] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1626.585801][T22480] RSP: 002b:00007fc66fa1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1626.594393][T22480] RAX: ffffffffffffffda RBX: 00007fc66fa1bc90 RCX: 00000000004582b9 15:08:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0xd00000, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1626.602735][T22480] RDX: 0000000020000040 RSI: 0000000000005423 RDI: 0000000000000005 [ 1626.610710][T22480] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1626.618946][T22480] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc66fa1c6d4 [ 1626.627468][T22480] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 15:08:53 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @remote, 0x2}, 0xfffffcec) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) write$P9_RMKNOD(r1, &(0x7f00000002c0)={0x14, 0x13, 0x2, {0xa2, 0x3, 0x7}}, 0x14) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000000080)={0x7, 0x2}) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000440)="19d2fc1c092a6f29c36c7cef957f07bfc51151a6dfed15dbb3c260f6c87b0a5352566e964e4ffec23eac9b3fa1bcf2af0a94366a17ea3fc3a96f861168b38fa92705f3d13da2ee8233e8ccccb0175d4b674bd8c165ef1765ab0080a8d8ea45bd2ee2b35bb991b19ac18f1c7d45ba1993d313ec599a7804ff1743a75594d8cdba4c2b82aea8c6471311c01c726e25e948ada53fb108a02bac34bb80a5c6a0f9bc3f9a06780dc2496ca6ddbb618646eca61621eb3dcd020c3ccd35ddbadb7d38a1be2cf945571763e17dec") getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000340), &(0x7f0000000400)=0x4) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f00000001c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x300, 0x70bd2c, 0x25dfdbff, {}, ["", ""]}, 0x14}}, 0x4000000) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f00000000c0)) [ 1626.678694][T22554] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b7a920efd9a devid 0 transid 756082810144684242 /dev/loop2 15:08:54 executing program 0 (fault-call:4 fault-nth:15): socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:08:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\v', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:08:54 executing program 1: socket$inet6(0xa, 0x2, 0x0) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x1000, 0x80000001}) socket$inet6(0xa, 0x4, 0x2) 15:08:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x1000000, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1626.873281][T22669] FAULT_INJECTION: forcing a failure. [ 1626.873281][T22669] name failslab, interval 1, probability 0, space 0, times 0 [ 1626.907690][T22669] CPU: 1 PID: 22669 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #56 [ 1626.915974][T22669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1626.915982][T22669] Call Trace: [ 1626.916005][T22669] dump_stack+0x172/0x1f0 [ 1626.916034][T22669] should_fail.cold+0xa/0x15 [ 1626.916060][T22669] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1626.934573][T22669] ? ___might_sleep+0x163/0x280 [ 1626.934593][T22669] __should_failslab+0x121/0x190 [ 1626.934630][T22669] should_failslab+0x9/0x14 [ 1626.945156][T22669] __kmalloc+0x2dc/0x740 [ 1626.945174][T22669] ? kobject_uevent_env+0x2fb/0x1030 [ 1626.945194][T22669] ? rcu_read_lock_sched_held+0x110/0x130 [ 1626.955016][T22669] ? kobject_get_path+0xc4/0x1b0 [ 1626.955043][T22669] kobject_get_path+0xc4/0x1b0 [ 1626.955060][T22669] kobject_uevent_env+0x31f/0x1030 [ 1626.955076][T22669] ? wait_for_completion+0x440/0x440 [ 1626.955099][T22669] kobject_uevent+0x20/0x26 [ 1626.999527][T22669] device_del+0x758/0xc40 [ 1627.003978][T22669] ? __device_links_no_driver+0x250/0x250 [ 1627.009684][T22669] ? mutex_unlock+0xd/0x10 [ 1627.014176][T22669] ? pm_runtime_set_memalloc_noio+0x11a/0x180 [ 1627.020237][T22669] netdev_unregister_kobject+0x19e/0x1f0 [ 1627.025941][T22669] rollback_registered_many+0x7c9/0xfd0 [ 1627.031750][T22669] ? generic_xdp_install+0x3d0/0x3d0 [ 1627.037047][T22669] ? mutex_trylock+0x1e0/0x1e0 [ 1627.041886][T22669] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1627.047344][T22669] rollback_registered+0x109/0x1d0 [ 1627.052766][T22669] ? rollback_registered_many+0xfd0/0xfd0 [ 1627.058504][T22669] ? try_to_del_timer_sync+0xc1/0x110 [ 1627.064567][T22669] unregister_netdevice_queue+0x1ee/0x2c0 [ 1627.070272][T22669] unregister_netdev+0x1d/0x30 [ 1627.075047][T22669] slip_close+0x16d/0x1d0 [ 1627.079361][T22669] ? slip_ioctl+0x6d0/0x6d0 [ 1627.084288][T22669] tty_ldisc_close.isra.0+0x100/0x180 [ 1627.089755][T22669] tty_set_ldisc+0x1f8/0x690 [ 1627.094525][T22669] tty_ioctl+0x5dc/0x15c0 [ 1627.098845][T22669] ? tty_register_device+0x40/0x40 [ 1627.103941][T22669] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1627.110253][T22669] ? tomoyo_init_request_info+0x105/0x1d0 [ 1627.116048][T22669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1627.122274][T22669] ? tomoyo_path_number_perm+0x263/0x520 [ 1627.127894][T22669] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1627.133789][T22669] ? ___might_sleep+0x163/0x280 [ 1627.138646][T22669] ? tty_register_device+0x40/0x40 [ 1627.143830][T22669] do_vfs_ioctl+0xd6e/0x1390 [ 1627.148497][T22669] ? ioctl_preallocate+0x210/0x210 [ 1627.153590][T22669] ? selinux_file_mprotect+0x620/0x620 [ 1627.159315][T22669] ? __fget+0x381/0x550 [ 1627.163465][T22669] ? ksys_dup3+0x3e0/0x3e0 [ 1627.167869][T22669] ? tomoyo_file_ioctl+0x23/0x30 [ 1627.172877][T22669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1627.179364][T22669] ? security_file_ioctl+0x93/0xc0 [ 1627.184765][T22669] ksys_ioctl+0xab/0xd0 [ 1627.188906][T22669] __x64_sys_ioctl+0x73/0xb0 [ 1627.194028][T22669] do_syscall_64+0x103/0x610 [ 1627.198605][T22669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1627.204481][T22669] RIP: 0033:0x4582b9 [ 1627.208363][T22669] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1627.228408][T22669] RSP: 002b:00007fc66fa1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1627.237017][T22669] RAX: ffffffffffffffda RBX: 00007fc66fa1bc90 RCX: 00000000004582b9 [ 1627.245165][T22669] RDX: 0000000020000040 RSI: 0000000000005423 RDI: 0000000000000005 [ 1627.253225][T22669] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1627.261265][T22669] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc66fa1c6d4 15:08:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b009210fd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1627.269305][T22669] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 15:08:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000000010000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1627.359898][T22681] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b009210fd9a devid 0 transid 756082810144684242 /dev/loop2 15:08:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) signalfd4(r0, &(0x7f0000000040)={0x3}, 0x8, 0x80000) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000080)={0x1, [0x4]}, 0x6) 15:08:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0xf000000, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:08:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x10', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:08:54 executing program 0 (fault-call:4 fault-nth:16): socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:08:54 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[{0x3, 0x5, 0x7fffffff, 0x200}, {0x80000000, 0x662b, 0x80000001, 0x800}, {0x1, 0xaf6, 0x6, 0x2}, {0x6, 0x2, 0x8, 0x1}, {0x20, 0x7, 0x8, 0x10001}, {0x0, 0x2, 0x7, 0x5a}, {0x3, 0x0, 0x5, 0x48}, {0xff, 0xfffffffffffffffe, 0x5, 0x1800}]}, 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x40000, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000180)=0x8c, 0x4) 15:08:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x10000000, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:08:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b009214fd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1627.616719][T22901] FAULT_INJECTION: forcing a failure. [ 1627.616719][T22901] name failslab, interval 1, probability 0, space 0, times 0 [ 1627.638310][T22901] CPU: 1 PID: 22901 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #56 [ 1627.646348][T22901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1627.656944][T22901] Call Trace: [ 1627.660614][T22901] dump_stack+0x172/0x1f0 [ 1627.664961][T22901] should_fail.cold+0xa/0x15 [ 1627.669571][T22901] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1627.675650][T22901] ? ___might_sleep+0x163/0x280 [ 1627.680607][T22901] __should_failslab+0x121/0x190 [ 1627.685808][T22901] should_failslab+0x9/0x14 [ 1627.690457][T22901] kmem_cache_alloc_node_trace+0x270/0x720 [ 1627.696486][T22901] __kmalloc_node_track_caller+0x3d/0x70 [ 1627.702224][T22901] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1627.707603][T22901] __alloc_skb+0x10b/0x5e0 [ 1627.712129][T22901] ? skb_trim+0x190/0x190 [ 1627.716460][T22901] ? kobject_uevent_env+0x2fb/0x1030 [ 1627.721842][T22901] ? rcu_read_lock_sched_held+0x110/0x130 [ 1627.727580][T22901] alloc_uevent_skb+0x83/0x1e2 [ 1627.732548][T22901] ? dev_attr_store+0x90/0x90 [ 1627.737597][T22901] kobject_uevent_env+0xb96/0x1030 [ 1627.742724][T22901] ? wait_for_completion+0x440/0x440 [ 1627.748471][T22901] kobject_uevent+0x20/0x26 [ 1627.753178][T22901] device_del+0x758/0xc40 [ 1627.757531][T22901] ? __device_links_no_driver+0x250/0x250 [ 1627.763253][T22901] ? mutex_unlock+0xd/0x10 [ 1627.767706][T22901] ? pm_runtime_set_memalloc_noio+0x11a/0x180 [ 1627.773875][T22901] netdev_unregister_kobject+0x19e/0x1f0 [ 1627.779521][T22901] rollback_registered_many+0x7c9/0xfd0 [ 1627.785069][T22901] ? generic_xdp_install+0x3d0/0x3d0 [ 1627.790370][T22901] ? mutex_trylock+0x1e0/0x1e0 [ 1627.801673][T22901] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1627.807154][T22901] rollback_registered+0x109/0x1d0 [ 1627.812366][T22901] ? rollback_registered_many+0xfd0/0xfd0 [ 1627.818089][T22901] ? try_to_del_timer_sync+0xc1/0x110 [ 1627.823468][T22901] unregister_netdevice_queue+0x1ee/0x2c0 [ 1627.829206][T22901] unregister_netdev+0x1d/0x30 [ 1627.833969][T22901] slip_close+0x16d/0x1d0 [ 1627.838396][T22901] ? slip_ioctl+0x6d0/0x6d0 [ 1627.842911][T22901] tty_ldisc_close.isra.0+0x100/0x180 [ 1627.848311][T22901] tty_set_ldisc+0x1f8/0x690 [ 1627.853002][T22901] tty_ioctl+0x5dc/0x15c0 [ 1627.857342][T22901] ? tty_register_device+0x40/0x40 [ 1627.862481][T22901] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1627.868738][T22901] ? tomoyo_init_request_info+0x105/0x1d0 [ 1627.874460][T22901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1627.880787][T22901] ? tomoyo_path_number_perm+0x263/0x520 [ 1627.886443][T22901] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1627.892356][T22901] ? ___might_sleep+0x163/0x280 [ 1627.897215][T22901] ? tty_register_device+0x40/0x40 [ 1627.902414][T22901] do_vfs_ioctl+0xd6e/0x1390 [ 1627.907012][T22901] ? ioctl_preallocate+0x210/0x210 [ 1627.912130][T22901] ? selinux_file_mprotect+0x620/0x620 [ 1627.917585][T22901] ? __fget+0x381/0x550 [ 1627.921835][T22901] ? ksys_dup3+0x3e0/0x3e0 [ 1627.926347][T22901] ? tomoyo_file_ioctl+0x23/0x30 [ 1627.931285][T22901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1627.937542][T22901] ? security_file_ioctl+0x93/0xc0 [ 1627.942745][T22901] ksys_ioctl+0xab/0xd0 [ 1627.947014][T22901] __x64_sys_ioctl+0x73/0xb0 [ 1627.951611][T22901] do_syscall_64+0x103/0x610 [ 1627.956207][T22901] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1627.962097][T22901] RIP: 0033:0x4582b9 [ 1627.966079][T22901] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1627.986128][T22901] RSP: 002b:00007fc66fa1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1627.994648][T22901] RAX: ffffffffffffffda RBX: 00007fc66fa1bc90 RCX: 00000000004582b9 [ 1628.002997][T22901] RDX: 0000000020000040 RSI: 0000000000005423 RDI: 0000000000000005 15:08:55 executing program 1: epoll_create1(0x80000) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:08:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000000030000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1628.011074][T22901] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1628.019402][T22901] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc66fa1c6d4 [ 1628.027548][T22901] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 15:08:55 executing program 0 (fault-call:4 fault-nth:17): socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:08:55 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4, @remote, 0x4}, 0x1c) 15:08:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs#', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:08:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x2f000000, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:08:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a020001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1628.295348][T23027] FAULT_INJECTION: forcing a failure. [ 1628.295348][T23027] name failslab, interval 1, probability 0, space 0, times 0 [ 1628.319454][T23027] CPU: 0 PID: 23027 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #56 [ 1628.327596][T23027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1628.338116][T23027] Call Trace: [ 1628.341535][T23027] dump_stack+0x172/0x1f0 [ 1628.346079][T23027] should_fail.cold+0xa/0x15 [ 1628.350883][T23027] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1628.357221][T23027] ? ___might_sleep+0x163/0x280 [ 1628.362516][T23027] __should_failslab+0x121/0x190 [ 1628.367543][T23027] should_failslab+0x9/0x14 [ 1628.372057][T23027] __kmalloc+0x2dc/0x740 [ 1628.376388][T23027] ? kobject_uevent_env+0x2fb/0x1030 [ 1628.381770][T23027] ? rcu_read_lock_sched_held+0x110/0x130 [ 1628.387514][T23027] ? kobject_get_path+0xc4/0x1b0 [ 1628.392463][T23027] kobject_get_path+0xc4/0x1b0 [ 1628.397375][T23027] kobject_uevent_env+0x31f/0x1030 [ 1628.402580][T23027] ? wait_for_completion+0x440/0x440 [ 1628.407873][T23027] kobject_uevent+0x20/0x26 [ 1628.412379][T23027] device_del+0x758/0xc40 [ 1628.416714][T23027] ? __device_links_no_driver+0x250/0x250 [ 1628.422639][T23027] ? mutex_unlock+0xd/0x10 [ 1628.427159][T23027] ? pm_runtime_set_memalloc_noio+0x11a/0x180 [ 1628.433233][T23027] netdev_unregister_kobject+0x19e/0x1f0 [ 1628.438982][T23027] rollback_registered_many+0x7c9/0xfd0 [ 1628.444643][T23027] ? generic_xdp_install+0x3d0/0x3d0 [ 1628.450024][T23027] ? mutex_trylock+0x1e0/0x1e0 [ 1628.455005][T23027] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1628.460520][T23027] rollback_registered+0x109/0x1d0 [ 1628.465831][T23027] ? rollback_registered_many+0xfd0/0xfd0 [ 1628.471739][T23027] ? try_to_del_timer_sync+0xc1/0x110 [ 1628.477122][T23027] unregister_netdevice_queue+0x1ee/0x2c0 [ 1628.482861][T23027] unregister_netdev+0x1d/0x30 [ 1628.487856][T23027] slip_close+0x16d/0x1d0 [ 1628.492194][T23027] ? slip_ioctl+0x6d0/0x6d0 [ 1628.496788][T23027] tty_ldisc_close.isra.0+0x100/0x180 [ 1628.502166][T23027] tty_set_ldisc+0x1f8/0x690 [ 1628.506830][T23027] tty_ioctl+0x5dc/0x15c0 [ 1628.511256][T23027] ? tty_register_device+0x40/0x40 [ 1628.517062][T23027] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1628.523416][T23027] ? tomoyo_init_request_info+0x105/0x1d0 [ 1628.529484][T23027] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1628.536220][T23027] ? tomoyo_path_number_perm+0x263/0x520 [ 1628.541859][T23027] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1628.547766][T23027] ? ___might_sleep+0x163/0x280 [ 1628.552628][T23027] ? tty_register_device+0x40/0x40 [ 1628.558533][T23027] do_vfs_ioctl+0xd6e/0x1390 [ 1628.563215][T23027] ? ioctl_preallocate+0x210/0x210 [ 1628.568500][T23027] ? selinux_file_mprotect+0x620/0x620 [ 1628.574131][T23027] ? __fget+0x381/0x550 [ 1628.578303][T23027] ? ksys_dup3+0x3e0/0x3e0 [ 1628.582736][T23027] ? tomoyo_file_ioctl+0x23/0x30 [ 1628.587818][T23027] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1628.594059][T23027] ? security_file_ioctl+0x93/0xc0 [ 1628.599277][T23027] ksys_ioctl+0xab/0xd0 [ 1628.603437][T23027] __x64_sys_ioctl+0x73/0xb0 [ 1628.608292][T23027] do_syscall_64+0x103/0x610 [ 1628.612892][T23027] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1628.619053][T23027] RIP: 0033:0x4582b9 [ 1628.623126][T23027] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1628.643173][T23027] RSP: 002b:00007fc66fa1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1628.651802][T23027] RAX: ffffffffffffffda RBX: 00007fc66fa1bc90 RCX: 00000000004582b9 [ 1628.659948][T23027] RDX: 0000000020000040 RSI: 0000000000005423 RDI: 0000000000000005 [ 1628.668023][T23027] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1628.676000][T23027] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc66fa1c6d4 [ 1628.684056][T23027] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 15:08:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000000040000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:08:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x40000000, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:08:56 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x44800, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000200)={0x3ffe, 0x2ed1, 0xb49a, 'queue1\x00', 0x7}) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1f, 0x801) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') socket$vsock_dgram(0x28, 0x2, 0x0) sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, r3, 0xb08, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x24000000}, 0x8001) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000380)={@generic={0x5, "41f237877d36ad917b81b4a82f2e28fac1412163de83f4ddbc4b1b52470e1835759bce253dfd203419f4690fde1192d60f3cd93a38a83ad11c9d72b528c21e874ce4db83c6c89d5422b3e9a6673f8eb6550cf4671368076f263c63e03f9e41031c5d8058eb362b893c3c0f97d41acf146d4cb7c4cf24f70d2f0ccac4cd84"}, {&(0x7f00000002c0)=""/93, 0x5d}, &(0x7f0000000340), 0x18}, 0xa0) 15:08:56 executing program 0 (fault-call:4 fault-nth:18): socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:08:56 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) socket$nl_generic(0x10, 0x3, 0x10) 15:08:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0xb8fd3f00, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:08:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsH', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1629.007268][T23259] FAULT_INJECTION: forcing a failure. [ 1629.007268][T23259] name failslab, interval 1, probability 0, space 0, times 0 [ 1629.024412][T23259] CPU: 1 PID: 23259 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #56 [ 1629.032850][T23259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1629.042994][T23259] Call Trace: [ 1629.046390][T23259] dump_stack+0x172/0x1f0 [ 1629.050890][T23259] should_fail.cold+0xa/0x15 [ 1629.055483][T23259] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1629.061280][T23259] ? ___might_sleep+0x163/0x280 [ 1629.066218][T23259] __should_failslab+0x121/0x190 [ 1629.071333][T23259] should_failslab+0x9/0x14 [ 1629.076177][T23259] kmem_cache_alloc_node+0x264/0x710 [ 1629.081472][T23259] __alloc_skb+0xd5/0x5e0 [ 1629.085792][T23259] ? skb_trim+0x190/0x190 [ 1629.090107][T23259] ? kobject_uevent_env+0x2fb/0x1030 [ 1629.095376][T23259] ? rcu_read_lock_sched_held+0x110/0x130 [ 1629.101199][T23259] alloc_uevent_skb+0x83/0x1e2 [ 1629.106046][T23259] ? dev_attr_store+0x90/0x90 [ 1629.110707][T23259] kobject_uevent_env+0xb96/0x1030 [ 1629.115803][T23259] ? wait_for_completion+0x440/0x440 [ 1629.121263][T23259] kobject_uevent+0x20/0x26 [ 1629.125772][T23259] device_del+0x758/0xc40 [ 1629.130351][T23259] ? __device_links_no_driver+0x250/0x250 [ 1629.136057][T23259] ? mutex_unlock+0xd/0x10 [ 1629.140466][T23259] ? pm_runtime_set_memalloc_noio+0x11a/0x180 [ 1629.146617][T23259] netdev_unregister_kobject+0x19e/0x1f0 [ 1629.152410][T23259] rollback_registered_many+0x7c9/0xfd0 [ 1629.158134][T23259] ? generic_xdp_install+0x3d0/0x3d0 [ 1629.163767][T23259] ? mutex_trylock+0x1e0/0x1e0 [ 1629.168803][T23259] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1629.174161][T23259] rollback_registered+0x109/0x1d0 [ 1629.179357][T23259] ? rollback_registered_many+0xfd0/0xfd0 [ 1629.185149][T23259] ? try_to_del_timer_sync+0xc1/0x110 [ 1629.190536][T23259] unregister_netdevice_queue+0x1ee/0x2c0 [ 1629.196868][T23259] unregister_netdev+0x1d/0x30 [ 1629.201707][T23259] slip_close+0x16d/0x1d0 [ 1629.206023][T23259] ? slip_ioctl+0x6d0/0x6d0 [ 1629.210613][T23259] tty_ldisc_close.isra.0+0x100/0x180 [ 1629.216612][T23259] tty_set_ldisc+0x1f8/0x690 [ 1629.221279][T23259] tty_ioctl+0x5dc/0x15c0 [ 1629.225697][T23259] ? tty_register_device+0x40/0x40 [ 1629.230813][T23259] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1629.237128][T23259] ? tomoyo_init_request_info+0x105/0x1d0 [ 1629.243009][T23259] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1629.249325][T23259] ? tomoyo_path_number_perm+0x263/0x520 [ 1629.255118][T23259] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1629.260949][T23259] ? ___might_sleep+0x163/0x280 [ 1629.265881][T23259] ? tty_register_device+0x40/0x40 [ 1629.270982][T23259] do_vfs_ioctl+0xd6e/0x1390 [ 1629.275649][T23259] ? ioctl_preallocate+0x210/0x210 [ 1629.280745][T23259] ? selinux_file_mprotect+0x620/0x620 [ 1629.286191][T23259] ? __fget+0x381/0x550 [ 1629.290342][T23259] ? ksys_dup3+0x3e0/0x3e0 [ 1629.294765][T23259] ? tomoyo_file_ioctl+0x23/0x30 [ 1629.299774][T23259] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1629.306194][T23259] ? security_file_ioctl+0x93/0xc0 [ 1629.311297][T23259] ksys_ioctl+0xab/0xd0 [ 1629.315874][T23259] __x64_sys_ioctl+0x73/0xb0 [ 1629.320778][T23259] do_syscall_64+0x103/0x610 [ 1629.325452][T23259] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1629.331600][T23259] RIP: 0033:0x4582b9 [ 1629.335494][T23259] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1629.355791][T23259] RSP: 002b:00007fc66fa1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1629.364549][T23259] RAX: ffffffffffffffda RBX: 00007fc66fa1bc90 RCX: 00000000004582b9 [ 1629.372515][T23259] RDX: 0000000020000040 RSI: 0000000000005423 RDI: 0000000000000005 [ 1629.380564][T23259] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1629.388640][T23259] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc66fa1c6d4 [ 1629.396599][T23259] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 15:08:56 executing program 0 (fault-call:4 fault-nth:19): socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:08:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a030001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:08:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0xeffdffff, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1629.601638][T23369] FAULT_INJECTION: forcing a failure. [ 1629.601638][T23369] name failslab, interval 1, probability 0, space 0, times 0 [ 1629.615832][T23369] CPU: 0 PID: 23369 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #56 [ 1629.624278][T23369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1629.624285][T23369] Call Trace: [ 1629.624318][T23369] dump_stack+0x172/0x1f0 [ 1629.624339][T23369] should_fail.cold+0xa/0x15 [ 1629.624358][T23369] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1629.624383][T23369] ? ___might_sleep+0x163/0x280 [ 1629.624402][T23369] __should_failslab+0x121/0x190 [ 1629.624416][T23369] should_failslab+0x9/0x14 [ 1629.624432][T23369] kmem_cache_alloc_node_trace+0x270/0x720 [ 1629.624473][T23369] __kmalloc_node_track_caller+0x3d/0x70 [ 1629.624498][T23369] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1629.653710][T23369] __alloc_skb+0x10b/0x5e0 [ 1629.653727][T23369] ? skb_trim+0x190/0x190 [ 1629.653742][T23369] ? kobject_uevent_env+0x2fb/0x1030 [ 1629.653758][T23369] ? rcu_read_lock_sched_held+0x110/0x130 [ 1629.653776][T23369] alloc_uevent_skb+0x83/0x1e2 [ 1629.653793][T23369] ? dev_attr_store+0x90/0x90 [ 1629.653811][T23369] kobject_uevent_env+0xb96/0x1030 [ 1629.721326][T23369] ? wait_for_completion+0x440/0x440 [ 1629.726754][T23369] kobject_uevent+0x20/0x26 [ 1629.731359][T23369] device_del+0x758/0xc40 [ 1629.735699][T23369] ? __device_links_no_driver+0x250/0x250 [ 1629.741758][T23369] ? mutex_unlock+0xd/0x10 [ 1629.746267][T23369] ? pm_runtime_set_memalloc_noio+0x11a/0x180 [ 1629.752431][T23369] netdev_unregister_kobject+0x19e/0x1f0 [ 1629.758084][T23369] rollback_registered_many+0x7c9/0xfd0 [ 1629.763639][T23369] ? generic_xdp_install+0x3d0/0x3d0 [ 1629.768967][T23369] ? mutex_trylock+0x1e0/0x1e0 [ 1629.773734][T23369] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1629.779379][T23369] rollback_registered+0x109/0x1d0 [ 1629.784505][T23369] ? rollback_registered_many+0xfd0/0xfd0 [ 1629.790241][T23369] ? try_to_del_timer_sync+0xc1/0x110 [ 1629.801167][T23369] unregister_netdevice_queue+0x1ee/0x2c0 [ 1629.807608][T23369] unregister_netdev+0x1d/0x30 [ 1629.812559][T23369] slip_close+0x16d/0x1d0 [ 1629.816915][T23369] ? slip_ioctl+0x6d0/0x6d0 [ 1629.821964][T23369] tty_ldisc_close.isra.0+0x100/0x180 [ 1629.827430][T23369] tty_set_ldisc+0x1f8/0x690 [ 1629.832026][T23369] tty_ioctl+0x5dc/0x15c0 [ 1629.836449][T23369] ? tty_register_device+0x40/0x40 [ 1629.841835][T23369] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1629.848198][T23369] ? tomoyo_init_request_info+0x105/0x1d0 [ 1629.854109][T23369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1629.860639][T23369] ? tomoyo_path_number_perm+0x263/0x520 [ 1629.866457][T23369] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1629.872285][T23369] ? ___might_sleep+0x163/0x280 [ 1629.877234][T23369] ? tty_register_device+0x40/0x40 [ 1629.882534][T23369] do_vfs_ioctl+0xd6e/0x1390 [ 1629.887219][T23369] ? ioctl_preallocate+0x210/0x210 [ 1629.892369][T23369] ? selinux_file_mprotect+0x620/0x620 [ 1629.897926][T23369] ? __fget+0x381/0x550 [ 1629.902176][T23369] ? ksys_dup3+0x3e0/0x3e0 [ 1629.906603][T23369] ? tomoyo_file_ioctl+0x23/0x30 [ 1629.911897][T23369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1629.918177][T23369] ? security_file_ioctl+0x93/0xc0 [ 1629.923294][T23369] ksys_ioctl+0xab/0xd0 [ 1629.927559][T23369] __x64_sys_ioctl+0x73/0xb0 [ 1629.932292][T23369] do_syscall_64+0x103/0x610 [ 1629.936977][T23369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1629.943133][T23369] RIP: 0033:0x4582b9 [ 1629.947028][T23369] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1629.966897][T23369] RSP: 002b:00007fc66fa1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1629.975942][T23369] RAX: ffffffffffffffda RBX: 00007fc66fa1bc90 RCX: 00000000004582b9 [ 1629.984274][T23369] RDX: 0000000020000040 RSI: 0000000000005423 RDI: 0000000000000005 [ 1629.992245][T23369] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1630.000432][T23369] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc66fa1c6d4 [ 1630.008671][T23369] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 15:08:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000000080000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:08:57 executing program 0 (fault-call:4 fault-nth:20): socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:08:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0xfffffdef, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:08:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsL', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1630.210776][T23480] FAULT_INJECTION: forcing a failure. [ 1630.210776][T23480] name failslab, interval 1, probability 0, space 0, times 0 [ 1630.235565][T23480] CPU: 0 PID: 23480 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #56 [ 1630.243856][T23480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1630.254412][T23480] Call Trace: [ 1630.257726][T23480] dump_stack+0x172/0x1f0 [ 1630.262061][T23480] should_fail.cold+0xa/0x15 [ 1630.266749][T23480] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1630.272654][T23480] ? ___might_sleep+0x163/0x280 [ 1630.277711][T23480] __should_failslab+0x121/0x190 [ 1630.282674][T23480] should_failslab+0x9/0x14 [ 1630.287183][T23480] kmem_cache_alloc_node_trace+0x270/0x720 [ 1630.293176][T23480] ? __lock_acquire+0x548/0x3fb0 [ 1630.298125][T23480] ? kfree_const+0x5e/0x70 [ 1630.302560][T23480] __get_vm_area_node+0x12b/0x3a0 [ 1630.307686][T23480] __vmalloc_node_range+0xd4/0x790 [ 1630.313015][T23480] ? n_tty_open+0x1b/0x170 [ 1630.317731][T23480] ? tty_set_ldisc+0x268/0x690 [ 1630.322497][T23480] ? n_tty_open+0x1b/0x170 [ 1630.326928][T23480] ? n_tty_set_termios+0xe70/0xe70 [ 1630.332040][T23480] vzalloc+0x6b/0x90 [ 1630.335940][T23480] ? n_tty_open+0x1b/0x170 [ 1630.340357][T23480] n_tty_open+0x1b/0x170 [ 1630.344598][T23480] ? n_tty_set_termios+0xe70/0xe70 [ 1630.349726][T23480] tty_ldisc_open.isra.0+0x8b/0xe0 [ 1630.354844][T23480] tty_set_ldisc+0x2d7/0x690 [ 1630.359525][T23480] tty_ioctl+0x5dc/0x15c0 [ 1630.363860][T23480] ? tty_register_device+0x40/0x40 [ 1630.369416][T23480] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1630.375926][T23480] ? tomoyo_init_request_info+0x105/0x1d0 [ 1630.381867][T23480] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1630.388201][T23480] ? tomoyo_path_number_perm+0x263/0x520 [ 1630.393929][T23480] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1630.399742][T23480] ? ___might_sleep+0x163/0x280 [ 1630.404596][T23480] ? tty_register_device+0x40/0x40 [ 1630.409707][T23480] do_vfs_ioctl+0xd6e/0x1390 [ 1630.414298][T23480] ? ioctl_preallocate+0x210/0x210 [ 1630.419606][T23480] ? selinux_file_mprotect+0x620/0x620 [ 1630.425147][T23480] ? __fget+0x381/0x550 [ 1630.429417][T23480] ? ksys_dup3+0x3e0/0x3e0 [ 1630.433841][T23480] ? tomoyo_file_ioctl+0x23/0x30 [ 1630.438873][T23480] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1630.445236][T23480] ? security_file_ioctl+0x93/0xc0 [ 1630.450439][T23480] ksys_ioctl+0xab/0xd0 [ 1630.454947][T23480] __x64_sys_ioctl+0x73/0xb0 [ 1630.459538][T23480] do_syscall_64+0x103/0x610 [ 1630.464381][T23480] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1630.470527][T23480] RIP: 0033:0x4582b9 [ 1630.474441][T23480] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1630.494339][T23480] RSP: 002b:00007fc66fa1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1630.502751][T23480] RAX: ffffffffffffffda RBX: 00007fc66fa1bc90 RCX: 00000000004582b9 [ 1630.511276][T23480] RDX: 0000000020000040 RSI: 0000000000005423 RDI: 0000000000000005 [ 1630.519458][T23480] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1630.527520][T23480] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc66fa1c6d4 [ 1630.535500][T23480] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 15:08:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a040001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1630.566822][T23480] syz-executor.0: vmalloc: allocation failure: 9088 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz0,mems_allowed=0-1 [ 1630.613613][T23480] CPU: 1 PID: 23480 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #56 [ 1630.621646][T23480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1630.621684][T23480] Call Trace: [ 1630.621705][T23480] dump_stack+0x172/0x1f0 [ 1630.621725][T23480] warn_alloc.cold+0x87/0x17f [ 1630.621741][T23480] ? zone_watermark_ok_safe+0x260/0x260 [ 1630.621758][T23480] ? rcu_read_lock_sched_held+0x110/0x130 [ 1630.621780][T23480] ? __lock_acquire+0x548/0x3fb0 [ 1630.621808][T23480] ? __get_vm_area_node+0x2df/0x3a0 [ 1630.621832][T23480] __vmalloc_node_range+0x48a/0x790 [ 1630.621853][T23480] ? tty_set_ldisc+0x268/0x690 [ 1630.621871][T23480] ? n_tty_open+0x1b/0x170 [ 1630.621902][T23480] ? n_tty_set_termios+0xe70/0xe70 [ 1630.621917][T23480] vzalloc+0x6b/0x90 [ 1630.621930][T23480] ? n_tty_open+0x1b/0x170 [ 1630.621960][T23480] n_tty_open+0x1b/0x170 [ 1630.635650][T23480] ? n_tty_set_termios+0xe70/0xe70 [ 1630.635667][T23480] tty_ldisc_open.isra.0+0x8b/0xe0 [ 1630.635683][T23480] tty_set_ldisc+0x2d7/0x690 [ 1630.635702][T23480] tty_ioctl+0x5dc/0x15c0 [ 1630.635722][T23480] ? tty_register_device+0x40/0x40 [ 1630.723742][T23480] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1630.730012][T23480] ? tomoyo_init_request_info+0x105/0x1d0 [ 1630.735755][T23480] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1630.742086][T23480] ? tomoyo_path_number_perm+0x263/0x520 [ 1630.747733][T23480] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1630.753556][T23480] ? ___might_sleep+0x163/0x280 [ 1630.758520][T23480] ? tty_register_device+0x40/0x40 [ 1630.764256][T23480] do_vfs_ioctl+0xd6e/0x1390 [ 1630.768862][T23480] ? ioctl_preallocate+0x210/0x210 [ 1630.773984][T23480] ? selinux_file_mprotect+0x620/0x620 [ 1630.779533][T23480] ? __fget+0x381/0x550 [ 1630.784056][T23480] ? ksys_dup3+0x3e0/0x3e0 [ 1630.788666][T23480] ? tomoyo_file_ioctl+0x23/0x30 [ 1630.793616][T23480] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1630.800045][T23480] ? security_file_ioctl+0x93/0xc0 [ 1630.805176][T23480] ksys_ioctl+0xab/0xd0 [ 1630.809547][T23480] __x64_sys_ioctl+0x73/0xb0 15:08:57 executing program 1: ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0xc) prctl$PR_SET_FPEXC(0xc, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendmsg$xdp(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="989e7d78141f2e499ca4bb19da40b9d0f2d90473093fd27e4bb2fbf121e20c31bbb3a23f9113444fc21ed5ad2d6e4ee882ab52fa5b8b5348692cfa73c2d94a6da786a3cfe10ba9fbc8b61e650a79a18160609d5ec7a5f064f2f7f0b9faafa19c0a5c42672570f7dfcb8833319954e0", 0x6f}], 0x1, 0x0, 0x0, 0x20000080}, 0x8045) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) [ 1630.814152][T23480] do_syscall_64+0x103/0x610 [ 1630.818758][T23480] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1630.824661][T23480] RIP: 0033:0x4582b9 [ 1630.828659][T23480] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1630.848725][T23480] RSP: 002b:00007fc66fa1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:08:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x100000000000, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1630.857157][T23480] RAX: ffffffffffffffda RBX: 00007fc66fa1bc90 RCX: 00000000004582b9 [ 1630.865410][T23480] RDX: 0000000020000040 RSI: 0000000000005423 RDI: 0000000000000005 [ 1630.873486][T23480] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1630.881468][T23480] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc66fa1c6d4 [ 1630.889534][T23480] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 [ 1630.907332][T23480] Mem-Info: [ 1630.911846][T23480] active_anon:149068 inactive_anon:199 isolated_anon:0 [ 1630.911846][T23480] active_file:13344 inactive_file:45885 isolated_file:0 [ 1630.911846][T23480] unevictable:0 dirty:446 writeback:0 unstable:0 [ 1630.911846][T23480] slab_reclaimable:20739 slab_unreclaimable:106570 [ 1630.911846][T23480] mapped:58795 shmem:251 pagetables:2590 bounce:0 [ 1630.911846][T23480] free:1187750 free_pcp:658 free_cma:0 [ 1630.953771][T23480] Node 0 active_anon:596272kB inactive_anon:796kB active_file:53228kB inactive_file:183540kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:235180kB dirty:1780kB writeback:0kB shmem:1004kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 206848kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1630.983994][T23480] Node 1 active_anon:0kB inactive_anon:0kB active_file:148kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1631.011245][T23480] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1631.039742][T23480] lowmem_reserve[]: 0 2553 2555 2555 [ 1631.048129][T23480] Node 0 DMA32 free:950080kB min:36232kB low:45288kB high:54344kB active_anon:596272kB inactive_anon:796kB active_file:53228kB inactive_file:183540kB unevictable:0kB writepending:1780kB present:3129332kB managed:2617996kB mlocked:0kB kernel_stack:9312kB pagetables:10360kB bounce:0kB free_pcp:2628kB local_pcp:1336kB free_cma:0kB [ 1631.086157][T23480] lowmem_reserve[]: 0 0 2 2 [ 1631.092055][T23480] Node 0 Normal free:8kB min:28kB low:32kB high:36kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2204kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1631.127672][T23480] lowmem_reserve[]: 0 0 0 0 [ 1631.132521][T23480] Node 1 Normal free:3785004kB min:53624kB low:67028kB high:80432kB active_anon:0kB inactive_anon:0kB active_file:148kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 15:08:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000000d30000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1631.191917][T23480] lowmem_reserve[]: 0 0 0 0 15:08:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsh', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1631.231060][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1631.233725][T23480] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB 15:08:58 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) futimesat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{r1, r2/1000+10000}, {0x77359400}}) connect$inet6(r0, &(0x7f0000000440)={0xa, 0x4e20, 0x7fff, @empty, 0x81}, 0x1c) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x105000, 0x0) ioctl$SIOCRSSCAUSE(r3, 0x89e1, &(0x7f00000004c0)=0x1) syz_mount_image$nfs4(&(0x7f0000000040)='nfs4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f0000000180)="cc4740c7746a3c0ce05ddadbe5a880ebcd60eeaf913522e2550a019f2683155794e12bf8756b9e903f8d1c2b16cf66f61ba2aadbc0", 0x35, 0x1}, {&(0x7f00000001c0)="cd422a2a7140734f6633ec5e13f00d36c487920f1b2611cb768572c22c60f4e2ed216f3e68c1568524c438c5e1f5c98686d7a64fa0f6a9766e6e8716df1bde86c7f6ac9d4165b043d20bd28f4ea36019048ea8bf527c6233a6fe04427412f64873a26817d61ecced68526f4d42cb53a302c3ee247c6bb6c0c8fbb508c7c0e42dac3347da4705c9f944e94865a944884ecc415a02587e72e36e68768018c9e30b268b0bcefe1032e527dad0d81fc56ad938f8a63770b1841540884026b711d37df1b66b52a0a01067d6a4509819b75b7467c045dedb3387ce7ec9763073f3c6e24b0be4e3cc", 0xe5, 0xacb}, {&(0x7f00000002c0)="2d2962bf24ee68fcfb0de2b855540eb1133846dc30bae9263e7f1ee4e9ef29ae8838484d48fd6d9d9f99183cae665c6955d107b712e8c2e0408464d1c48573e975", 0x41, 0x20}, {&(0x7f0000000340)="92", 0x1, 0x7}], 0x1000, &(0x7f0000000400)='*\x00') 15:08:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a050001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1631.314598][T23480] Node 0 DMA32: 274*4kB (UE) 256*8kB (UME) 22*16kB (UME) 220*32kB (UME) 442*64kB (UME) 101*128kB (UME) 24*256kB (UM) 12*512kB (UE) 10*1024kB (UME) 7*2048kB (UME) 210*4096kB (UM) = 948776kB 15:08:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x7ffffffff000, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1631.387376][T23480] Node 0 Normal: 0*4kB 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8kB [ 1631.409601][T23480] Node 1 Normal: 63*4kB (UE) 246*8kB (UME) 262*16kB (UM) 61*32kB (UE) 14*64kB (UM) 6*128kB (UE) 8*256kB (UM) 5*512kB (UME) 4*1024kB (UME) 1*2048kB (U) 919*4096kB (M) = 3785004kB [ 1631.439771][T23480] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1631.450173][T23480] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1631.474681][T23480] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1631.486761][T23480] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1631.516984][T23480] 59480 total pagecache pages [ 1631.531671][T23480] 0 pages in swap cache 15:08:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000000d70000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1631.536236][T23480] Swap cache stats: add 0, delete 0, find 0/0 [ 1631.551645][T23480] Free swap = 0kB [ 1631.556049][T23480] Total swap = 0kB [ 1631.565437][T23480] 1965979 pages RAM [ 1631.573266][T23480] 0 pages HighMem/MovableOnly [ 1631.582966][T23480] 339406 pages reserved [ 1631.587498][T23480] 0 pages cma reserved 15:08:59 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:08:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0xa0010000000000, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:08:59 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={r1, r2, 0xc}, 0x10) read(r0, &(0x7f0000000040)=""/213, 0xd5) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x7, @remote, 0x2}, 0x1c) r3 = socket$netlink(0x10, 0x3, 0x12) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f00000009c0)={@local, 0x0}, &(0x7f0000000a00)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000ac0)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000bc0)=0xe8) sendmsg$nl_xfrm(r3, &(0x7f0000000f40)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000f00)={&(0x7f0000000c00)=@newae={0x2d4, 0x1e, 0x0, 0x70bd26, 0x25dfdbfd, {{@in6=@ipv4={[], [], @empty}, 0x4d3, 0xa, 0xff}, @in=@local, 0xff, 0x3503}, [@encap={0x1c, 0x4, {0xfffffffffffffffe, 0x4e23, 0x4e22, @in=@loopback}}, @policy_type={0xc, 0x10, {0x1}}, @algo_auth={0x80, 0x1, {{'rmd256-generic\x00'}, 0x1b0, "c1e75dc60f4b664c3001e5c1e6f2482b45d772472812e912bf897ffa885a7cf32feff545119159e297244d67c58111913e5a8fd66be2"}}, @replay_esn_val={0x20, 0x17, {0x1, 0x70bd28, 0x70bd2c, 0x70bd25, 0x70bd2d, 0x6, [0x101]}}, @ipv4_hthresh={0x8, 0x3, {0xc, 0x1c}}, @ipv4_hthresh={0x8, 0x3, {0x5, 0x15}}, @offload={0xc, 0x1c, {r4, 0x2}}, @tfcpad={0x8, 0x16, 0x1c73}, @tmpl={0xc4, 0x5, [{{@in6=@dev={0xfe, 0x80, [], 0x1e}, 0x4d4}, 0xa, @in6=@remote, 0x3501, 0x3, 0x1, 0x0, 0x0, 0x8, 0x9}, {{@in6=@rand_addr="04a000868a8be207cf55be520c5a3f6c", 0x4d3, 0x3b}, 0xa, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x34ff, 0x5, 0x0, 0x9, 0xc4f, 0x6, 0x8}, {{@in6=@empty, 0x4d6}, 0x2, @in6=@mcast1, 0x0, 0x2, 0x3, 0x2, 0x0, 0xc6a9, 0x8}]}, @sa={0xe4, 0x6, {{@in=@broadcast, @in6=@remote, 0x4e24, 0x80000000, 0x4e20, 0x101, 0x0, 0xa0, 0x80, 0x2f, r5, r6}, {@in=@multicast2, 0x4d2, 0x2b}, @in6=@local, {0x9, 0x3, 0xfffffffffffffff8, 0x0, 0x5, 0x41c1, 0x6, 0x337}, {0x0, 0xfff, 0x9, 0x8}, {0x40, 0x0, 0x4}, 0x70bd2d, 0x34ff, 0xa, 0x4, 0x6, 0x28}}]}, 0x2d4}, 0x1, 0x0, 0x0, 0x800}, 0x8000) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f0000000140)=0x5, 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x802, 0x0) 15:08:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a060001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:08:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsl', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:08:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0xd0000000000000, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:08:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000000d80000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:08:59 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x2, &(0x7f0000000040)) 15:08:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a070001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:08:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0xf0ffffff7f0000, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:08:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfst', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:08:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000300000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:08:59 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x4b47, &(0x7f0000000040)) 15:08:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x100000000000000, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:00 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000080)=0x6, 0x8) r1 = socket$inet6(0xa, 0x4000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f00000000c0)=0x9) fsync(r0) 15:09:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a080001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0xf00000000000000, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:00 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x4b49, &(0x7f0000000040)) 15:09:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsz', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000400000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:00 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e22, 0x0, @loopback, 0x7}, {0xa, 0x4e24, 0x7, @mcast1, 0x986d}, 0x7, [0x1ff, 0x81, 0x3, 0x2000000000000, 0x41bf, 0x1f, 0x2, 0x7fffffff]}, 0x5c) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000100)={0x3, 0x0, [{}, {}, {}]}) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000180), 0x4) 15:09:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x1000000000000000, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:00 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5409, &(0x7f0000000040)) 15:09:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000800000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a090001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:00 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x248000, 0x0) recvfrom$inet6(r0, &(0x7f0000000080)=""/133, 0x85, 0x40010122, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x3}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x1000000000) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:09:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x2f00000000000000, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:00 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x230040, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000100)={0x20, 0xf, 0x4, 0x6480000, {}, {0x4, 0xe, 0x9, 0x200, 0x9, 0x0, "85e78005"}, 0x101, 0x2, @offset, 0x4}) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) 15:09:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:00 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x540b, &(0x7f0000000040)) 15:09:00 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0xfffffffffffffffe, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x301080, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000000c0)={0x0, 0x8, "09621fbda92ce760"}, &(0x7f0000000140)=0x10) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x200000000000000, 0x3, @local, 0x5}, 0x1c) 15:09:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x4000000000000000, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0a0001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00d300000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:00 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup2(r0, r0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000040)={0x8000000, 0x520, 0x35}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:09:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0xb8fd3f0000000000, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:00 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000001a40), 0x80800) getsockopt$inet_mreq(r1, 0x0, 0x0, &(0x7f0000001a80)={@empty, @multicast1}, &(0x7f0000001ac0)=0x8) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x80, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x84000, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000080)=0x3, 0x4) r3 = geteuid() mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x21, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',access=client,cache=loose,smackfstransmute=/dev/vfio/vfio\x00,smackfsfloor=/dev/vfio/vfio\x00,fowner=', @ANYRESDEC=r3, @ANYBLOB=',obj_role=/dev/vfio/vfio\x00,obj_type=/dev/vfio/vfio\x00,smackfsfloor=/dev/vfio/vfio\x00,subj_user=/selinux/status\x00,subj_role=[em0,\x00']) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, &(0x7f0000000100)={[{0x9, 0x1, 0x3f, 0x400, 0xb6, 0x5, 0x8001, 0xbdd, 0x0, 0x1, 0x7, 0x7, 0x6d7}, {0x80000001, 0xffff, 0x3, 0x81, 0x4, 0x2, 0x6, 0x0, 0x2d4, 0xfff, 0x46, 0xfff, 0xffffffff}, {0x0, 0x9, 0x1, 0x573, 0x5e046022, 0x75, 0x9, 0x7, 0x401, 0x8, 0xfff, 0x0, 0x6d13800}], 0xffffffffffffffff}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) 15:09:00 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x540c, &(0x7f0000000040)) 15:09:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0xeffdffff00000000, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:01 executing program 1: r0 = socket$inet6(0xa, 0x7, 0x200000000000) socket$inet6(0xa, 0xf, 0xf9) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:09:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00d700000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0b0001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:01 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x540d, &(0x7f0000000040)) 15:09:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x3, 0x0, @loopback}, 0x10) 15:09:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@v1={0x2, "8f2bbc4c211f"}, 0x7, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:09:01 executing program 1: lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x3c5, 0x801) connect$vsock_stream(r1, &(0x7f0000000300)={0x28, 0x0, 0x2711, @my=0x0}, 0x10) mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0xa08406, &(0x7f00000001c0)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@sq={'sq', 0x3d, 0x10000}}, {@timeout={'timeout', 0x3d, 0x2}}, {@common=@nodevmap='nodevmap'}, {@sq={'sq', 0x3d, 0x4}}, {@sq={'sq', 0x3d, 0x2}}, {@common=@cache_mmap='cache=mmap'}, {@common=@mmap='mmap'}, {@rq={'rq', 0x3d, 0x2}}], [{@subj_role={'subj_role'}}, {@fowner_gt={'fowner>', r0}}]}}) r2 = socket$inet6(0xa, 0x80000, 0x3f) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) 15:09:01 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5412, &(0x7f0000000040)) 15:09:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00d800000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0xa, 0x0, @loopback}, 0x10) 15:09:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a100001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000002c0)=""/247, &(0x7f0000000180)=0x1f7) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xffffffffffffffd9, 0x0) write$UHID_CREATE(r1, &(0x7f00000003c0)={0x0, 'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000080)=""/254, 0xfe, 0x1897, 0x100000001, 0xfffffffffffff071, 0x1, 0x1000}, 0x120) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:09:01 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5413, &(0x7f0000000040)) 15:09:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) connect$ax25(r1, &(0x7f0000000040)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) [ 1634.368847][T25104] IPVS: length: 503 != 8 [ 1634.375771][T25104] IPVS: length: 503 != 8 15:09:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000201000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0xf, @loopback}, 0x10) 15:09:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001100)='/dev/dlm_plock\x00', 0x40000, 0x0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000001140)={"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"}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0x1000, "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"}, &(0x7f0000001080)=0x1008) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000010c0)={r2, 0x2, 0x80000000}, 0x8) fsetxattr$security_smack_transmute(r0, &(0x7f0000001540)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001580)='TRUE', 0x4, 0x2) 15:09:01 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5414, &(0x7f0000000040)) 15:09:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a230001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x80801, 0x0) ioctl$TIOCNXCL(r1, 0x540d) 15:09:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x10, @loopback}, 0x10) 15:09:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:02 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5415, &(0x7f0000000040)) 15:09:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000301000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:02 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:09:02 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) 15:09:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a480001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x2f, @loopback}, 0x10) 15:09:02 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast2, 0x2}, 0x1c) 15:09:02 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5416, &(0x7f0000000040)) 15:09:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0xd0, @loopback}, 0x10) 15:09:02 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x101000, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000080)={0x10001, {{0x2, 0x4e23, @broadcast}}, 0x618157a2c0ac1769, 0x5, [{{0x2, 0x4e20, @rand_addr=0x7ff}}, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e22, @local}}, {{0x2, 0x4e23, @remote}}]}, 0x310) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:09:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a4c0001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000401000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:02 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5418, &(0x7f0000000040)) 15:09:02 executing program 1: r0 = socket(0x0, 0x806, 0x9) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0xfffffffffffffffc, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:09:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs#', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0xf00, @loopback}, 0x10) 15:09:02 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x101, 0x8000, 0x7, 0x0, 0x80, 0x8, 0xfffffffffffffffa, 0x8, 0x9, 0x10000, 0x1}, 0xb) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:09:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a680001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:02 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x541b, &(0x7f0000000040)) 15:09:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000501000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x2f00, @loopback}, 0x10) 15:09:03 executing program 1: socket(0x1, 0x1, 0xf3) r0 = socket$inet6(0xa, 0x2, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4, 0x0, @remote, 0x2}, 0x1c) uname(&(0x7f0000000040)=""/66) 15:09:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4000, @loopback}, 0x10) 15:09:03 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x541d, &(0x7f0000000040)) 15:09:03 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:09:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000601000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs ', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a6c0001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0xd000, @loopback}, 0x10) 15:09:03 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x541e, &(0x7f0000000040)) 15:09:03 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) getpgid(r1) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) 15:09:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000701000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:03 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040), 0x4) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x1}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000200)=ANY=[@ANYRES32=r3, @ANYBLOB="0300ee00358023e314723f8ac49ac7bfc0f349b425a618ef2565aca851431693a852dd96987dda2d57e8d6cf81e2c6304cfdf844d3762f3d97e51296ef6015b53046edecf8d5ec6dbc73cbc71524c302ad3d313a41a0b0b6542f019e7f8c1e832bda4aae2bc26bc681b0ea1b4cc127f6599fcc1ac26a09ea6d2c96a17d0c3ac08a7a492fb7de493eea950ac596175199b49a7b6c82ea8ded77022db2cd761f09007cf9142c90075e301b1d65c67ec8992bb5ad87d243d8a8c39a21d608011899ed98f440560cdd4a110838fc66c849ef9699ba2d88dd4716d220ddd5a16e6300b1009aaf9b6727e6e49b2b9073cb6c5470a2"], 0xf6) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x1ff, 0x2, 0x22573e0066fda74, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f00000000c0)={0x3, 'syz0\x00'}) 15:09:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x1a000, @loopback}, 0x10) 15:09:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a740001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:03 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x541f, &(0x7f0000000040)) 15:09:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:03 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x7ff}, 0x1c) 15:09:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x100000, @loopback}, 0x10) 15:09:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000801000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:03 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x4) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/4096) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4000000, 0x0, @remote, 0x100}, 0x1c) 15:09:04 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5421, &(0x7f0000000040)) 15:09:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x3ffdb8, @loopback}, 0x10) 15:09:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a7a0001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000901000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:04 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)={0x1400000000000, 0x2, 0xfffffffffffffff9, 0x800, 0x8000}) 15:09:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0xa00100, @loopback}, 0x10) 15:09:04 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5424, &(0x7f0000000040)) 15:09:04 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000080)={0x2d2f, {{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffffffffffd}}}, 0x88) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) write$binfmt_aout(r0, &(0x7f0000000140)={{0x1cf, 0x2, 0x0, 0x6c, 0x32a, 0xda9, 0xc0}, "ef797f7a7d659843564baec5792b858c00f43a7f320a9f6e779757262c480064c22e9de7130ac5c094a9a4e8a4f9efbc8c8a", [[], [], [], []]}, 0x452) r1 = socket$inet6(0xa, 0x20000002, 0xfffffffffffffffe) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x1, @remote, 0x2}, 0xffffffffffffffed) 15:09:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x10', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000301000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:04 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x400}, 0xfffffffffffffe4a) 15:09:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000a01000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0xd00000, @loopback}, 0x10) 15:09:04 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4, @remote, 0x2}, 0x1c) 15:09:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:04 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5425, &(0x7f0000000040)) 15:09:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000501000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:04 executing program 1: socket$inet6(0xa, 0x2, 0x0) r0 = socket$packet(0x11, 0x1000000000000006, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000003c0)={0x8000, 0x10, 0x8000}, 0x3c3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r0, &(0x7f0000000140)=0x47, 0xde) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='security.SMACK64MMAP\x00', &(0x7f0000000040)='cgroup+\x00', 0x8, 0x2) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x5890, 0x0) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x7}}, 0x0, 0xfffffffeffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @multicast2}, 0x10) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000680)=ANY=[], &(0x7f0000000380)='\x00', 0x11d, 0x2) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000440)) syz_extract_tcp_res$synack(&(0x7f00000004c0), 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x4e22, @empty}, {0x2, 0x4e24, @remote}, {0x2, 0x4, @empty}, 0x0, 0x4000000000, 0x80000000000, 0xfffffffffffffffe, 0x0, 0x0, 0x1000, 0x8, 0xfffffffffffffffc}) prctl$PR_GET_SECUREBITS(0x1b) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) ptrace(0xffffffffffffffff, 0x0) syz_open_procfs(r4, &(0x7f0000000780)='uid\x00\x00\x00\x00\xbc\xa5\x8c\xc4\xf1\xa65\x99\x1aX\xfd\xb1bz\x03r\x00') 15:09:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x1000000, @loopback}, 0x10) 15:09:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000b01000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x0f', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:05 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5427, &(0x7f0000000040)) 15:09:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0xf000000, @loopback}, 0x10) 15:09:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000601000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a002301000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000008, 0x13, r0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r2, 0x4) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:09:05 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5428, &(0x7f0000000040)) 15:09:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x10000000, @loopback}, 0x10) 15:09:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:05 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x400000) bind$vsock_dgram(r0, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:09:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000701000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:05 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) 15:09:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a004801000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x2f000000, @loopback}, 0x10) 15:09:05 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)) sendfile(r3, r2, 0x0, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:09:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000901000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x40000000, @loopback}, 0x10) 15:09:05 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5441, &(0x7f0000000040)) 15:09:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:05 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x2, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000100)={'system_u:object_r:memory_device_t:s0', 0x20, 'system_u:object_r:dhcpd_state_t:s0', 0x20, 0x401, 0x20, '/sbin/dhclient\x00'}, 0x6c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000040)={@initdev}, &(0x7f0000000080)=0x14) 15:09:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0xb8fd3f00, @loopback}, 0x10) 15:09:05 executing program 1: syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x101000) r0 = socket$caif_stream(0x25, 0x1, 0x5) fcntl$addseals(r0, 0x409, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x8000000002, 0xa30) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x3, @remote, 0x3}, 0x351) 15:09:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a004c01000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:06 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5450, &(0x7f0000000040)) 15:09:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000a01000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0xeffdffff, @loopback}, 0x10) 15:09:06 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup(r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000040)={0x2, [0x0, 0x0]}, &(0x7f0000000080)=0xc) 15:09:06 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/s\x06\x00\x00\x00\x00\x00\x00\x00shold\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$KDENABIO(r2, 0x4b36) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x2, @remote, 0x2}, 0x1c) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) 15:09:06 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5451, &(0x7f0000000040)) 15:09:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0xfffffdef, @loopback}, 0x10) 15:09:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a006801000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:06 executing program 1: r0 = socket$inet6(0xa, 0x8000000000000d, 0x50) r1 = fcntl$dupfd(r0, 0x406, r0) recvfrom$ax25(r1, &(0x7f0000000080)=""/7, 0x7, 0x0, &(0x7f00000000c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@default, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x7f7fffffffffc, @remote, 0x2}, 0xff78) 15:09:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x100000000000, @loopback}, 0x10) 15:09:06 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000140)="47bca0795f3e07a974ebe29dc6ee77345a21aeb7463ae23e28e9e7f0cd0811a7dad2d6424255c37c967bc7e4d436a003d7dc383e61d9383dfbe5c93d9c2ea9343b223372aabdc58f996e1c0b91a265943f1c571fa7bd76ac4389da26253f1c6795d4607c3641d3", 0x67, 0x80000000}], 0x241000, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1000, 0x800) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000080)) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000240)=0x3) 15:09:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000b01000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:06 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5452, &(0x7f0000000040)) 15:09:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x7ffffffff000, @loopback}, 0x10) 15:09:06 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x545d, &(0x7f0000000040)) 15:09:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0xa0010000000000, @loopback}, 0x10) 15:09:06 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x8000000000000004, @mcast1, 0x2}, 0x1c) 15:09:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a006c01000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:07 executing program 1: socket$inet6(0xa, 0x7, 0x3) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x4000, 0x0) setns(r1, 0x6000000) 15:09:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a230f01000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:07 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5460, &(0x7f0000000040)) 15:09:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0xd0000000000000, @loopback}, 0x10) 15:09:07 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x40049409, &(0x7f0000000040)) 15:09:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a007401000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:07 executing program 1: r0 = socket$inet6(0xa, 0xf, 0x1e) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @remote, 0xfffffffffffffffd}, 0x1c) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000003940)={'team0\x00', 0x0}) bind$bt_hci(r1, &(0x7f0000003980)={0x1f, r2}, 0xc) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ubi_ctrl\x00', 0x24a480, 0x0) write$P9_RLCREATE(r3, &(0x7f00000038c0)={0x18, 0xf, 0x1, {{0x59, 0x1, 0x3}, 0xa0f}}, 0x18) recvmmsg(r0, &(0x7f0000003700)=[{{&(0x7f0000000040)=@generic, 0x80, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/223, 0xdf}, {&(0x7f00000001c0)=""/103, 0x67}, {&(0x7f0000000240)=""/109, 0x6d}], 0x3, &(0x7f0000000300)=""/140, 0x8c}, 0x4}, {{&(0x7f00000003c0)=@hci, 0x80, &(0x7f0000001680)=[{&(0x7f0000000440)}, {&(0x7f0000000480)=""/224, 0xe0}, {&(0x7f0000000580)=""/122, 0x7a}, {&(0x7f0000000600)=""/104, 0x68}, {&(0x7f0000000680)=""/4096, 0x1000}], 0x5, &(0x7f0000001700)=""/231, 0xe7}, 0x1}, {{&(0x7f0000001800)=@nfc_llcp, 0x80, &(0x7f0000001900)=[{&(0x7f0000001880)=""/123, 0x7b}], 0x1, &(0x7f0000001940)=""/99, 0x63}, 0x9}, {{0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f00000019c0)=""/209, 0xd1}, {&(0x7f0000001ac0)=""/5, 0x5}, {&(0x7f0000001b00)=""/166, 0xa6}, {&(0x7f0000001bc0)=""/67, 0x43}, {&(0x7f0000001c40)=""/252, 0xfc}, {&(0x7f0000001d40)=""/151, 0x97}, {&(0x7f0000001e00)=""/64, 0x40}], 0x7}, 0x3}, {{&(0x7f0000001ec0)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000002480)=[{&(0x7f0000001f40)=""/118, 0x76}, {&(0x7f0000001fc0)=""/36, 0x24}, {&(0x7f0000002000)=""/251, 0xfb}, {&(0x7f0000002100)=""/57, 0x39}, {&(0x7f0000002140)=""/168, 0xa8}, {&(0x7f0000002200)=""/106, 0x6a}, {&(0x7f0000002280)=""/225, 0xe1}, {&(0x7f0000002380)=""/227, 0xe3}], 0x8, &(0x7f0000002500)=""/4096, 0x1000}, 0x3}, {{0x0, 0x0, &(0x7f0000003680)=[{&(0x7f0000003500)=""/71, 0x47}, {&(0x7f0000003580)=""/251, 0xfb}], 0x2, &(0x7f00000036c0)=""/8, 0x8}, 0x3f}], 0x6, 0x20, &(0x7f0000003880)={0x77359400}) 15:09:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a201001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0xf0ffffff7f0000, @loopback}, 0x10) 15:09:07 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0xe91, 0x40) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000080)=0x1) 15:09:07 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x40086602, &(0x7f0000000040)) 15:09:07 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x10, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = socket$inet6(0xa, 0x0, 0x2) fsetxattr$security_capability(r1, &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0x101, 0xff00}, {0x80, 0x8000}]}, 0x14, 0x1) r2 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0xfffffffffffffffd, 0x402) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x0, 0x0) write$FUSE_POLL(r2, &(0x7f0000000180)={0x18, 0x0, 0x6, {0x87fb}}, 0x18) 15:09:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a007a01000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x100000000000000, @loopback}, 0x10) 15:09:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a001f01000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:07 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000040)={'netdevsim0\x00', 0x4}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:09:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0xf00000000000000, @loopback}, 0x10) 15:09:07 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x40087602, &(0x7f0000000040)) 15:09:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000003000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:08 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000180), &(0x7f0000000200)=0x4) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@empty, @empty, 0x0, 0x4, [@local, @multicast2, @remote, @remote]}, 0x20) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty, 0x2}, 0x1c) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) connect$rds(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) 15:09:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a002001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x1000000000000000, @loopback}, 0x10) 15:09:08 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x4020940d, &(0x7f0000000040)) 15:09:08 executing program 1: r0 = semget(0x3, 0x0, 0x10) semctl$GETZCNT(r0, 0x2, 0xf, &(0x7f0000000040)=""/207) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:09:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000005000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:08 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) socket$inet6(0xa, 0x3, 0x7ffffffd) 15:09:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x2f00000000000000, @loopback}, 0x10) 15:09:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:08 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x80045432, &(0x7f0000000040)) 15:09:08 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x2000) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000180)={'raw\x00', 0xed, "a8268fc1ee710da15ff2d40e1fd41393385f826ec850ecac1aff879a127355dc3d643d242fc9ae054b9adf7889c5770638ba6d5f1757ba1562f4a26ec1ea5359ed431b982da2445d2b80180d172b112241fdb990f4b97bb4bb0174bbad1204e8cd1a8b6497b3ad593f5637e0c76a957b0203ed88c192c468e3adbd2caed26968b3182a189c70f0b847b7b473c18b8875f23cf5f7beeb55813b29cec231cbfeacb8a1e50f780401f649c46bd00b99b1ab2e7123b3af8cddd90df3c83bce687ce59925094c33c4520e4aef1f1268ce9db5ac33870d959bd6f32f1ea215c0abb2a78c335beb43ebba925fd05e3c62"}, &(0x7f00000002c0)=0x111) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xffffffffffffffff, 0x800) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000300)=0x881761f5a1f6aa64, 0x4) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000080)=ANY=[@ANYBLOB="98000000bfacfe721e46d632aa3971a5a3c6fd25fb3bcd3f3875ecfa800fe2bfd7e93e9bd8b6bf58a398f8e61f0e1ce52c94919188d3155c5b32d692cd7400441f1704303dca9e26df3e810086b689065978c7b3872ef9abb6546162fe00138c21a3eadd8595b512c16fc9d7e81a098374e512ca521b42c4a7182e1011282b494a5ddb8a7c94db59c74593d846d30c63c27b0c6577e7452cd5e602e7"]) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000840)={{0xffffffffffffffff, 0x1, 0x2, 0x2}, 0x81, 0x2, 'id1\x00', 'timer0\x00', 0x0, 0xfff, 0x80, 0x800}) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000940)={0x3000, 0x1, 0xcfd, 0x8, 0x9aa8}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r2, 0xc4c85513, &(0x7f0000000340)={{0x9, 0x0, 0x5, 0x100, 'syz1\x00', 0x9}, 0x0, [0xfff, 0x2, 0xff, 0x5, 0x3, 0x23, 0x5, 0x100000000, 0x1, 0x9, 0x8001, 0x8, 0x2, 0x0, 0x1, 0x9, 0xfffffffffffffffe, 0x7, 0x81, 0x0, 0x7333, 0xffffffffffff0001, 0x800, 0x8, 0x1, 0x0, 0x37, 0x1ff, 0x8, 0x1000, 0xfffffffffffffff7, 0x4, 0xffffffff, 0x7, 0x1, 0xd251, 0x6, 0xfffffffffffffc01, 0x3, 0x7b4, 0x8, 0x7fff, 0x3, 0xa7, 0xffffffffffffffff, 0x80, 0x9, 0x0, 0x9, 0x1, 0x4, 0x9, 0x2, 0x200, 0xffff, 0x0, 0x101, 0x7, 0x20, 0x3843b9ff, 0x1f80000000, 0x3, 0x7, 0xffffffffffffff01, 0x7, 0x7, 0x129, 0x2, 0x7, 0x8, 0x2, 0x5, 0x4, 0x7, 0x8, 0x3ff, 0x0, 0x1c454a8f, 0xfffffffffffff5d2, 0x0, 0x2, 0x2471eed800000000, 0x3, 0x7, 0x5, 0x3, 0x1, 0x1, 0x1000, 0x5, 0x9, 0x2, 0xe2, 0x5, 0x1, 0x3f, 0x3, 0xffffffffffff0001, 0x10001, 0x4, 0x4, 0xe34, 0xe33, 0x8, 0xfbf, 0x54513890, 0x0, 0x2, 0x7, 0x400, 0x8000, 0x0, 0x3e22, 0xdf0, 0x80, 0x1f, 0x203e0cf9, 0x1, 0xc7, 0xffffffffffffff00, 0x0, 0x3, 0x20, 0xff, 0x1, 0x9, 0x2, 0x101], {0x77359400}}) 15:09:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000006000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a102001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4000000000000000, @loopback}, 0x10) 15:09:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xc0', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:08 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x80045440, &(0x7f0000000040)) 15:09:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0xb8fd3f0000000000, @loopback}, 0x10) 15:09:08 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e21, 0x33e0, @mcast1, 0x200}, @in6={0xa, 0x4e20, 0x6, @remote, 0x10001}, @in6={0xa, 0x4e24, 0x1, @mcast1, 0x8}, @in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e24, 0x1000, @loopback, 0x2}, @in6={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0xe}, 0xeb}, @in6={0xa, 0x4e21, 0x7fff, @local, 0x100000000}], 0xb8) 15:09:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000f000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a002301000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:08 executing program 1: r0 = socket$inet6(0xa, 0xffffffffffffffff, 0x10002000000002) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) 15:09:09 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x80086601, &(0x7f0000000040)) 15:09:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x0f', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0xeffdffff00000000, @loopback}, 0x10) 15:09:09 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) umount2(&(0x7f0000000040)='./file0\x00', 0x2) 15:09:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000013000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:09 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x80087601, &(0x7f0000000040)) 15:09:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback=0x7f000002}, 0x10) 15:09:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0f2301000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:09 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x2, @local, 0x2}, 0x1c) 15:09:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000014000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:09 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x80, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x2) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000000c0)={0x9, 0x0, 0x1, 0xffffffffffffffff}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000100)={0x1ff, r2}) 15:09:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback=0x7f00003e}, 0x10) 15:09:09 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0xc0045878, &(0x7f0000000040)) 15:09:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a003f01000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:09 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0xc0045878, &(0x7f0000000040)) 15:09:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00001f000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a004001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:10 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0xc0189436, &(0x7f0000000040)) 15:09:10 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x48000) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:09:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000025000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a004801000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:10 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0xc020660b, &(0x7f0000000040)) 15:09:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:10 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$setlease(r0, 0x400, 0x3) 15:09:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:10 executing program 1: r0 = socket$inet6(0xa, 0xb, 0xfffbfffffffffffd) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x7, 0x2002) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x2}) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x4, 0x200000) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f0000000200)=""/85) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:09:10 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x2) 15:09:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00003f000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:10 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x1, 0x4000) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000100)=""/4096) r1 = socket$inet6(0xa, 0x2, 0x2) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xb) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:09:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a004c01000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:11 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x3) 15:09:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:11 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x800, 0x0) getsockopt(r0, 0x1, 0x5, &(0x7f0000000280)=""/4096, &(0x7f0000001280)=0x1000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xf8, r2, 0xa00, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xa9c}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffa6b}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x40}}}}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x165}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0xf8}}, 0x4000040) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:09:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000040000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:11 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x4) 15:09:11 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x40, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@window={0x3, 0xb58, 0x3}, @sack_perm, @mss], 0x3) bind$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff}, 0x10) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x1}, 0xf) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000080)=0x1) 15:09:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a006801000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:11 executing program 1: r0 = socket$inet6(0xa, 0x7, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:09:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:11 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:09:11 executing program 1: r0 = msgget(0x3, 0x400000000059a) msgctl$IPC_RMID(r0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 15:09:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a006c01000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000397000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:11 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000040)=""/191, &(0x7f0000000100)=0xbf) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4e20, 0xffffffffffffffff, @remote, 0x6}, 0x1b) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x101442, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000008b000000da01417b0140887bf2536f4c67292fd6370bb3a7063130417b86721b1d79d8ad3ad4bb791a26bbc800595c65b4bdf3ab7fbaad4af0a3d151f4784751eb44c6148afa69b876dbae4a419f5377005fd4ded6be4285f61e02ed7d082acc6907c62125d4aa4b13d7f218dd53181b5a11f87b31f97aeedf32964bc5576f904dd77f0706cb84e5af1c4be3b9c150c3b458428373a9a2"], &(0x7f00000002c0)=0xaf) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x9, 0x400) r2 = open(&(0x7f0000000140)='./file0\x00', 0x400480, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000180)=[@sack_perm, @sack_perm], 0x2) [ 1644.571203][T30337] mkiss: ax0: crc mode is auto. 15:09:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1644.625054][T30446] mkiss: ax1: crc mode is auto. 15:09:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1644.646334][T30450] IPVS: length: 191 != 24 15:09:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a007401000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:12 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x80, @remote, 0x2}, 0x18c) [ 1644.676198][T30450] IPVS: length: 191 != 24 15:09:12 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x6) 15:09:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000002000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:12 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) 15:09:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:12 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000080)) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={@bcast, @null, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @default, @bcast, @null]}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000025c0)=[{{0x0, 0x0, &(0x7f0000002500)=[{&(0x7f0000000140)="49d3bae03e39799d3db073fce4f0da11434ceb329af3bff340a52e91b1c74330dac877f809b29f9b4b0736d1fc748a07bd5e680632d795af39c1d4b6bcfdf9cb7082b9b50f0112392d9a60952def3e16e61bd05f4bd3e0e50b47448971f808fce98016a271afb3a0ea556bc57cd5e34046baa41809d7c54f582e4427f4130b1bafa4560a0c3586e4c8377f2512a84cc2ff840a90051eeb510b232f4673459a05a5381b3a7c42d113db8e5f8335e9bad50e9b15a8a51e3bd8fc77159e9b183fd4396569412262433e7cc1c383d559912ce48b4e7778173343b900dedd1b77fe2f", 0xe0}, {&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001240)="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", 0x1000}, {&(0x7f0000002240)="1f778749e21e6630370db43eab85cb5ad38b05106064478772dc34a5802447e6ede1de80c05fa42b92c23480bf3e1557734407bdab4b8851ea225489082e75199e7dbd0fcfebc16cfbc239460505420cf5cc1d37ffa4f8887c658f300bc4546a252dcb86f80948b98675db02fa753c5a5321703beff8a683915198249ca4a5add879eed82ca51cf1a9ac86f732e5f6b8b4fce663953671378389b307f7cb9186e212af8569c6568c2b6b7798f365b83def1613b2", 0xb4}, {&(0x7f0000002300)="fdc1cc7236f3a44ad7e23b951b0ca159f447310e7faee9d33a7707a2c6128a61bd81d2dcab41f9d8130aefb495616fe2138376307e43046cc184d444f17e28a1d04f67084e8cfecc35df0c568a7baa5fb504b44441e9c6ada10d884d10c8ed96ffd31e7308a31847619a0cd907", 0x6d}, {&(0x7f0000002380)="ef8107ecff6be8a327de9eaf7caac3d80a0cda731fbe96efcae2e6eefccddefc24d05585fe26c50b26fd2dc9ba6b60ebe46eed4b5cf77cb740eaea70ca2771493b96f31555e514e979622c2cc2b95e806a168ad54beea5309e57b219cc451a1f25e4eb3193c882586cfc9905bfa46d629f84cc2c20c689c3c3825c9d647879cae5e33ed4c2d4f0a133f22c9624c1119526974954ed4b", 0x96}, {&(0x7f0000002440)="95228b2e4807097b0a0b3153bfb2814a1f7431b846bd61a50d0d38390b778204ea43aa3e8711faf10b416aedd2d551ba9df50fd1a78c567b83fd2b1f6d10522468d18f896857c6381ab179dd9b5be75eb93c6364120a18bfe804f6aa74dde3964f85263f28dc84b3071a3ecf849becd0ca936b9784c49911f0931f3bd8f1f093279f32", 0x83}], 0x7, &(0x7f0000002580)}, 0xff}], 0x1, 0x8000) 15:09:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a007a01000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:12 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) 15:09:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:12 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) write$binfmt_elf32(r0, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xffffffffffff8000, 0x1, 0x4, 0x7, 0x0, 0x6, 0x991f, 0x296, 0x38, 0x306, 0x5, 0x4, 0x20, 0x2, 0x7, 0x9, 0x1}, [{0x5, 0x8, 0x80, 0x3, 0x6, 0x5, 0x1, 0x334f6b00}], "4c5d5e62af0a5193056b1e022f", [[], [], [], [], []]}, 0x565) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/full\x00', 0x10000, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x3) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000600)={@rand_addr=0x2e, @multicast2, 0x0, 0x5, [@multicast1, @broadcast, @remote, @broadcast, @multicast1]}, 0x24) [ 1645.242117][T30683] sp0: Synchronizing with TNC 15:09:12 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x10002) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f00000000c0)=""/152) r1 = socket$inet6(0xa, 0x2, 0x2) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x80000000, 0x81, 0x968, 0x7}) 15:09:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000003000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1645.322023][T30742] sp0: Synchronizing with TNC 15:09:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0fff01000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:12 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x8) 15:09:12 executing program 1: r0 = socket$inet6(0xa, 0x100000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1, 0xbb8, 0x1, 0x4, 0x80, 0x2ec2}) 15:09:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:12 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x7, &(0x7f0000000400)=[{&(0x7f0000000580)="fe36f84f50d15cf3c9ccf1cac10233d67eb4ccd4e2c6b1939e351fb93fdd2dbc4e811d525a974e6063713c8b2d24afcc3be9e1a360a8e364c6aacb727b51609336e0a71f0330523fcb079e2d67120c6d29308f1b164c029d482fd44bc37ba54890e31af0d199551a174ceccf51d1595de25b1bb4407f7393681b46f8f6f809c324c56f045c0332de99", 0x89, 0xfffffffffffffffd}, {&(0x7f0000000180)="f65d8f3c4df116db140cd92bbe1c1d23d97f7f34b06afc", 0x17, 0x10004}, {&(0x7f00000001c0)="4e0ee440a2f670b17c78a8de07311e1edeb13798d75d94a0bac1cc005396f7f840d38a3bcebe77f7031e9b5e4de7c6b83c6b78a4fbce866915709ed2992a070fc463d3f74180ee46fdfea079a2ca77c0a22cb005493ef13809955182e87101515ca8fb37f836eb47bb159c9e7657a41f64f1e9b0dbd58b9c5551273b3f90bb86289f2a2e0846ad21f80b13f2a0465649c022188a4c69838f4de8c141d1bafd161f03c204d70c7e5df35f8c286501dc71649f73944f924b4c4cd34489a5cc9441f56591518afdb14de4996649e9d071dfca56b1d2c5a5c1", 0xd7, 0x7ffffffc}, {&(0x7f00000002c0)="29525771dfe965a033d1dc06acebc75208ede1033d2f13f548b624a8bd45fffd0c19f2b96f2fcf43e37494606f204780e6a9e51ae90859dbf3dbdca95d190d8f1126dcd4fc2e0000000000", 0x4b, 0xfffffffffffffb42}, {&(0x7f0000000640)="58fde0eb096443e4aac187feaaefb4dbaa7150e6e10c0ec2352d5eb9c35b6c988ede54172466df89c00129a1c5", 0x2d, 0xf8}, {&(0x7f0000000380)="d8765fd5c7bc08bcf82a9c310ead43967831c30cd1c3daf08f25fc653eb12ae09636c59b856c6d8ab0d40ca1ec6a", 0x2e, 0x2}, {&(0x7f0000000680)="4056bbe349923d54c088687e", 0xc, 0x9}], 0x4fffe, &(0x7f00000004c0)={[{@shortname_win95='shortname=win95'}, {@utf8no='utf8=0'}, {@numtail='nonumtail=0'}, {@utf8no='utf8=0'}, {@utf8='utf8=1'}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}, 0x2}, 0x1c) 15:09:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000004000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:13 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x10) 15:09:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000000010000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:13 executing program 1: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@random="45e2eefdd0d6", @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 15:09:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000005000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:13 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x304) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000480)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 15:09:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:13 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x1d) 15:09:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1646.136309][T31249] device nr0 entered promiscuous mode 15:09:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000000030000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:13 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000080)={r0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00'}) 15:09:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000006000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:13 executing program 1: openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) select(0x40, &(0x7f00000000c0)={0x8, 0x2, 0x4, 0xb60, 0xe, 0x5, 0xd816, 0x7}, &(0x7f0000000100)={0x314018d, 0x3, 0x937f, 0x2, 0x7fff, 0xfffffffefffffffe, 0xff, 0x4}, &(0x7f0000000140)={0x4, 0xb83, 0x2, 0x6e, 0x8, 0x8, 0x8000, 0x800}, &(0x7f00000001c0)={0x0, 0x2710}) r3 = syz_open_procfs(0x0, &(0x7f0000000740)='\x00\b\x00\x00tinfo\x00\xb1x\xb4@/\xb6\x04+\x16\xd2)\x8a\n\x80\xd6\xb1\n\v\x13\x8d\x1a\xfb58p\x00\x89>\xd0]\x12\x9bT\xd9\x91\b\xcf|\xd8\xb5\xee\xceDM\xdf\x1d(\xa6lIt\x7f\xa5\x8b\xb8\xd5A\xc9\x8a\xe1Ga\xde1\xdfa\x1f\xc7\x10,\xa4\xedN\xa4\v/\x1d\x84\xd2\xad\x8a\xf9\xd2\x8a\xe2\xa6d\x97^\xb0l\xe1\xbf\xbc\xe6}\xcf \xa9\x15\x96\x83`5\xf8\xef\x04\xd0@\x96\xd8x\x18\xac\x9fu\xf1\x85nE\xd3\xab\xc7fBEIM`\xb9\x17\xd3\xe1w\x98\xb0\xf3v\x98\xa8\xf8\xdd\xdcN \xe4\xa5#e\x8a\xb6\xd7') prctl$PR_GET_DUMPABLE(0x3) read(r1, &(0x7f0000000a80)=""/245, 0xfffffffffffffe9c) ioctl$VIDIOC_S_EDID(r3, 0xc0285629, &(0x7f0000000480)={0x0, 0x6, 0x6, [], &(0x7f0000000340)=0x8}) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f0000000e00)) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000640)=0x84000) write$P9_RUNLINKAT(r3, &(0x7f0000000300)={0x7, 0x4d, 0x2}, 0x7) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000180)) syz_open_dev$dri(&(0x7f0000006400)='/dev/dri/card#\x00', 0xbfffffffffffffff, 0x2141) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000006440)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@initdev}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000065c0)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f00000063c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000066c0)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e22, 0x36c4, 0x4e21, 0x2, 0xa, 0x20, 0x20, 0x3f, r4, r5}, {0x4, 0x1000, 0x2, 0x1f, 0x5eb, 0x8, 0x5, 0x1}, {0x1, 0x0, 0x100000001, 0xdc19}, 0x2, 0x6e6bb5, 0x2, 0x1, 0x2, 0x2}, {{@in6=@rand_addr="53b5363330131bf9314a745da064829d", 0x4d4, 0x6c}, 0x2, @in6=@rand_addr="570f3b0ac57663d41971adb68dbf7d0a", 0x3504, 0x5, 0x3, 0x5, 0x3, 0xffffffffffff25d7, 0x2}}, 0xe8) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x0, 0x0, [0x9, 0x8, 0x0, 0xffffffffffff14af, 0x10000, 0x8, 0xff, 0xffff]}) bind$rose(r3, &(0x7f0000000240)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) linkat(r3, &(0x7f0000006540)='./file0\x00', r3, &(0x7f00000006c0)='./file0\x00', 0x1400) fcntl$getownex(r2, 0x10, &(0x7f0000000200)) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x6, @multicast1, 0x0, 0x0, 'dh\x00', 0x20, 0x80000000, 0x17}, 0x2c) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x40, 0x0) recvmmsg(r2, &(0x7f0000006240)=[{{&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000a00)=[{&(0x7f00000004c0)=""/130, 0x82}, {&(0x7f0000000580)=""/181, 0xb5}, {&(0x7f0000000800)=""/255, 0xff}, {&(0x7f0000001080)=""/4096, 0x1000}, {&(0x7f0000000400)=""/6, 0x6}, {&(0x7f0000000900)=""/227, 0xe3}, {&(0x7f0000000b80)=""/199, 0xc7}, {&(0x7f0000000440)=""/24, 0x18}], 0x8, &(0x7f0000000c80)=""/205, 0xcd}, 0x1000}, {{&(0x7f0000000d80)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000002080)=""/220, 0xdc}, {&(0x7f0000000700)=""/18, 0x12}, {&(0x7f0000002180)=""/4096, 0x1000}], 0x3, &(0x7f0000000f80)=""/100, 0x64}, 0x4}, {{&(0x7f0000003180)=@ax25={{0x3, @bcast}, [@rose, @netrom, @null, @default, @default, @rose, @netrom, @netrom]}, 0x80, &(0x7f00000037c0)=[{&(0x7f0000003200)=""/16, 0x10}, {&(0x7f0000003240)=""/209, 0xd1}, {&(0x7f0000003340)=""/222, 0xde}, {&(0x7f0000003440)=""/45, 0x2d}, {&(0x7f0000003480)=""/21, 0x15}, {&(0x7f00000034c0)=""/205, 0xcd}, {&(0x7f00000035c0)=""/124, 0x7c}, {&(0x7f0000003640)=""/77, 0x4d}, {&(0x7f00000036c0)=""/3, 0x3}, {&(0x7f0000003700)=""/157, 0x9d}], 0xa, &(0x7f0000003880)=""/143, 0x8f}, 0x3f}, {{&(0x7f0000003940)=@generic, 0x80, &(0x7f0000004c00)=[{&(0x7f00000039c0)=""/186, 0xba}, {&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/8, 0x8}, {&(0x7f0000004ac0)=""/66, 0x42}, {&(0x7f0000004b40)=""/160, 0xa0}], 0x5}, 0x2}, {{&(0x7f0000004c80)=@rc, 0x80, &(0x7f0000006100)=[{&(0x7f0000004d00)=""/184, 0xb8}, {&(0x7f0000005040)=""/4096, 0x1000}, {&(0x7f0000004dc0)=""/220, 0xdc}, {&(0x7f0000004ec0)=""/137, 0x89}, {&(0x7f0000004f80)=""/97, 0x61}, {&(0x7f0000006040)=""/188, 0xbc}], 0x6, &(0x7f0000006180)=""/153, 0x99}, 0xff}], 0x5, 0x10000, &(0x7f0000006380)={0x0, 0x989680}) ioctl$HCIINQUIRY(r3, 0x800448f0, &(0x7f0000006580)={r7, 0x1, 0xce38, 0x3, 0x100000001, 0x3f, 0x7}) ioctl$BLKRRPART(r6, 0x125f, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000), 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) 15:09:13 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x48) 15:09:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000000040000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:14 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x4c) 15:09:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000f000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:14 executing program 1: openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) select(0x40, &(0x7f00000000c0)={0x8, 0x2, 0x4, 0xb60, 0xe, 0x5, 0xd816, 0x7}, &(0x7f0000000100)={0x314018d, 0x3, 0x937f, 0x2, 0x7fff, 0xfffffffefffffffe, 0xff, 0x4}, &(0x7f0000000140)={0x4, 0xb83, 0x2, 0x6e, 0x8, 0x8, 0x8000, 0x800}, &(0x7f00000001c0)={0x0, 0x2710}) r3 = syz_open_procfs(0x0, &(0x7f0000000740)='\x00\b\x00\x00tinfo\x00\xb1x\xb4@/\xb6\x04+\x16\xd2)\x8a\n\x80\xd6\xb1\n\v\x13\x8d\x1a\xfb58p\x00\x89>\xd0]\x12\x9bT\xd9\x91\b\xcf|\xd8\xb5\xee\xceDM\xdf\x1d(\xa6lIt\x7f\xa5\x8b\xb8\xd5A\xc9\x8a\xe1Ga\xde1\xdfa\x1f\xc7\x10,\xa4\xedN\xa4\v/\x1d\x84\xd2\xad\x8a\xf9\xd2\x8a\xe2\xa6d\x97^\xb0l\xe1\xbf\xbc\xe6}\xcf \xa9\x15\x96\x83`5\xf8\xef\x04\xd0@\x96\xd8x\x18\xac\x9fu\xf1\x85nE\xd3\xab\xc7fBEIM`\xb9\x17\xd3\xe1w\x98\xb0\xf3v\x98\xa8\xf8\xdd\xdcN \xe4\xa5#e\x8a\xb6\xd7') prctl$PR_GET_DUMPABLE(0x3) read(r1, &(0x7f0000000a80)=""/245, 0xfffffffffffffe9c) ioctl$VIDIOC_S_EDID(r3, 0xc0285629, &(0x7f0000000480)={0x0, 0x6, 0x6, [], &(0x7f0000000340)=0x8}) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f0000000e00)) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000640)=0x84000) write$P9_RUNLINKAT(r3, &(0x7f0000000300)={0x7, 0x4d, 0x2}, 0x7) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000180)) syz_open_dev$dri(&(0x7f0000006400)='/dev/dri/card#\x00', 0xbfffffffffffffff, 0x2141) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000006440)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@initdev}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000065c0)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f00000063c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000066c0)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e22, 0x36c4, 0x4e21, 0x2, 0xa, 0x20, 0x20, 0x3f, r4, r5}, {0x4, 0x1000, 0x2, 0x1f, 0x5eb, 0x8, 0x5, 0x1}, {0x1, 0x0, 0x100000001, 0xdc19}, 0x2, 0x6e6bb5, 0x2, 0x1, 0x2, 0x2}, {{@in6=@rand_addr="53b5363330131bf9314a745da064829d", 0x4d4, 0x6c}, 0x2, @in6=@rand_addr="570f3b0ac57663d41971adb68dbf7d0a", 0x3504, 0x5, 0x3, 0x5, 0x3, 0xffffffffffff25d7, 0x2}}, 0xe8) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x0, 0x0, [0x9, 0x8, 0x0, 0xffffffffffff14af, 0x10000, 0x8, 0xff, 0xffff]}) bind$rose(r3, &(0x7f0000000240)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) linkat(r3, &(0x7f0000006540)='./file0\x00', r3, &(0x7f00000006c0)='./file0\x00', 0x1400) fcntl$getownex(r2, 0x10, &(0x7f0000000200)) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x6, @multicast1, 0x0, 0x0, 'dh\x00', 0x20, 0x80000000, 0x17}, 0x2c) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x40, 0x0) recvmmsg(r2, &(0x7f0000006240)=[{{&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000a00)=[{&(0x7f00000004c0)=""/130, 0x82}, {&(0x7f0000000580)=""/181, 0xb5}, {&(0x7f0000000800)=""/255, 0xff}, {&(0x7f0000001080)=""/4096, 0x1000}, {&(0x7f0000000400)=""/6, 0x6}, {&(0x7f0000000900)=""/227, 0xe3}, {&(0x7f0000000b80)=""/199, 0xc7}, {&(0x7f0000000440)=""/24, 0x18}], 0x8, &(0x7f0000000c80)=""/205, 0xcd}, 0x1000}, {{&(0x7f0000000d80)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000002080)=""/220, 0xdc}, {&(0x7f0000000700)=""/18, 0x12}, {&(0x7f0000002180)=""/4096, 0x1000}], 0x3, &(0x7f0000000f80)=""/100, 0x64}, 0x4}, {{&(0x7f0000003180)=@ax25={{0x3, @bcast}, [@rose, @netrom, @null, @default, @default, @rose, @netrom, @netrom]}, 0x80, &(0x7f00000037c0)=[{&(0x7f0000003200)=""/16, 0x10}, {&(0x7f0000003240)=""/209, 0xd1}, {&(0x7f0000003340)=""/222, 0xde}, {&(0x7f0000003440)=""/45, 0x2d}, {&(0x7f0000003480)=""/21, 0x15}, {&(0x7f00000034c0)=""/205, 0xcd}, {&(0x7f00000035c0)=""/124, 0x7c}, {&(0x7f0000003640)=""/77, 0x4d}, {&(0x7f00000036c0)=""/3, 0x3}, {&(0x7f0000003700)=""/157, 0x9d}], 0xa, &(0x7f0000003880)=""/143, 0x8f}, 0x3f}, {{&(0x7f0000003940)=@generic, 0x80, &(0x7f0000004c00)=[{&(0x7f00000039c0)=""/186, 0xba}, {&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/8, 0x8}, {&(0x7f0000004ac0)=""/66, 0x42}, {&(0x7f0000004b40)=""/160, 0xa0}], 0x5}, 0x2}, {{&(0x7f0000004c80)=@rc, 0x80, &(0x7f0000006100)=[{&(0x7f0000004d00)=""/184, 0xb8}, {&(0x7f0000005040)=""/4096, 0x1000}, {&(0x7f0000004dc0)=""/220, 0xdc}, {&(0x7f0000004ec0)=""/137, 0x89}, {&(0x7f0000004f80)=""/97, 0x61}, {&(0x7f0000006040)=""/188, 0xbc}], 0x6, &(0x7f0000006180)=""/153, 0x99}, 0xff}], 0x5, 0x10000, &(0x7f0000006380)={0x0, 0x989680}) ioctl$HCIINQUIRY(r3, 0x800448f0, &(0x7f0000006580)={r7, 0x1, 0xce38, 0x3, 0x100000001, 0x3f, 0x7}) ioctl$BLKRRPART(r6, 0x125f, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000), 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) 15:09:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000000080000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:14 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x60) 15:09:14 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd601bfc97004d8800fe8000000000000000000000000000000100000000000000000000000000000100004e20004d9078e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"], 0x0) 15:09:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000010000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) rmdir(&(0x7f00000005c0)='./bus\x00') lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, 0x0) 15:09:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000000200000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:14 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x68) 15:09:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:14 executing program 1: r0 = socket$inet(0x10, 0x800000003, 0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="24000000010707031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 15:09:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000013000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:14 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x6c) 15:09:14 executing program 1: r0 = socket$inet(0x10, 0x800000003, 0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="24000000010707031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 15:09:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000000210000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:15 executing program 1: clone(0x800000000001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x6400000000000000, 0x80, &(0x7f0000000480)=@broute={'broute5\x00\x00\x06\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}, 0x1f0) 15:09:15 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x74) 15:09:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000014000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a906151", 0x22) 15:09:15 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7a) 15:09:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000300000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000025000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a906151", 0x22) 15:09:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a906151", 0x22) 15:09:15 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x142) 15:09:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a906151", 0x22) 15:09:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000400000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000000030000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a906151", 0x22) 15:09:15 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x300) 15:09:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a906151", 0x22) 15:09:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a906151", 0x22) 15:09:16 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x500) 15:09:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000097030000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000800000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:16 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a906151", 0x22) 15:09:16 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a906151", 0x22) 15:09:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:16 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x600) 15:09:16 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a906151", 0x22) 15:09:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000000d30000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a906151", 0x22) 15:09:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a002100000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:16 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x700) 15:09:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a906151", 0x22) 15:09:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a906151", 0x22) 15:09:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0xf) 15:09:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000201000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:16 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xf23) 15:09:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a906151", 0x22) 15:09:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000000d70000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x202b4010) 15:09:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a906151", 0x22) 15:09:17 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x1d00) 15:09:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1008008910, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a906151", 0x22) 15:09:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000301000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a906151", 0x22) 15:09:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000000d80000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:17 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x1f00) 15:09:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000880)=""/4096, &(0x7f0000000040)=0x1000) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a906151", 0x22) 15:09:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000f9ffff7f000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a906151", 0x22) 15:09:17 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x2000) 15:09:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x400100) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000401000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 15:09:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000100)=0x5) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, &(0x7f0000000140)={0xffffffff, 0xcab, 0x81}) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r3 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r3, 0x3, &(0x7f0000000040)=""/106) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:17 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x230f) 15:09:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 15:09:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00001fffffff000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 15:09:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) 15:09:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7fff, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) prctl$PR_GET_FP_MODE(0x2e) 15:09:18 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x3f00) 15:09:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000501000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) 15:09:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001020000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000012, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0xfffffffffffffffd, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x24000, 0x0) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000080)={0x0, 0x32, 0x14, 0x3, 0xa, 0x0, 0x0, 0x11a, 0x1}) 15:09:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) 15:09:18 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x4000) 15:09:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b0", 0x11) 15:09:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) mq_open(&(0x7f0000000040)='U{vboxnet1+@ppp0\x00', 0x800, 0x80, &(0x7f0000000080)={0x3, 0x5, 0x4, 0x3, 0xa1bb, 0x8000, 0x9, 0xaffa}) r2 = openat$vimc2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_G_PRIORITY(r2, 0x80045643, 0x3) 15:09:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000601000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b0", 0x11) 15:09:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x2) syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0xfff, 0x4000) r2 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0xe0000, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) r3 = msgget$private(0x0, 0x400) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000240)={0x4, 0x7, 0xffffffff, 0x0, 0x5, 0x23, 0x1b, "86fbdaf66702809410717a2981164ba2ae80125d", "ed2987e5adf9092a60f40a8645e4cb4969432ec7"}) msgctl$IPC_INFO(r3, 0x3, &(0x7f00000000c0)=""/164) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040)=0x200000000000005, 0x4) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) ioctl$SIOCX25GDTEFACILITIES(r1, 0x89ea, &(0x7f0000000080)) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x8, 0x410000) ioctl$TIOCSBRK(r2, 0x5427) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @broadcast}, 0xffffffba) 15:09:18 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x4201) 15:09:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001030000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b0", 0x11) 15:09:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800200}, 0xc, &(0x7f00000003c0)={&(0x7f00000000c0)={0x2e8, r2, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0xa8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc03a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xcfb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xcf58}]}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffff7}]}, @TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x23a}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x2c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffff800}]}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x68e0c4c5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3e76}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x81}]}, @TIPC_NLA_BEARER={0x17c, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7aa8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6e0}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'teql0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x3, @local, 0x3}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x10000, @mcast2, 0xfffffffffffff801}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x0, @local, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xfffffffffffffffe, @empty, 0x5}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0xcf84, @dev={0xfe, 0x80, [], 0xa}, 0x8001}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast1}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb1b3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10c}]}]}]}, 0x2e8}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 15:09:18 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x4800) 15:09:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000701000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01ab", 0x1a) 15:09:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01ab", 0x1a) 15:09:18 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x7c, r1, 0x322, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x20}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8001}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xe28f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0x7c}, 0x1, 0x0, 0x0, 0x8040}, 0x20000000) r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001040000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01ab", 0x1a) 15:09:19 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x4c00) 15:09:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1, &(0x7f0000000000)="0adc1f123c123f3188b070") getsockopt$inet_mreqsrc(r0, 0x0, 0x2e, &(0x7f00000000c0)={@multicast2, @dev, @initdev}, &(0x7f0000000100)=0xc) r1 = socket(0x2000400000002006, 0x806, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @rand_addr=0x401}, {0x7}, 0x30, {0x2, 0x4e22, @local}, 'veth1_to_bond\x00'}) bind$inet(r0, &(0x7f0000000840)={0x2, 0x4e22, @broadcast}, 0xfffffffffffffeef) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140)={0x3, [0x40, 0xffffffffffffffff, 0x1]}, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000801000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f", 0x1e) 15:09:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001050000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f", 0x1e) 15:09:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x5) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000040), &(0x7f00000000c0)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0xffffffffffffffff) setpriority(0x0, r2, 0x10000) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x128) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f00000004c0)={{0x0, 0x3, 0x0, 0x7, '\x00', 0x4000000000000000}, 0x0, 0x1, 0x4, r2, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0xb1, 0x10001, 0x0, 0x1bc]}) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f0000000780)=@v2, 0x14, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000200)) r3 = socket(0x40000000015, 0x5, 0x0) bind$inet(r3, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:19 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x6000) 15:09:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f", 0x1e) 15:09:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:19 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x6800) 15:09:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001060000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a90", 0x20) 15:09:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000901000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:19 executing program 3: ioctl$VIDIOC_EXPBUF(0xffffffffffffff9c, 0xc0405610, &(0x7f0000000080)={0xf, 0x3ff, 0x10001, 0x84000, 0xffffffffffffff9c}) fsetxattr$security_capability(r0, &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x7, 0x1}]}, 0xc, 0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0xfffffffffffff000, &(0x7f0000000000)={&(0x7f0000000140)={0x14, 0x1c, 0xffffff1f, 0x0, 0x0, {0x1, 0x6000, 0x6000}}, 0x14}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r3 = socket(0x40000000015, 0x5, 0x0) bind$inet(r3, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000001c0), 0x12) 15:09:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a90", 0x20) 15:09:19 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x6c00) 15:09:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a90", 0x20) 15:09:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000a01000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001070000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a9061", 0x21) 15:09:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000040)=""/106, &(0x7f00000000c0)=0x6a) bind$inet(0xffffffffffffffff, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:20 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7400) 15:09:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a9061", 0x21) 15:09:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x2, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, &(0x7f0000000080)={0xffffffffcb6c1fbc, 0xf000}) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f00000000c0)=0x3) 15:09:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000b01000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:20 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7a00) 15:09:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a9061", 0x21) 15:09:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001080000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x80800, 0x0) ioctl$RTC_WIE_ON(r2, 0x700f) lsetxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f00000000c0)='%#\\:\xdflouser\x00', 0xc, 0x1) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x3ec) 15:09:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x108}, 0x20) 15:09:20 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x20000) 15:09:20 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, {0x2, 0x0, @multicast1}, 0x187, 0x0, 0x4, 0x4000000}) 15:09:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a002301000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001090000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1653.393728][ T2735] syz-executor.1 uses obsolete (PF_INET,SOCK_PACKET) 15:09:20 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x4e24, 0x401, @rand_addr="d286e6f964d6b82c3bef325c5741638b", 0x83d}], 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) recvfrom$packet(r2, &(0x7f00000000c0)=""/2, 0x2, 0x40000041, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:20 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x40000) 15:09:20 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, 0x0) close(r0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) creat(&(0x7f0000000740)='./file0\x00', 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) lseek(r0, 0x0, 0x0) 15:09:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010a0000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a004801000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:20 executing program 1: r0 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) unshare(0x400) flock(r0, 0x0) 15:09:21 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x1000000) 15:09:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x40, &(0x7f00000000c0)="0adc1f123c123f3188b070") bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @remote}, 0x10) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x802) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x4) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000080)=0x8000) 15:09:21 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00'}) 15:09:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:21 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, 0x0) close(r0) fcntl$getflags(0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) creat(&(0x7f0000000740)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0xd247b318216e19f4, 0x0, 0x0) lseek(r0, 0x0, 0x2) 15:09:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010b0000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a004c01000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:21 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x2000000) 15:09:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) fcntl$setown(r0, 0x8, r1) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @broadcast}, &(0x7f0000000100)=0xc) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x5, r3, 0x2e, 0xffffffffffffff9c}, 0x10) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000080)={0x9}, 0x4) bind$inet(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) 15:09:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x101, 0x40000) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f00000001c0)) r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000040)=""/251, &(0x7f0000000140)=0xfb) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r1, 0x10, &(0x7f00000002c0)={&(0x7f0000000200)=""/148, 0x94, 0xffffffffffffffff}}, 0x10) 15:09:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, &(0x7f0000005280)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000240)=ANY=[@ANYBLOB='7:2\t'], 0x4) sendfile(r2, r2, &(0x7f0000000040), 0x1) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={r4}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r5, 0x84, 0x6c, &(0x7f0000000300)={0x0, 0x4c, "c1801afe57b53a9f76bdfdeca543bfddacd48bd8c5c0da97a706fc65d44b404b7feace32cfb873398bf1feaa3b15a92781a6597df6ab3a4bbb69f5652d4e246cda1eda0411d86a3da598d2c9"}, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000400)={r6, 0xb6}, 0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) listen(r4, 0x5eb857) r7 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r7, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r8 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg(r8, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 15:09:21 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x3000000) 15:09:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001100000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1654.362610][ T3144] IPVS: length: 251 != 24 15:09:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a006801000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x9, 0x200) openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x80, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000100)={{0x0, 0x2, 0x400, 0x3, 0xff}, 0x200, 0x6269f2fa, 'id0\x00', 'timer1\x00', 0x0, 0x1, 0x8000, 0x3, 0x100}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x1000004e20, @loopback}, 0x88) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1654.527637][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1654.533623][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1654.539492][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1654.545252][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1654.551149][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1654.556927][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1654.562772][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1654.568837][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:09:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000001c0012000c00010069706970000000000c00020008000ac0bf000000"], 0x1}}, 0x0) 15:09:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:22 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x4000000) 15:09:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mlock2(&(0x7f000061e000/0x4000)=nil, 0x4000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x802004, 0x0) 15:09:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001230000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bind$inet(0xffffffffffffffff, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) r1 = semget$private(0x0, 0x3, 0x0) semctl$IPC_RMID(r1, 0x0, 0x0) 15:09:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a006c01000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:22 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000000)={@local, @local, [], {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @remote, "", @dev, "ef0013ed48d6fcdbf3ab8dee17939183"}}}}, 0x0) 15:09:22 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5000000) 15:09:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./bus\x00', 0x9, 0x9, &(0x7f0000001880)=[{&(0x7f00000001c0)="8d74af96faeedfefccf3394dc0c1469d08bf9f57bed14797b76d7d6d8b0644350c12420364cbba48a0d294ea61dbf72819657bb34d24d663af5446586678334648c6136918dd98de381cec2f71847b0279b5dddcb3c2d06ed0fe7c524c8d705c89c200f0a5ae64634540e8b2c29fc0544402355f8572b5a1335fddbeb95b9754c0a51b158dfdd7c1bf1ff625c0d71e34bc3f4f16463de34664527fa3c2", 0x9d, 0x3}, {&(0x7f0000000140)="940b1a08131a34383d6c87ff67f24b9efe8c784f716b59cb9c69e496e81a4755cf658f076e66b9a930c054", 0x2b, 0x7}, {&(0x7f0000000340)="ba79dccc51efe02dcb0f91ac59d3ce95502b7ce7605a29e7082e5292bb51dfa8f899bc3bbdca8dac34f966b9e0145786893eda29a03eef8f74c2637d2ebee932b29e1198f99ed728b4aede8c40b357448af224bbfb8c4cd14171763041bca9f537c9cd4df874c5ad5e6ff959d7e6590f35360382cd1625c4828423f85acce8fc70cf125592146b50bbd0d7b2f55e234d62283dd0faa48da20fc8f0a2d4856f6a86ad1fb0e04631c45b65173fa48e9b88916947f11bda0f1b98441716f1b0237912b95717940708b2883bb069bf737c3de92079810d55f7d4d23f871650b1bd7169618cf024a6bea17e2ddd85143154", 0xef, 0x9}, {&(0x7f0000000440)="15cf71c3812db0b045635cac4bf2dc3edb7cd84e4b4914b0acf7ee5e7c7054cfb9a2409b01482c3442b96688acb8518c1a79f8e73fb6f54c1d1f0c1d785cb6e50dcb225b58bf07ddf750f020b32fa0d684051f77aa4601dd8031ac673651be07e18ab59756ab5c49ddb1e8b153a3c37dcd09cab67220982cd426ce4bc81a88e84bf568ddc5322046bbca174d8bb1f2f498066210f8d38e55bbc7eb", 0x9b}, {&(0x7f0000000500)="8f770ab32f6ae41a96bb3d85abd1d71cda33a638512ab32680b49b412128ed74ca92f2f1b271eb40be8d4a82534361e00a2a800a8ebc574bd54447058c84b501f18e4572354dabb91ff6d45ae368315c028806f65f21d4afa174a3e6467ef5c32f12e59aa30a5ecdccbeada4f7ad2332689c423eae1c241bcc42179d15fab1958d9b5f5bee8f3d53b1fc14175df88b58c92674c13f5dc27aa3e0f18ef9a1795fd98a55f3d9966f7d88d128524ff1620b759f15d64287585e866dd9d097d8f07229c90b", 0xc3, 0x100000000}, {&(0x7f0000000600)="35ad994743b07e2bde2ddc6599b4fdec65d5381c482d7177d4cdc08b8686e516947feece96a54678cc4508f2772cefe1840cc8c58d279177876d65fdd5bdeb7b7b8a61cc50d02b61f8ba5c08d691488957ed434d4c1cef502e89f38074792861ef8098e6cea1794c01e8a7efc38ba36f46d6c785d865f66806fe8c6aa16858b25647548db4e6ec69c09876e9891a9a61fcf33021ffd60e7661e6cff46081", 0x9e, 0x4}, {&(0x7f0000000880)="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", 0x1000, 0x2}, {&(0x7f00000006c0)="f3072cbcc518f62a5b17e0e5e7bce3d93c25a9c69da2ba65ec8b83edddb2c58323820f6a9c8f2714ce5bf599ae29a194540dca120beb0735424ffe479728fc40c1862ebf5a0d39badf6b1840fbce615158ba5c1136a3ce27bffebaf5219a07d81d59af8c8505c344fceca4c27016ea769c5cf394e0d4ef135a856f3a3cc7be400c8727cf4abd2f821604a87ed428dd797640ab95270ed70f0020c985856f6b3d", 0xa0, 0x3ff}, {&(0x7f0000000780)="228f588d9104a97c3ae833c889143a0d2f4d6c4e363e8105b58089e624c2dc1761340dec975676ed99f2c77d1ed05a287121689fbe2f9a31599738abbb0cf80abadf82a1d76ce922862edc9d110be80ff1802cd062d35c1d0434a826fc1f82e783cc8a374d47ff8414e394075be5aad47efecb38ca269d6eb49a3077b7f35f847732851d5d47c14d7a9519af5bb1f794aff9bcee91c279d9f62be6ec09e002f8fb6c5368e2d0c0a2ab6fc0467725e4", 0xaf, 0x713}], 0x802, &(0x7f0000001980)={[{@tails_on='tails=on'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@hash_r5='hash=r5'}, {@balloc_border='block-allocator=border'}, {@grpquota='grpquota'}, {@expose_privroot='expose_privroot'}, {@jdev={'jdev', 0x3d, './bus'}}, {@balloc_border='block-allocator=border'}], [{@smackfsroot={'smackfsroot', 0x3d, 'GPL)'}}, {@dont_measure='dont_measure'}, {@smackfsroot={'smackfsroot', 0x3d, 'posix_acl_accessposix_acl_accesswlan1wlan1'}}, {@fsname={'fsname', 0x3d, 'overlay\x00'}}]}) mknodat(r1, &(0x7f0000000300)='./bus\x00', 0x1200, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:22 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast1}, 0x187, 0x0, 0x4, 0x4000000}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f00000000c0)) 15:09:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001480000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:22 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x6000000) 15:09:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x8bf2}, 0x4) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x2000200) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/mnt\x00') setns(r3, 0x0) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 15:09:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a007401000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1655.178210][ T3540] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "hash=r5" 15:09:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000014c0000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1655.280945][ T3659] IPVS: ftp: loaded support on port[0] = 21 15:09:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x5, 0x8, 0x200, 0x8000, 0x80, 0x4, 0xfffffffffffffff7, 0x9, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000100)={0x9, 0x9, 0x8008, 0x3, 0x1, 0x8000, 0x40, 0x3, r2}, &(0x7f0000000140)=0x20) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r3 = socket(0x40000000015, 0x5, 0x0) bind$inet(r3, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:22 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7000000) [ 1655.470595][ T3674] IPVS: ftp: loaded support on port[0] = 21 15:09:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:22 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x8000000) 15:09:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x800, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000000080)=0x2) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f00000000c0)) 15:09:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a007a01000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001680000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x5, 0x4000) bind$inet(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) fcntl$getflags(r1, 0x408) 15:09:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x8bf2}, 0x4) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x2000200) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/mnt\x00') setns(r3, 0x0) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 15:09:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:24 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x10000000) 15:09:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000016c0000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:24 executing program 3: syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x5, &(0x7f00000002c0)=[{0x8, 0x7, 0x5, 0x6}, {0xc088, 0x10001, 0x4, 0x3f}, {0xffffffffffff0001, 0x9, 0xdcc8, 0x7}, {0x8, 0x1, 0x1f, 0x80000000}, {0x7ff, 0x6, 0x2, 0x10001}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x5, 0x5, 0x0) getsockname$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000480), &(0x7f00000004c0)=0x4) r2 = getuid() setitimer(0x0, &(0x7f0000000140)={{}, {0x77359400}}, &(0x7f0000000180)) r3 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x10001, 0x40000) getsockname(r3, &(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000280)=0x80) ioctl$RNDADDENTROPY(r3, 0x40085203, &(0x7f0000000340)=ANY=[@ANYBLOB="0400000097000000e3ca6dc4b0e5b3c45924aea26add55c0010000000100000069f4f98f539dbe8e485ddf077fdaf12aed1c7f429da571e0d57fd7487307d8ac637091bde7afdeee359351e2332f9c4b0977fffa38e01bec6b0d8bd5782d273a5448ecbe3212205b47b58728901f79028bbd12ed5b517f3e5b4542d1869966fd15c665effd01b108a2f9316f47b7842375b8bc6697c2e80c4d1619bfd4cfc21cf54632fc599159e5c9d09d"]) r4 = getgid() unshare(0x4000000) lchown(&(0x7f0000000100)='./file0\x00', r2, r4) getsockopt$inet6_dccp_int(r3, 0x21, 0x17, &(0x7f0000000200), &(0x7f0000000240)=0x4) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x9) 15:09:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000003000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1657.427991][ T4034] IPVS: ftp: loaded support on port[0] = 21 15:09:24 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) sendmsg$rds(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/33, 0x21}, {&(0x7f0000000440)=""/63, 0x3f}], 0x2, &(0x7f0000000a80)=[@zcopy_cookie={0x18, 0x114, 0xc, 0xffffffff}, @rdma_dest={0x18, 0x114, 0x2, {0x2, 0xff}}, @rdma_args={0x48, 0x114, 0x1, {{0x8, 0x2}, {&(0x7f00000004c0)=""/238, 0xee}, &(0x7f0000000800)=[{&(0x7f00000005c0)=""/173, 0xad}, {&(0x7f0000000680)=""/163, 0xa3}, {&(0x7f0000000740)=""/142, 0x8e}, {&(0x7f0000000880)=""/252, 0xfc}], 0x4, 0x75, 0x3}}, @fadd={0x58, 0x114, 0x6, {{0x76f3, 0x80000}, &(0x7f0000000980)=0x5aba, &(0x7f00000009c0)=0x9, 0x8, 0xa0, 0x100000000, 0x77c, 0x0, 0x5}}, @cswp={0x58, 0x114, 0x7, {{0x3ff, 0x5}, &(0x7f0000000a00)=0x5, &(0x7f0000000a40)=0x3, 0x24, 0x3, 0x800, 0x3, 0x0, 0x2}}], 0x128, 0x880}, 0x800) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x300, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) write$P9_RLINK(r0, &(0x7f0000000c00)={0x7, 0x47, 0x2}, 0x7) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) write$P9_RSTATu(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="7a0000007d0100000065000700ff7f0000400100000005000000000000000000000009000000d000000053e600000000000000000c0073797374656d63707573657413002d2d766d6e65743125656d31637075736574001300766b626f786e6574305c7b5b2a3a5b266574683000", @ANYRES32=0x0, @ANYRES32=r2, @ANYRES32=r3], 0x7a) poll(&(0x7f0000000c80)=[{r1, 0x2000}, {r0, 0x80}, {r1, 0x22}, {r1, 0x4a2}, {r1, 0x1}], 0x5, 0xd3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r4}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x1}, &(0x7f00000000c0)=0x8) write$P9_RMKDIR(r0, &(0x7f0000000c40)={0x14, 0x49, 0x1, {0x4, 0x0, 0x6}}, 0x14) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r5, 0x84, 0x78, &(0x7f0000000100)=r6, 0x4) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r7 = socket(0x40000000015, 0x5, 0x0) bind$inet(r7, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r7, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:24 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x1d000000) 15:09:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001740000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000005000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x80000000004e21, @local}, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x8bf2}, 0x4) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x2000200) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/mnt\x00') setns(r3, 0x0) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 15:09:25 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x1f000000) 15:09:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xf9', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1657.876826][ T4256] IPVS: ftp: loaded support on port[0] = 21 15:09:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x8bf2}, 0x4) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x2000200) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/mnt\x00') setns(r3, 0x0) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 15:09:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f0104000000000000ef1e028469f9242c5221f7f6ed4e1059c4521145804da7dfd3268c21f1a745b04fc74c0c35970d4d2eda54974482d3ef9290c8df622d6523d874822a9ec3a582c45ea21993ea91f7095136280952461455d812cbe7190237c26ec0c2284b6ad1a209cbae5508b064807d7e1b222aab7e0240903a138c0708") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000017a0000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:25 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x20000000) 15:09:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000006000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:25 executing program 3: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1658.150609][ T4373] IPVS: ftp: loaded support on port[0] = 21 15:09:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xfc', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000300000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:25 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x230f0000) 15:09:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000040)=0x5, &(0x7f0000000080)=0x2) 15:09:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000007000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000500000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x8bf2}, 0x4) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x2000200) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/mnt\x00') setns(r3, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 15:09:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000140)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xb}}, @in=@empty, 0x4e23, 0x83e0000000000000, 0x4e23, 0x200, 0xa, 0xa0, 0xa0, 0x2e, 0x0, r1}, {0x4, 0x4177a08a, 0x400, 0x4, 0x1, 0xfffffffffffffff7, 0x9, 0x2}, {0x7, 0x8, 0x5, 0x6}, 0x0, 0x6e6bbc, 0x0, 0x0, 0x2, 0x2}, {{@in=@local, 0x4d4, 0x6c}, 0x2, @in=@broadcast, 0x3505, 0x2, 0x2, 0x0, 0x7, 0x3, 0x80000001}}, 0xe8) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket(0x20040000000015, 0x5, 0x6cd4) bind$inet(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:27 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x3f000000) 15:09:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xfd', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000f000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000600000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x8bf2}, 0x4) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x2000200) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/mnt\x00') setns(r3, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 15:09:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x1, @loopback}, 0x12b) sendto$inet(r1, 0x0, 0x0, 0x800, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) chroot(&(0x7f0000000040)='./file0\x00') r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x2, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4000) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000001c0)={0x4, 0x1, 0x10000}) 15:09:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x8bf2}, 0x4) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x2000200) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/mnt\x00') setns(r3, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 15:09:28 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x40000000) 15:09:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000700000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000013000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x8bf2}, 0x4) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x2000200) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/mnt\x00') clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 15:09:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x8c', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000000)=0xe8) r3 = getgid() write$FUSE_ATTR(r0, &(0x7f0000000200)={0x78, 0xffffffffffffffff, 0x1, {0x3, 0x0, 0x0, {0x6, 0xffffffffffffffff, 0x4, 0xff4b, 0x4, 0x9, 0x5, 0x3, 0x9, 0x4, 0x2, r2, r3, 0xe72, 0x6}}}, 0x78) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000080)={0x785231be, 0x8}) prctl$PR_GET_THP_DISABLE(0x2a) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040)=0x9, 0x4) iopl(0x800) 15:09:28 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x42010000) 15:09:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000900000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1661.119402][ T4955] IPVS: ftp: loaded support on port[0] = 21 15:09:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x2000, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000000200)={0x400000000000000, 0x0, [], {0x0, @reserved}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) r3 = semget(0x1, 0x6, 0x4) semctl$SETVAL(r3, 0x0, 0x10, &(0x7f0000000480)=0x4) r4 = open(&(0x7f0000000040)='./file0\x00', 0x2040, 0x8) ioctl$SG_GET_NUM_WAITING(r4, 0x227d, &(0x7f00000002c0)) ioctl$SG_SET_COMMAND_Q(r4, 0x2271, &(0x7f0000000080)=0x1) setsockopt$inet_tcp_buf(r2, 0x6, 0x0, &(0x7f00000000c0)="6de0082365acdc3b61efe191b7fd4e44486e9d0013f79b8b8ad7a01d739d18e033d9b5107a", 0x25) bind$inet(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) fsetxattr(r2, &(0x7f00000004c0)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000500)='/dev/dlm_plock\x00', 0xf, 0x1) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000400)={{0x6, 0x8}, {0x7316, 0x80}, 0xa9, 0x1, 0x8}) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000000100)={0x81}) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000540)={0x2, 0xfff}) read(r0, &(0x7f0000000300)=""/204, 0xcc) 15:09:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x8bf2}, 0x4) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x2000200) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/mnt\x00') clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 15:09:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000014000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xf4', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:28 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x48000000) [ 1661.427235][ T5076] IPVS: ftp: loaded support on port[0] = 21 15:09:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000a00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x8bf2}, 0x4) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x2000200) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 15:09:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00001f000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:28 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x4c000000) 15:09:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x8bf2}, 0x4) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x2000200) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) [ 1661.754123][ T5098] IPVS: ftp: loaded support on port[0] = 21 15:09:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000b00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:29 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x60000000) [ 1661.954780][ T5111] IPVS: ftp: loaded support on port[0] = 21 15:09:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f0000000040)="7fd9412b7e34657b036c5e04b12e654f6b578f134407e4185a8a02869ab09aab2addd34152d3eb2e455796e83f2195daab1a29e35b665a07a7e3d78ed09d1e98d8bc490b01455769773559df4a7bc97b2bfc6a3e4903029de4cad1e86a76bdd3f13bb76629ef9d24d28439f83c2e1f0359bdf0e268de29eee5b0e102b15c81d79ccb1718aeae93586e15fbe3ec5faa6a370e65b38305a7214b5c8a2c76de50fdbbcf97035b9653837378035ff0ef87f50dce71cb0589d088b8451b0d898021ca", 0xc0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xf5', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000025000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x8bf2}, 0x4) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 15:09:29 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x68000000) 15:09:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001230f00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1662.304613][ T5227] IPVS: ftp: loaded support on port[0] = 21 15:09:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000080)={0x1, 0x1, {0x30, 0x1, 0x8, 0x1d, 0x1, 0x1000, 0x1, 0xb4, 0x1}}) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00003f000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xf6', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:29 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x6c000000) 15:09:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x8bf2}, 0x4) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 15:09:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001201000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x2, @random="153cf3f4020d", 'bridge_slave_1\x00'}}, 0x1e) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) prlimit64(r2, 0xf, &(0x7f00000000c0)={0x0, 0x8}, &(0x7f0000000100)) [ 1662.637211][ T5428] IPVS: ftp: loaded support on port[0] = 21 15:09:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xfb', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:30 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x74000000) 15:09:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000040000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x8bf2}, 0x4) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 15:09:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001001f00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0xfffffe42) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1662.960482][ T5558] IPVS: ftp: loaded support on port[0] = 21 15:09:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:30 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7a000000) 15:09:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001002000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008915, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r1, 0x0, 0x9, &(0x7f0000000180)='vboxnet0\x00'}, 0x30) sched_getattr(r2, &(0x7f0000000200), 0x30, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000100)=[@in6={0xa, 0x4e22, 0x7fffffff, @dev={0xfe, 0x80, [], 0xc}, 0x5}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e24, @rand_addr=0x2}, @in6={0xa, 0x4e21, 0x0, @mcast1, 0xda}], 0x58) r3 = socket(0x40000000015, 0x5, 0x0) bind$inet(r3, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x118) ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000080)={0x8, 0x8, 0xffffffffffffff00, 0x20}) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000397000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x4048081) setsockopt$inet6_int(r1, 0x29, 0x5a, &(0x7f0000000040)=0x6, 0x4) 15:09:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001102000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:30 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xfdfdffff) 15:09:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x8bf2}, 0x4) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 15:09:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000002000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8, &(0x7f0000000000)="0adc1f123c123f3188b070") lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.syz\x00', &(0x7f00000000c0)='^vboxnet1@}\x00', 0xc, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001002300000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:32 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xfeffffff) 15:09:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=0x0, &(0x7f0000000180)=0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000001c0)={r2, 0x4}, &(0x7f0000000200)=0x8) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x9, 0x6, 0x66, 0x10000, 0x9}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x4}, &(0x7f0000000100)=0x8) [ 1665.622662][ T6036] IPVS: ftp: loaded support on port[0] = 21 15:09:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:32 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xfffffdfd) 15:09:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010f2300000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000003000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 15:09:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) setitimer(0x2, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, &(0x7f0000000080)) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1665.926195][ T6155] IPVS: ftp: loaded support on port[0] = 21 15:09:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:33 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xfffffffe) 15:09:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x10) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) 15:09:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001003f00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000004000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x204100, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e22, @multicast1}}, [0xfff, 0x0, 0x3, 0x68e102de, 0x81, 0x6, 0xbb, 0x3e, 0x1, 0x101, 0x1, 0x20, 0x7f, 0x7f, 0x2]}, &(0x7f0000000180)=0x100) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000001c0)={0x3, 0x8000, 0x4, 0xffffffff, r2}, &(0x7f0000000200)=0x10) r3 = socket(0x40000000015, 0x5, 0x0) bind$inet(r3, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x3) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1666.236923][ T6269] IPVS: ftp: loaded support on port[0] = 21 15:09:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x10) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) 15:09:33 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x1000000000) 15:09:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000005000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) socket(0x9, 0x7, 0x7) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001004000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1666.626034][ T6393] IPVS: ftp: loaded support on port[0] = 21 15:09:34 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x1000000000000) 15:09:34 executing program 3: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x800) connect$bt_sco(r0, &(0x7f0000000080)={0x1f, {0x10000000000000, 0x4, 0x36, 0x2, 0x7fffffff, 0x80}}, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket(0x40000000015, 0x4, 0x407) bind$inet(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x10) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) 15:09:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000006000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001004800000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1667.014689][ T6569] IPVS: ftp: loaded support on port[0] = 21 15:09:34 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x2000000000000) 15:09:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 15:09:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000007000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:34 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000600)='/dev/autofs\x00', 0x12280, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000640)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000740)={0x9, {{0x2, 0x4e23, @rand_addr=0x3}}}, 0x88) r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000000c0)=@nat={'nat\x00', 0x1b, 0x5, 0x4d8, 0x320, 0x320, 0x128, 0x1f8, 0x0, 0x440, 0x440, 0x440, 0x440, 0x440, 0x5, &(0x7f0000000040), {[{{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffffff, 0xff, 'lapb0\x00', 'rose0\x00', {0xff}, {0xff}, 0x73, 0x1, 0x22}, 0x0, 0xf0, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x1, 0xc20}}, @common=@ttl={0x28, 'ttl\x00', 0x0, {0x3, 0x2}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x1, @empty, @dev={0xac, 0x14, 0x14, 0x1a}, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x1c}, 0xff000000, 0xffffffff, 'veth0_to_bridge\x00', 'rose0\x00', {0xff}, {0xff}, 0x0, 0x1, 0x40}, 0x0, 0x98, 0xd0}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x11, @broadcast, @loopback, @gre_key=0x8, @gre_key=0x1}}}}, {{@ip={@loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xff0000ff, 0xff, 'vcan0\x00', 'ip6tnl0\x00', {0xff}, {}, 0xff, 0x1, 0x28}, 0x0, 0xf0, 0x128, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x0, 0xcc}}, @common=@inet=@udp={0x30, 'udp\x00', 0x0, {0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id=0xff, @icmp_id=0x66}}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, 0xffffffff, 0xff, 'batadv0\x00', 'bcsf0\x00', {0xff}, {}, 0xff, 0x1, 0x8}, 0x0, 0xe8, 0x120, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x3, 0x7, 0x600000000, 0x1}}, @common=@icmp={0x28, 'icmp\x00', 0x0, {0xf, 0x4697, 0x5f9f, 0x1}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x1, @dev={0xac, 0x14, 0x14, 0x19}, @dev={0xac, 0x14, 0x14, 0x18}, @gre_key=0x80000001, @icmp_id=0x66}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000700)={r0, &(0x7f0000000680)="8afb7b4a3c61e6ffff5b92b2b105e7d990a26e472d76b8a16153038880d8073a2365c3d18c6064b64cbca317967a723e00e623e32b3738d5ba02fbffcac1c3be234ad22d40a8ffb0442744c238e38183423a206a9047386c864c794f5fff7d89fc14"}, 0x10) 15:09:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001004c00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:34 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x4000000000000) [ 1667.367001][ T6732] IPVS: ftp: loaded support on port[0] = 21 15:09:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0xfffffffffffffdd2) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000f000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:35 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x100000000000000) 15:09:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fdatasync(r0) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000200)={{0x4, 0x8}, 'port0\x00', 0x10, 0x8, 0x1c88000000, 0xd0, 0x0, 0x20, 0x81, 0x0, 0x6, 0x8}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket(0x40000000016, 0xfffffffffffffffc, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x400, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) write$input_event(r3, &(0x7f0000000040)={{0x0, 0x7530}, 0x0, 0x9, 0x8}, 0x18) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f0000000180)=ANY=[@ANYBLOB="01e7ff000000000041550000040000000000000000000000fbffffff0700000000000000000000000000000000000000000000000000000062ff4731b2a35b5c20a9981db636c7a40b7552e85630ce91b54107326a1de2614d5361bbfa9d57"]) bind$inet(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x4004880, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0xffffffffffffff27) 15:09:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001006800000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x84000, 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x9) r2 = socket(0x40000000015, 0x5, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000001c0)={0x4, [0x10000, 0x9, 0x7, 0x18]}, &(0x7f0000000200)=0xc) ioctl$SIOCX25SCALLUSERDATA(r2, 0x89e5, &(0x7f0000000040)={0x5a, "41c2db32b7f4f87f89b7ac1d144dfdbbf060e6a73a35d0513cc96a03f50df4866313f5c4031710043c2852ca030dbe51c9dd702e55c5b88c952f6b224ccebb36461c09bebae24dfea87d17e3f5d872c082bfd27fc4cc1b742bce560a372570afb16c465d44300934848211efdb82e418c1c22055b2b4ce552f2a2367f30c1a43"}) 15:09:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 15:09:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:37 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x200000000000000) 15:09:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000010000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:37 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x1, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x1) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f00000001c0)={&(0x7f0000000180)=[0x0, 0x0, 0x0], 0x3}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000240)=0x8) getpeername(r2, &(0x7f0000000100)=@can, &(0x7f00000000c0)=0xfffffc71) ioctl$SIOCAX25DELFWD(r2, 0x89eb, &(0x7f0000000040)={@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) bind$inet(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001006c00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1669.889253][ T7183] QAT: Invalid ioctl [ 1669.956522][ T7188] IPVS: ftp: loaded support on port[0] = 21 15:09:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f0000000040)={0x5}) 15:09:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001007400000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:37 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x300000000000000) 15:09:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000013000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 15:09:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:37 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x400000000000000) [ 1670.363384][ T7411] IPVS: ftp: loaded support on port[0] = 21 15:09:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001007a00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x5, 0x0, 0x4161, 0x0, 0x6}, &(0x7f0000000080)=0x14) getsockopt(r1, 0x0, 0x9, &(0x7f0000000140)=""/28, &(0x7f0000000180)=0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000000c0)={r2, 0xf, "9b58bf20ece02fd2fc3697452ac595"}, &(0x7f0000000100)=0x17) 15:09:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000014000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getpgrp(0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:09:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:37 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x500000000000000) 15:09:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188db0d4489b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001c0ed00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1670.743384][ T7601] IPVS: ftp: loaded support on port[0] = 21 15:09:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000025000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:09:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:38 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x600000000000000) 15:09:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000011, 0x5, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1671.044466][ T7754] IPVS: ftp: loaded support on port[0] = 21 15:09:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010fff00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:38 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 15:09:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) syz_init_net_socket$llc(0x1a, 0x3, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:38 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x700000000000000) 15:09:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000000030000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1671.362770][ T7883] IPVS: ftp: loaded support on port[0] = 21 15:09:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000090000000300000078020000c000000000000000c0000000c0000000c0000000e0010000e0010000e0010000e0010000e001000003000000672b368e69cdf750a553e7e59fa3244812c666fb03e68d29ab5ef04ba52760014a77f9851c32e19a0e36a53254f2b50698944497ec1a536831b0a116454de56007372985fa14b2a480eba2c2fc9a09e777a1b75e889447ffc30c22a2acc3bb56d37e40844f035cd3079c4a7524a8e626c6868095adeb2ec132fdddb97b6be59f9446f6b6a2824ea4d90f9af41afd9b26118fc7fb501f03a5a6", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/48], @ANYBLOB="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"], 0x2d8) r1 = socket(0x40000000015, 0x80f, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000004000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:38 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x800000000000000) 15:09:38 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 15:09:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) stat(&(0x7f0000000140)='\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000200)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) r5 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000600)={{{@in=@multicast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0, 0x0}, &(0x7f0000000780)=0xc) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000007c0)={{}, {0x1, 0x7}, [{0x2, 0x2, r2}, {0x2, 0x6, r3}, {0x2, 0x1, r4}, {0x2, 0x4, r5}, {0x2, 0x1, r6}, {0x2, 0x3, r7}, {0x2, 0x7, r8}, {0x2, 0x0, r9}, {0x2, 0x5, r10}], {0x4, 0x2}, [{0x8, 0x3, r11}], {0x10, 0x7}, {0x20, 0x1}}, 0x74, 0x2) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1671.732552][ T8140] IPVS: ftp: loaded support on port[0] = 21 15:09:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000097030000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:39 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x1000000000000000) 15:09:39 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 15:09:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0xdf) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x800, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f00000000c0)={r0, 0x64b}) r2 = socket(0x40000000013, 0x8002, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$inet6_int(r3, 0x29, 0x9, &(0x7f0000000100), &(0x7f0000000140)=0x4) r4 = dup3(r2, r2, 0x80000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) 15:09:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000010000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:39 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x1d00000000000000) [ 1672.158783][ T8290] IPVS: ftp: loaded support on port[0] = 21 15:09:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008915, &(0x7f00000000c0)="0ad595ea008bdea063d28ade3cab12123c123fd9ade11c") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast2}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000000)=0xe8) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000040000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000000200000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xd2', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:39 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 15:09:39 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x1f00000000000000) 15:09:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x6, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) r2 = getpid() r3 = fcntl$getown(r1, 0x9) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000080)={r1, r1, 0x80}) bind$isdn(r1, &(0x7f0000000040)={0x22, 0x5, 0x80000001, 0x4, 0x2abe}, 0x6) 15:09:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000010001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1672.633367][ T8494] IPVS: ftp: loaded support on port[0] = 21 15:09:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000000210000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:40 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x2000000000000000) 15:09:40 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 15:09:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000020001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000f9ffff7f000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1673.129525][ T8673] IPVS: ftp: loaded support on port[0] = 21 15:09:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x80042, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000080)={0x9, 0x0, 0x2012, 0xffffffff, 0x6, {0x11, 0x4}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:40 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x230f000000000000) 15:09:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1673.408005][ T8673] cgroup: fork rejected by pids controller in /syz1 15:09:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000030001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:40 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 15:09:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}, 0xc) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x400006, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00001fffffff000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:40 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x3f00000000000000) 15:09:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1673.671314][ T8845] IPVS: ftp: loaded support on port[0] = 21 15:09:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x13, 0x5, 0x56a) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x1, 0x80, 0x7, 0x7400000000}, {0x8, 0x100, 0xc1, 0x401}, {0x95a0, 0xfa, 0x8635, 0x8}, {0x5, 0x7fffffff, 0x8000}, {0x400, 0x100000001, 0x9, 0x4c}, {0x5, 0x5, 0x0, 0x8}]}, 0x10) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x4000000, &(0x7f00002b4000)={0x2, 0x100000, @multicast1}, 0x98) open(&(0x7f00000000c0)='./file0\x00', 0x8201, 0x120) 15:09:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000040001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001020000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:41 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x4000000000000000) 15:09:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x8000, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r1, 0xc040564a, &(0x7f0000000080)={0x7, 0x0, 0x0, 0x6, 0x4, 0x5, 0x53d}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket(0x40000000015, 0xa, 0x0) fgetxattr(r0, &(0x7f00000002c0)=@random={'trusted.', '\x00'}, &(0x7f0000000300)=""/122, 0x7a) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x2, &(0x7f0000000200)=[{&(0x7f0000000880)="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", 0x1000, 0x3}, {&(0x7f0000000140)="bd6901db5db4b600c556303ddc3f14376bba36c2b46058e48c162446be3d6a88c724269edc8ad4af01f2cf6efcf5cec8d8584a4b3a125d11cc87fd1e5880c6a7ced47611f6e43e5a1e27997eccd8dd50b7a7570af63cb1b6980f21b23e4d9a855af06da389ecbc9669633a576d5b45b641fff24f42554abe243d3c7f67d64c829440a4e6519fc2ae15cbbf3d8ee9c9fddc626d9d766bed2f170c0db3a99ca684a52e8d40862c0feccd24544b23c596e23996a3709ceb108d4144eff8f9df25", 0xbf, 0x1000}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7764653d757365722d62617365642c70724a71756f74613d2f6465762f7a65726f002c61707072616973655f740370653d696d7375626a5f747970653d2c6f626a5f747970653d2f6465762f7a65726f002c0000000000000000"]) bind$inet(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000050001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1674.263499][ T9188] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0xa9f2068) [ 1674.291330][ T9188] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 1674.325842][ T9188] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1674.336090][ T9188] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 15:09:43 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 15:09:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001030000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:43 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x4201000000000000) 15:09:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000060001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0xb0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000080)=@int=0x6, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1676.322412][ T9343] IPVS: ftp: loaded support on port[0] = 21 15:09:43 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x4800000000000000) 15:09:43 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x20080, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={r1, 0x100000000}, 0x8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r3 = socket(0x40000000015, 0x5, 0x0) bind$inet(r3, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000070001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001040000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x4e24, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:43 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 15:09:44 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x4c00000000000000) [ 1676.732911][ T9635] IPVS: ftp: loaded support on port[0] = 21 15:09:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000080001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:44 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 15:09:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:44 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x6000000000000000) [ 1677.002441][ T9749] IPVS: ftp: loaded support on port[0] = 21 15:09:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001050000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4, @multicast2}, 0xfffffffffffffc1e) 15:09:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000090001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:09:44 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x6800000000000000) 15:09:44 executing program 3: socketpair(0x5, 0x1, 0x80, &(0x7f0000001a00)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000001a40), 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000480)={&(0x7f0000000240), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES16=r2, @ANYBLOB="000226bd7000ffdbdf250500000034000100080004004e23000008000b00736970000800090001000000080002006f390000080006006f766600080001000a000000340002000800050009000000080002004e210000080007000001000008000500000000000800040008000000080004000000000008000400000000800800040003000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4000}, 0xc000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x50040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r4, &(0x7f0000000200)={0x8}) r5 = socket(0x40000000015, 0x5, 0x0) getdents64(r4, &(0x7f0000000100)=""/247, 0xf7) bind$inet(r5, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r6 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) ioctl$VIDIOC_G_JPEGCOMP(r6, 0x808c563d, &(0x7f0000000380)) sendto$inet(r5, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000a0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1677.487305][T10075] IPVS: ftp: loaded support on port[0] = 21 15:09:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:44 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x6c00000000000000) 15:09:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x1, 'batadv0\x00', 0x4}, 0x18) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:45 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000b0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001060000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000040)) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:45 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7400000000000000) 15:09:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:09:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) ioctl$IMGETCOUNT(r1, 0x80044943, &(0x7f0000000040)) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:47 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000100001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001070000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:47 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7a00000000000000) 15:09:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:47 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f0000000040)=0xfffffffffffffc00) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1680.149584][T10570] IPVS: ftp: loaded support on port[0] = 21 15:09:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:47 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xfdfdffff00000000) 15:09:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001080000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:47 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000001f0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) write$input_event(r1, &(0x7f00000000c0)={{r2, r3/1000+30000}, 0x0, 0x9, 0x9}, 0x18) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000040)=0x77cc, 0x4) 15:09:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:09:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:47 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xfeffffff00000000) 15:09:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000040), &(0x7f0000000080)) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001090000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1680.639756][T10910] IPVS: ftp: loaded support on port[0] = 21 15:09:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000200001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:09:48 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xffffffff00000000) 15:09:48 executing program 3: prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000380)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pwritev(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)="aa48e57342eab0073a09133c297b32de7ac808ef9815ebf61e247d6c1e0a49212fb57bf36b8cb17f766932946027c2956e3598cdb16bee943ab4063f177c320b0bb7ac33cd408bd100b57da98ac5ca45554798604e6c06fa39d22b9ce7229815f497ce9c575e6a8f3d68342b13aee1731985b3b4ed2b65c62edfb618156e0e1fbd8be73936af61f9b66317a4e11fa1231876ac78980a787f7cbbce8f34eeaed23b4220b9992461af9872d27c5ea7a176e7d405f432f67f72491ca618d24a8a79c1a9c95e2d5d1f68b4e3ef82ddc66394865e1d", 0xd3}, {&(0x7f0000000880)="182b530d68bbeaad0b949139389a0afca896da6fc66c0ec5dafbd88f1a6dac09880af82d4927ee866b3204bd594a468451b539f20dcfc1cd8336e4258f27f58ff82370268d912680f2b8686112dbf71aab846756d43697f8775b206b94f8ba1eb315a715fc5fd2be6d258305022a4993ddc0563f16b7381825740c1573b23ae6793e909a120d79ab9e4a4afda8a09206743717ac163354f5a1102bf5dcd3775d2f433398d144abbb78684d3a211bf74d51054160a36372264ebafb913b21f89fc1b80a1b305deaea0060b135c22b23804b1cff22d3acdba3eee8c8b5e3bd5e48667a9bcf23037abf10ed0e6987fc1acbb453c4852af1e35da4c8969d7b1a7114982d0255f8b19b3db145f18be5a3d7d0d33edd4f3aa7a64ff39f2d583954f4876802b85e1c475c91f04a0dcd49b7718756f905e4da0e818c9b981dd2f3a2676dd5555ef19d7375aad75dc4696510b5939abbc0fa2fa2cfa0709fe3d1552f596a991e4499c78e08af3a4ec968e7ce8e1cb5aa465beaa462803c176b27f146762058e10062723115e5ebd0bdf288b69ceaeeb448a3d63b88ac8a191352ec41b67dfc925c9419353e9e16d0c6a7e8486029dca6ad652c326c6d50e69de508d387e6e28bba479fbbdfa5325a72a8c508628470c16e88c5ba23b53055a7499611972a7b85ef2bbfbbce74b8e27f96523a1bc8d8a4e3d0fa37b25b322a73c11d74277f92e2327a9e3f5ff27d61537ed7b1c9d30d4e901af9dad13c61cabc9e037dae4f4f4ffaabdf6f9554222ee14e12d278553700758bdb7beffe07d81f12c17baef0fa9f16acfcac580b055c41e630210086d689394e737b39d93f5dbbe1bdf2efcebeedc929b61950da3501d81c6b5f2b0201738d0a05d653e3aa12dde4d693d71727aed79082d82bcdb340d4c47138cac7d692d40d3234ff981bd0f54c197e45950e5edbd535fdbc7a65f27a262de45b610264e831cbb02eb5fa363c5b9fa266143e83bba9c5fef0da93d4ec9f10516664a738cbd0ffd8d305193f6fe65bffefdbc3015c80953e66c1ff7a5350ea28170c619231055e14b06f85e4d85c69ca984b0c0b3cb515a5f22ac37f6595dd15c17884d342d6dd1065aead79f38e9fd0508a8b186ac077e4c5d19d12ff7fc927fdfa6b4f72cd57bb13833ceae4c50b701bdfd0d3d0988f553affec1542a60edc476343be24409ee00afdd39cfabc00a23599b3d8df32000fb8ea1e30e8a18495c2c20d9b3d04d05d69437a635a117160e69405b9d2aa526267432db8e0279c471a2e102d92b29e0364c666d012c767d9a6a01d34837180a8dfd6f6df395b5dcf11df51cf590a78049e2c1948c4d055874ff58046fdb0bfd3606804c49f23292ebf1cbe85dfa54e277e2cf1fefbdee68772be45a79b3d0215bdbfd5d631f79cf7eadd900ba433bc1deaf0da12cd3f91a0a5149ebe264a3a9db2c6404b8bc1a4caf375f1b97168e88213431160656d6864fca4043f1be292bdb698081f21b8970154c14cf9a02f7b9a99f527455c95906151797f5a7b3189262fcc66bc8037002738f383b4a3cacf41b06c2a5fd75f1a365bd9457638c27ffdd2875e271bd16ec97543e843f2d80dd14c19b4dbcfec1e33e4121207471d7466b18b725cb16ce4eab61e957a45ad2541616e1c4ccaa2a34b3814cd26d98f5ff60f6a22a7b643e968607c2a5783f7edb9811e34b2c1f74d4c9dd0cd1af81024c9ded32ef264302f808a50680e51038612b60b7be2a876b60145e6cb9615627d79f5316dc6c36d16b14f485019b4ce7202aed98fcb234b75e28df83c6be1d93079984fe35438fb24ed02a87887eff1fb6852acfd7da62b640bde32f8ac633767d95da618fe0076bfcec8a3dccf0f1abb65c2d0d777057cb787dd17c2a87a366de15b99707a9646bda86db30bb160da453996b5b03f18e901987245ffc069b970c26c74ec8ff4b475dcaee0ad884c16d3e5ac7f0052b6baa1be54005b52046abdd2a3ea2bb45b98131c2d506284d59ed887eaee755621bcdcffc986f16513d4035f414d845ef3d97eeaae7bd3f267776f69f3e2071d64b7e61e011355098a8306a5a4a04f1c53468c100faa6c0a1fc96d8d0c59368903d69016158f0a3bb8a465ee56e3c35b0944bdd12f56135d49b366e23f5b01808e2b46bd516d7dd48b357651d9a4b8c927801a87c1dec795765adecfa6b298a7248e8273e282ee7538aec45bd156709da0cf5a23279db7d852b25ee5054ea513dce7fd318d0e4a780d1230782598a6086fa274a2646e2367dc365358d235ac3dba27e763bc0c7132fb9a77f800d6003c00bcb4f50d63ff7028513c84067ed552fc5c197181b31fc86adfd4897db49f220a4dbcf67fa0f9fb81800557c8ca308749ebf96495adabddb65ec5085450abf58e22e415f34d3a9430e315b4cc6cac5bbe0d0fd9c4f4f10bb5e67542f1520a22eed2805b61e95747e2975553be587b1e097179712222b2b327932f1f187eb5e8f5e8c04634aa094fe8dee5c65d72308efdac8ff6e6fc7dededa8aa754d6202b8c47793a6397cc400cb79eff76f0d567ac075cdb8578ef9c0a59a23bda3d4a4fdd7540f0dc34b904078bfc17b664c39191357d0a00af234cd3ad02b531773146881f3984c7ade28ff467f15de52b464ca53e584019aa0da05410db0eca8b68ae538de15e90b34946123f603caa4fd54a76864c79228061063a88f2a992a1e7cd5c8bb2be2155d822fe326459659552ca49fc2d59a0d42497331ef6260f13844c6ce07946718a15e0bb8fb975bbd0590c3df90bb565af20da44ea1a68228b8fba11034eabeba727c3e2288cc21c2f1a4c0dd9091d55cbc3b5cb2a069f83dea0cd6b71c8ea6c184a68752001b190e8ed5d7a5d1e789cd250f1d24ec3e2713e1d123677b973d71b9efe4655c129e585580676faa9695ba8e854e84d21e9397bf2aa9c04d85dc63c399188912282f16d95da8d3686a249ccd8649e4dead175f29a8425dd12800f61d507d81a1b36bae19f4a294c7b1eab9f8b2b435bdd0ee830b7e8b4a6e6c45e06236505f1fdc569e415daf73bb51f86bfaaacc10e852d521159bf476c288ef2fe0df6315067530e8d03259bdc5edb8f060d68f41139e6a2f005d9b471364390831a925aa854734969d76ffeeb56b507389d35aa62ff39832be4190809385c9ba5a6336f68a25ac00fd0af8fe2aa66b71d93ae71ef6124ad66114af0e9a86117556b8bddcb7f731c36d7156c2b08123546d625de51709706ab98364f989e7dad708b93f003aa00a93c03d903176555c3263c5a4cbda9f03f162776e39f006f77f12d668e5d925ddec13dd331b39bea7ff1577c1acb93240aecbc2539093af9ecea61d6f28caa50b898fb7a5efedc70efc740b3d252c1601ceb1d1b91a286eea667ef97d2d24b440fcda853e001727c4d4d922dbeb82dc7f2b433e350482c81443fc3b238cd164b8225a2fae4b476292e264ad1a33405a8ca4fc39b34d5512689619601c0f57f2f11f93cab180cb15ffdae236ea325a72f0ea2183afdd039e778508ebf751a9fa98968665a9f54826add0cbbd0bc6202350cb7dd3d3b4290cbbc9f4081d0d638d6c9f0206b371e3349453bec9eaac3e18e86a08343f5e561899c4b2781a587d72c775fa7c63f4b5e042cde5ac08e1a7bcc8c38f624ec41c340fceaea2e72c98fc61f5962255ffcbc562b4bb6e88084fd163c7f8ea9450a9e0802ca59cc9c1c8d240cf84a36725781d7cc3dec3415b66f2b9ec5bb31f21862b39c8eb58709a38ca6e564e184163b0bd2878eccc7d504bb74cff2683458b85f48a876ef2abee13b2f25989eb129d6ea765e2ca4620023ae9c3e2ca9c8c7f744759b033e12fbbe7ac08a5989fcd7afe3fcc6049cd95dadf4575fc9d1e151fed11f561103396090eb1103148d1f66a2efb0a7130d5fce0a37f1bae317bdc6b7e37568daf2ed2113b510b20fdd69099a1e2fc1c9f834a31accdbc6cfd9e4dc7d61d3dc5fce4746ff473af86e00722f4c9a78b23980c1e4a4c15a586b68bfdf6797e9b9c301ca2920653bcc5ce8760786a88a6e80995c0de3fe2d2c2094531ef85dc3bb86d784b40008195d1384fac45d2cd34ed8e0382e0cb383df952e89df10c52f5857d1ec47bfb7185792aebe59576e25d9c8d90234b3a3bbcd1cebd52316aa73d3b4e54b2567628a360dd5a9f7e4a2df39fff2f9f65205461be1bdc7ba64c0d760b00396eeaa74572529a708b7a468344cdbc70075bd1e87bba7751b9f5e9e8a64a59c6faba8e1f424f81dc1e2c47b1e5ce83ec1e19e68ddc54707dd67933433f07ad5461ce445ba176dddfc723ce111aba3bc962136bc8f50859b024e5ab0979167cbc92a2239ded4f37ae1f18dcd5f820fce716cfe2e45ed1098fe42593402c940f8f5dc844e5ab2beb6081451d274e67593be2c3b6561e3999a13b8a8426519af126a3246bab82d4c8bdb71424192ffa8257258a58e8ec9d0578ad035d6b92e666a95bff5392ad3876b5dc52d24f1fda3286ff6b38c43415dc78af01ca86b10b3f74bcbb479b3052f423bc1ef7cc5cf8a9d75d0228d9f09c4a72aa485fcb5a993cc8f067386123e6618301f3c4c9d054cf4295d5dd6032ce06b99112a57f4b30252c0b3f26403ec9d3b8b56ab312619217d6174672db1f69d3c668a421d13953c12fdb31ccd8e6653f821b44219826094dcd569bb7073e6b136a5e3b6b27c24d9b6a8549c0746e8ea8272b2225776ac2e3129672e799998a6d4cce0c29d136085392f12580f316a7a200fa13219eb25d690b6f00476094dca7c8ccff7d73b5fe962c4d1e14c2771c10293add6c8143f11d3c5850f128187f7216848d3261df2cdef7c719fd076fcca4276d77aae98f2af384f4a815f81864c473ac56d16eeb50f6d51806bff489029c3df11a89706fbaa10053fb9e1a5e3a97251242fa3285c971f5175d84bdab29ecf7b87c1693b9e99cbfa8bca0755a75ceff740e46b94e4e7394be904663da5cb9eb4f08f5031cd8c04978457be2110c8726e92011f14db0e7c92d8d6f153bfdc37245b2d1147138826094fc852d970242bb29685197a42743bcb8fde12a5ad9db9ee5a4bfb0f47ebea3c556323b2fe5e0621d140bcbc2c489decc25922ae81b668c7915be0fa0b9f572acd7b35d478724787a2e5760a55fb1cadab35ce9d672bc6eec9a11982ef0c7f93fb9e60acbd1cd340fe6e7e597bfaeb0de7bedde77502e922e60622a82dc13f5c6a9fe5cd8795c894d01b7d77d9fba514d398ec12404c445b9ca7e1fd5458bd998cf5dde2e22a4d7c77541db0a61e14524bfa721ee26f74e3a365b2a2d0721967f7046705ab0a199fa16e8a87a1f92f8bffc4e4eaed12bab51475d669480d47300f6557a78b6d569ec1a8ea70f5c4d7d05bfe1ac3405304344e1ec6ee9f68845cc55665fb2856f6dbba47e2caead0073c8cc5da813f98543afed3122ec7469d891955e13f860936db18a240be019abcae2eb977004039d96ccd0266d5dd99ba0253e01b193bce2ce309ae7f76261e9d1a378af9ac2860940bd9bc67e6af22d076691bb9b54e9dc1aaa57c1d3e5ca5a4c42ff2e549873f8f857345e51a87bd24523c6148769e59cfd9e58329933d56f041a479c14037b7a569d6e9f6a34e6ab29529599229ecbcc9145373e331d6c71d9f7ad92d4fb3e4cdfb534f784cd289d399516e7bfa1613c7bdb6c983b570bfee8b07d77b53dffd80f10a4ff78d36ea486a1d4f467b27245d80223b548b68b56ed79c0eade7d14f3c684768bfe61b15c", 0x1000}, {&(0x7f00000001c0)="d93fe6cb2b42853f1372385beca0a2501211899f7c28ead13837154b6da9306842b81ee2f8fa52f5a680715f082869d7f83870b24be275a68e40e3a163230f5ecea97d8b2986b6dec1741e45a3c82d94543cae562e278102af5830e5c17dcd29a5479c044133a80f336ba5adafe50547bb15743088c2bf6907b552a46d20a3753a5d3978d5150d63ff2015315a9e6bb5f0fda3d07116135c67d25329481bdccda4e39b28", 0xa4}, {&(0x7f0000000280)="f5cf44cae6b185ddaf7e70945a39b82b56cf6c23e565b092deb75da5c8735bc59c1a8e447cd97cb483f55e0fcff36bdc3e971a176b01c591aed9502f99882610c87c7d178dbff1bf2f95196b77b7fea280428b8e4264eebdd69e190122ecbb3cc651955f43f6816020c5c866de1a6579e169407a59f16b10e8c16cc22b38773ed27ab256", 0x84}], 0x4, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xfffffffffffffffd, 0x400000) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000080)) [ 1680.983321][T11178] IPVS: ftp: loaded support on port[0] = 21 15:09:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010a0000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:09:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040), &(0x7f0000000080)=0x8) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x2000, 0x0) ioctl$VIDIOC_QUERYCTRL(r2, 0xc0445624, &(0x7f0000000140)={0x0, 0x3, "da321fdf0f86407b645bb375079d3a4de374e8cffd6e500c3be63f61d70ea2e6", 0x4, 0x6fa4dd4, 0x224, 0x1, 0x20}) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) accept$alg(r1, 0x0, 0x0) 15:09:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000010200001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:48 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@loopback, 0x47, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x6) r4 = syz_open_dev$mouse(&(0x7f0000000500)='/dev/input/mouse#\x00', 0xa, 0x20101) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e21, 0x4446, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xbe4}, 0x1c) ioctl$void(r0, 0x5450) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)) [ 1681.315562][T11297] IPVS: ftp: loaded support on port[0] = 21 15:09:48 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) r1 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) 15:09:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f00000002c0)={'ipvs\x00'}, &(0x7f0000000300)=0x1e) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000200)=[@in6={0xa, 0x4e21, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}, @in6={0xa, 0x4e24, 0x5, @mcast1, 0xbe}, @in6={0xa, 0x4e22, 0x5, @mcast2, 0x7ff}, @in={0x2, 0x4e22, @rand_addr=0x2}, @in6={0xa, 0x4e22, 0xffffffffffffffff, @local, 0x7}, @in6={0xa, 0x4e22, 0x6, @dev={0xfe, 0x80, [], 0x2b}, 0xfffffffffffffff8}, @in6={0xa, 0x4e20, 0xfffffffffffffff8, @ipv4={[], [], @loopback}, 0xe68e}], 0xb8) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000040)={0x0, 0x5, 0x2, 0x7f, 0x7f, 0x1aa, 0x8, 0x6, {0x0, @in6={{0xa, 0x4e20, 0xc512, @loopback, 0x3f}}, 0xfffffffffffff58b, 0x9, 0x80000001, 0x39, 0x4e78}}, &(0x7f0000000100)=0xb0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x2, 0x2, 0x8, 0x18000, r2}, &(0x7f0000000180)=0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000001c0)=0x1) 15:09:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010b0000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:09:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000230001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:48 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x40, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000100)={0xffffffff, 0x6b, 0x0, 0x7, 0x3ff, 0x8}) socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) 15:09:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind(r0, &(0x7f0000000180)=@in6={0xa, 0x4e21, 0xaaef, @loopback}, 0x80) getpeername$netrom(r1, &(0x7f0000000040)={{}, [@remote, @netrom, @netrom, @default, @remote, @bcast, @netrom, @rose]}, &(0x7f00000000c0)=0x48) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x80) sendto$inet(r1, 0x0, 0xffffff88, 0x0, &(0x7f0000000140)={0x2, 0x0, @loopback}, 0xffffffd0) [ 1681.694101][T11516] IPVS: ftp: loaded support on port[0] = 21 15:09:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001100000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:49 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$getownex(r0, 0x10, &(0x7f0000000100)) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") modify_ldt$read(0x0, &(0x7f0000000080)=""/111, 0x6f) r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x3) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000f230001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:49 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x47c, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x15) 15:09:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:09:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001230000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1682.181883][T11676] IPVS: ftp: loaded support on port[0] = 21 15:09:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000003f0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:49 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x20800, 0x0) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x7) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:09:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000080)={0x0, 0x1000, &(0x7f0000000880)="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"}) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:09:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001480000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2, &(0x7f0000000000)="0b31aaaf6a") r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x3, 0xfffffffffffffffd, 0xfff, 0x5}, 0x8) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000380)=[0x3, 0xfffffffffffff001]) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) bind$bt_sco(r1, &(0x7f00000000c0)={0x1f, {0x1, 0x200, 0xff, 0x9, 0x200, 0x7ff}}, 0x8) preadv(r1, &(0x7f0000001880)=[{&(0x7f00000003c0)=""/107, 0x6b}, {&(0x7f0000000440)=""/138, 0x8a}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000500)=""/246, 0xf6}, {&(0x7f0000000600)=""/218, 0xda}, {&(0x7f0000000700)=""/249, 0xf9}], 0x6, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$inet_dccp_buf(r2, 0x21, 0x2, &(0x7f0000000280)=""/186, &(0x7f0000000340)=0xba) bind$inet(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e23, @rand_addr=0x2}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000240)={r3, 0x7, 0x40, 0x7}, 0x10) 15:09:49 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x4, 0x200) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000100)=0x800, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSBRK(r2, 0x5409, 0x80000001) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) [ 1682.561444][T11872] IPVS: ftp: loaded support on port[0] = 21 15:09:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000400001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\n', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:09:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000014c0000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:50 executing program 0: socketpair$unix(0x1, 0x800000001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:09:50 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x4000, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r3 = socket(0x40000000015, 0x5, 0x0) bind$inet(r3, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000480001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1682.965177][T11999] IPVS: ftp: loaded support on port[0] = 21 15:09:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x4080, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xc10, 0x42180) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000080)={[{0x7fff, 0x3, 0x7, 0x6, 0x9, 0x9, 0x3f, 0x3, 0x4, 0x1ff, 0x4, 0xff, 0x9}, {0x0, 0x6, 0xfd, 0x9, 0xffff, 0x200, 0x1fe, 0xd21, 0x7c, 0x7, 0x0, 0x8001}, {0xfda6, 0x5, 0x2, 0x7, 0x7fff, 0x2, 0x7f, 0x1f, 0x7, 0xff, 0x8, 0x300, 0x507}], 0x4f3}) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000100), 0x4) 15:09:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001680000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:50 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000300)=0x1) r3 = fcntl$dupfd(r2, 0x406, r2) r4 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x5bc06201, 0x2c81) recvfrom$unix(r0, &(0x7f0000000140)=""/148, 0x94, 0x1, &(0x7f0000000240)=@abs={0x1, 0x0, 0x4e21}, 0x6e) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000000100)={0x1, r4}) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) 15:09:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:09:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000004c0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7fff, 0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000b80)={0x0, 0xf8f}, &(0x7f0000000bc0)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000c00)={0x0, 0x80000001, 0x1, 0x4}, &(0x7f0000000c40)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000e40)={0x0, @in6={{0xa, 0x4e24, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7f}}, [0x5, 0x4, 0x7fffffff, 0x857f, 0x7ff, 0x300000000, 0x81, 0x3, 0xfffffffffffffffd, 0x6, 0x9, 0x4, 0x1, 0x80, 0x4]}, &(0x7f0000000f40)=0x100) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000001640)=@assoc_value={0x0}, &(0x7f0000001680)=0x8) sendmmsg$inet_sctp(r1, &(0x7f0000001740)=[{&(0x7f0000000040)=@in6={0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x25}, 0x6}, 0x1c, &(0x7f0000000880)=[{&(0x7f00000001c0)="49f7d73702ea8d79ce29ae726fbfda6a510564a2a73ee62fe7155b51c10988e990962ec1abb3b248142369ff55d829c46b3d8056b508f14a5a0b4d6a7541f646516257bc901a43361ce1ae784a970a35b369d6de9198119b1e7a14590768d60cfd0ac95a6ac698524607dc9badb543059066058651f01270166d8da3a1fb6556cc6bc0bfa10166e199b2b998e75518024d8899dd8a2d1341843433da3fec6ce27f1b341722610db1a1d4c78651a037ce2946", 0xb2}, {&(0x7f0000000280)="7f52210e4b29d5578aff161e11047face4b0eefcd4d8de8c5d8dd09f6a9418fa2702bdbfd2f6685f8c92a922a7488c9a6bfd5b5e201e08ea8e6c2e08e6d208654e3c5d922cb59e375ab4f63058757c7e2fb8389af4066e2b4e2141ff507b02aa83a7e1b05b58a2b998149204013d5765f77e7dc906841f41ef7f3e5e903c1d699196c24dac81660f2f6e497b43655c6209aecf39749d9873b7a1a88dcb7a067869f9570b4a2df11284b28080b17b8dcb8b755cddcee697856bca54ac747049ad8eea14dad909c7047ab880b81c827f99df9cf8fc8acc5addab9858bd3783725316844d88060bc10da159c7c33f92", 0xee}, {&(0x7f0000000380)="c410daf7d18fb2a323ed9ff91400f57a3617f8a1d5e520bd109692c884f63449fbab30a96e4f5d00b1bbd9b605fedfee245ce09c4fa63f04c2d33c24f7cc578bd1ce659fb3abdfb3575f20203d3407c4e7c4399139ea9b3587f7db9633bdfd99c019f109181266dd1b523716a867dd25fc55fd641a1eeb68c77a728f2d9817921a7b1c1a3b2145b1b9b693b0170ecc866facfe9e88bb3cabe295aed88ffb2b850edd9c21bdb6d684fbad940bf41c9a1d6346c79f1c9d84f969eaa065037cf106e3c880babc9cb0edef0486e45323cbb2ba5d71391fa7a00d545bebdb351cfd60d6ff3843d95e9f2e3e23bd387237878b29f70349f5429cd3f2ea", 0xfa}, {&(0x7f0000000480)="138d974da12e377f555818d70d31991d249a4295e28bee51d8f889b021f868547fc68dcd7c1ed43d829a63c2a1fd974ed5e646ba1118bd4d104ac2577e279976a70046d0bd0f993436fb58070f5cd50181f96bcd55039979f2984c96d67a55385f961475889800178b8ad203b13de1ee213d50bbce651bdf709c66f33a643b96554c8e14f92ad543a67c783867e406a827c01a4fd94e12839badd75bdb5edb3cb17ac9e2cdcc1da6724aa8daeb7b80e1f54a68e3a10952c0f4108b7a2b060987724b5356fd3bcd0e48eca63a683a1c67ad0099e89423d95c7635c57ff306c33bb91a49308463f65861961f4cb3eb27f89ead94", 0xf3}, {&(0x7f0000000580)="baa9e88e0e77ba672395d441355a636ba0e268f93d7c80b6351b6c7d87ee59eb5b2892d90b9857bead27e9af109e73b17185d643c2dd5d9568b2020db1a2a756279c41fd53e47bbd7f16e7b4833eb69be5182abbe21b15b5aa0ccabd859358c41a5b42d85520ca4eeed7327cbe7ca74cd4282c96bb3a35d08e552edacc2b6e2a6de638489b699579c1d7226b38fbeb78d36a3c714e22cdf0693a754370ebf4957a7b83ab3e4c748bdbd200b3", 0xac}, {&(0x7f0000000640)="7802bd634f04367bfc9b104375618d1b5e050742a8d2a0b581ae3ede8e0b81d5ab226426d22cddb241ae70659847a8536255ebf9b0b420acf868b47f3f1a1404ae5ffba227ee7b12a31dd2083f89f52e22ebb2940d79b4fa8c7a232424bc71bf456970806d89bc0bc55b3f30f1a47c2102883e676163281de5b9b20d72604f6e13a7f8d87fc8101e3c12d0f29c6a6d0fadd11926e4981dc838ca84b062e4b0dbeb30863c703b76a1b430b79e72de7a42009127b4fe", 0xb5}, {&(0x7f0000000700)="2aa8be99610b26c190436fb45ab06352646c13717412a107969dad20b547dc329e250e1bbca748494267ef809c0b3c662cc897be68254a14a8c5e4b4ffc9cc496667113abb132dfa8ec9b177dbb24da84a8d5dcc6b80e7ec4ef2f456afe5dbb1d034faa658ebea261c76919215ab83dd976fcf7c2e49d9e6f08a92018dc66642eed703bcf4ac40d328a5fc6772e91b05b3a08f75998ff4631731faa87983c9d9eedfce4cd22157c24bc95efc3de7652f7b6d706d8c085e7b11055e810be8b5c2154dce8a8347a2b8ee10d12b0d9ccb62394c66b3a65b", 0xd6}], 0x7, 0x0, 0x0, 0x20000000}, {&(0x7f0000000140)=@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10, &(0x7f0000000b40)=[{&(0x7f0000000800)="69324485095d959518144ae7f6dec44904f8d3cd41e6e3e2f921f17b2e830b45153b204f64111db9d549bff30821ff8b", 0x30}, {&(0x7f0000000900)="128652791c73f1e393a4729b51271bcd5e4f9f71dfa9ecd38086fae543af4c41a7dbe6f9c0f09f971ade81f47231cec04f6cf115e90b8acdfc7c9c9722bfda8be72834c1761e8b11ea1aab402662d5738359159302aed92d7e41fd9f6f913bb42a3452ba5bc70450af9357ac284d472cdfa1d64da428a7a5bf5ea6e186a142068344", 0x82}, {&(0x7f00000009c0)="9549adb0fec574fe2344ae5f3db5c8520c06cedd9de7deb94cfe780edd099d752c31aee99bf67085b366d22c9b050eda0a82df2e48c4cbeecca6cebb60a2d24312451c19115f33b4800a7531fa11bbb89a3f2afa2bd88314558eeeb5444ec70615869e07f3bc3a047af69d50ee446f22495b841999133cbe53879c6fbe77b915925512cf124434d07df22cef2233249243588a005cdc3d20018a007e393acff71b19284a213a2a9de1222bbbe9dc772175ef4d65f0082ab20b92d9e610fc35849d663a304ee108aa9434ed2cefbfd26f97d3d2ee1d", 0xd5}, {&(0x7f0000000ac0)="411f7dbccd9c7c83834ae469e46ec5362dfa60fe3fdd189e0fc6cd1cf8f9bfbd63095a5ada30a0fe1b045af367a9333f520dc3ed70925f5a2b452e8861cffa6fa57b3099855a2c59e421b252bb34", 0x4e}], 0x4, &(0x7f0000000c80)=[@sndrcv={0x30, 0x84, 0x1, {0x3ff, 0x2, 0x2, 0xfff, 0xff, 0x185, 0x5, 0x2, r3}}, @dstaddrv4={0x18, 0x84, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x14}}, @sndinfo={0x20, 0x84, 0x2, {0x4, 0x200, 0xff, 0x199, r4}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @dstaddrv4={0x18, 0x84, 0x7, @multicast2}], 0xb8, 0x41}, {&(0x7f0000000d40)=@in={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000000e00)=[{&(0x7f0000000d80)="4d6c5e6d1647737f68dc46617a677660b809f86a0f7dcc5b3e7b266f57ca6b64cab174836ea23ce4399e093ea7e0ab9eed6cf08c2358c74bef19ab88e800d68fffcbf319def5eb2131097de63d2f4933a1", 0x51}], 0x1, &(0x7f0000000f80)=[@sndinfo={0x20, 0x84, 0x2, {0x4fd, 0x2, 0x7, 0x2, r5}}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [], @remote}}, @init={0x18, 0x84, 0x0, {0xbbb0, 0x7, 0x59, 0x7}}], 0x58, 0x8080}, {&(0x7f0000001000)=@in6={0xa, 0x4e22, 0x1000, @mcast2, 0x2}, 0x1c, &(0x7f0000001580)=[{&(0x7f0000001040)="539dd80b836a8db7072b36973f98a2eca68e679396ae2a8b185b5b13f88c0cd1b3c99f7883660a69c48074b712c3184eb897a96027060be4aaf3a1a151b82b4c0104ef377cc2d5cd262a9ce024177b84611491d0e349e8e55abd4e392102e463842c95152516c962e4894b83d70cdaa473d454d5136057590d8dde79ae44219d97a7d6a4df774838c3ae157d09d2d572f8ceb6960d3a4de542eaff433b4d4b379418afd1658375299def21f9dd2e28b93c79a225928001d4bb07813586e6473c646d1b", 0xc3}, {&(0x7f0000001140)="fddfff089595adbdfdae59f581e244cb8e2cabadc85d07defe36fee46c7afc64730ebb06523d60c418fdd8efc82c9cab1a7ea69d8a8778", 0x37}, {&(0x7f0000001180)="5f4486d9a40eb5c592e1fa3ea826c385106044", 0x13}, {&(0x7f00000011c0)="746887d71442fd41b7cbd32bbdfd48861bcd59d8cc9e7a6408f5ce01098ea466a402967a8b42146c056a9c24f516776e7a8a4c8739021bb82f8b050bfd5946fa8e310ca2500c38ef82df4e1389153f8585cd1ef8c68de001ae8350f11d22397edd1551fe35d46cd8e369a33fc76db3084b798b170bc4b6de8d553e8c041bbddf00f6522088488fa9c624cd9cb79f80b3b7f2956b", 0x94}, {&(0x7f0000001280)="a6d8b81046346a41ed385e", 0xb}, {&(0x7f00000012c0)="d4e019f8c9cfbe7f3f8f7bfb3058097197cfc2aef4a363d1625744a17f9b98f0b619648174b7ba8774dd353fe5fb772e1e9313e948718da2dcdc253eb8257366156ae6042c45991c136c52ef4d33f098a7e8c11adc2c0882910a90c8e24073b591ab2cda721271c3796d4be9cc0b5dbd83ed6b36912fbe29e3304d63ccde48e19966fb69971a89a3d11840065ab4dac2eb2241d88df1ba0f46b07cd8212e47a6d7ee977b8329de1680c4d3b2965c433990a5dbdb296eb6a620c36a119e29790cbf19ed", 0xc3}, {&(0x7f00000013c0)="ef69a18843e7a195c6b6489885279b004ca0ef74beecf66d2cb85c7de12a8f5a2ec381dd92ad2720ee01ad600b2d28395f6c9ae8699811b0e4a56737ef095de5a55c5a810a4f1de8c2899be0", 0x4c}, {&(0x7f0000001440)="9e2393939fe7d409be368220dcf05f469b7a07b0daa07c642db115f989eed77a426d5095ae2b1a82cffbba6a6cdf4a7d61205e075f514edca8476d434392a041a6e8beae946d26aa55b4261e8e30fe7e4a48b014c90770c7ead609634ea8db346894540745fc789479d3bac5", 0x6c}, {&(0x7f00000014c0)="34769b382648a45c1fd33185415d7ef94187e3b53f7c33bfadf73e623aa0d15438d27794b45566416a0229864ffeb11c8be36d096715393c3a6e708537d15ca6ae542bb3eea6de376a76f617872322e3a163557e0e072c457e1b2108cbb49ef0c4c0f663175dee49397da62fd414ac6d309b57880a7c6cc4b9c971fb3a9ce3eb7c3bc374ac206d37b60a77718569e572594e03c795d85f1fa11c1e97f574c42461ac", 0xa2}], 0x9, &(0x7f00000016c0)=[@sndrcv={0x30, 0x84, 0x1, {0x400, 0xc4e4, 0x0, 0x9, 0x0, 0x2400000, 0x80000001, 0x40, r6}}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [], @multicast1}}], 0x50, 0x1}], 0x4, 0x8000) ioctl$VIDIOC_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000000080)={0x0, @reserved}) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1683.365390][T12222] IPVS: ftp: loaded support on port[0] = 21 15:09:50 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x4000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000280)={@rand_addr=0x7, @rand_addr=0x4, r2}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RXATTRWALK(r1, &(0x7f00000002c0)={0xf, 0x1f, 0x2, 0x8}, 0xf) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)) 15:09:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000080)=0x1) 15:09:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:09:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1683.612202][T12337] IPVS: ftp: loaded support on port[0] = 21 15:09:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000016c0000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:51 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_pts(0xffffffffffffffff, 0x40) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000240)=""/210) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x10040, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x17) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x1) r4 = semget$private(0x0, 0x3, 0x402) semctl$GETPID(r4, 0x3, 0xb, &(0x7f0000000180)=""/5) getsockopt$inet_udp_int(r2, 0x11, 0x1, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)) 15:09:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b0701878144c865c81933946f02862aa3fdba4f621916b81f39d8fe64bfcbaad814054099e441d4882deb8ba317cd8242ffda6e777b2fe0548972bf472a207eed66d7e0fe43c0aab16b3578f7e838cbafd2a0726964f0d86fa59de0d2b0d8c2be17ed03c149335107781247e1d6b9030960eb1d84dde2f0320fc0301a015770c5932e1e43716310c602f17368b733c47bf49b8a450d8c000b567d2662f7b9b5f25ae4c55050588e2ce8cd926781a29f9a0cc962274573c02b7bd87635ab1d0784d038293f63ae077ce94937c68b51aa27d001ff00daa43b599876b07fc091ba9fa92") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000680001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:09:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001740000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:51 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x42, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @pic={0x1000, 0xfffffffffffffffb, 0x7fffffff, 0x3, 0x9, 0x800, 0x0, 0x4, 0x80000001, 0x7fffffff, 0x1, 0x7f, 0x2, 0x0, 0x924, 0x3}}) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000200)={'eql\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f00000001c0)={&(0x7f0000ffc000/0x2000)=nil, 0x7, 0x3, 0x8, &(0x7f0000ffb000/0x4000)=nil, 0x1}) 15:09:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:51 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x6) [ 1684.160611][T12557] IPVS: ftp: loaded support on port[0] = 21 15:09:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) getegid() sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000006c0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:09:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000017a0000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0xffffffffffffffff, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1684.620981][T12788] IPVS: ftp: loaded support on port[0] = 21 15:09:51 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x4000, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000100)={0x5, 0x0, 0x254ec932, 0x9, 0x8, 0x7, 0x7, 0x9, 0x0, 0x3, 0x7}, 0xb) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x1) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000140)) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) 15:09:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:09:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000740001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000300000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:52 executing program 3: r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000880)=""/4096, &(0x7f0000000100)=0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r3, 0x80247009, &(0x7f0000000080)) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) [ 1684.894166][T12905] IPVS: ftp: loaded support on port[0] = 21 15:09:52 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x4000, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x4, 0x101000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:09:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000500000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:fonts_t:s0\x00', 0x1d, 0x2) r1 = socket(0x0, 0x8, 0x373c) bind$inet(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffc, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x340) recvfrom(r0, &(0x7f0000000100)=""/174, 0xae, 0x40000001, &(0x7f00000001c0)=@generic={0x0, "ccec8c62009d86f5dddbea9293de94cb0c95c1634fd9e7c522e7685408b33b5d16ba031897fae49caaa7f84ddef05826f7e904c74384f3d91aca551e6746d1a27fcde43cf3cf2a58d6764af67f95f5af45e570d3c6997c918c2296e7bca925188d896d804ca31d4ddc1720522aa2b629e1de9564ec944c298a108bcdabed"}, 0x80) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff}) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, &(0x7f0000000280)=0x2) 15:09:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000007a0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:52 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x19) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) ioctl(r0, 0x4, &(0x7f00000000c0)="8acfefc30e7047767956c592256c0808892eb285d66484c32abc01a7019760bdf9391edec49094c56971bf29aed51dd3076fd2f4ce43f9487797c715ebece92f67075a6f40d85f8bccdbcf51bcaaa8a0a678c24129e96ecc01c211000e9872cdedb8afe3d75fdd6ca0c604abbf2a6bd669f839196ef2f33076e3c2a6b52ed8bbd1bf006eace187786ccca65615ac02a01473d61f9b67241d7314414a5f0029baf010bb7d026e4ebf849d381fbe") [ 1685.467190][ T25] audit: type=1400 audit(1554649792.742:117): avc: denied { relabelto } for pid=13032 comm="syz-executor.3" name="UDP-Lite" dev="sockfs" ino=254657 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fonts_t:s0 tclass=rawip_socket permissive=1 15:09:52 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8104002}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x124, r2, 0x226, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffffff9}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2c}]}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_1\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7fff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x40}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x13}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x26e}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x27}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x33}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xa4fd}]}, 0x124}, 0x1, 0x0, 0x0, 0x8041}, 0x4010) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1804000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x30, r2, 0x900, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x195}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)) 15:09:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:09:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x3e0, 0x0, 0x120, 0x220, 0x220, 0x0, 0x348, 0x348, 0x348, 0x348, 0x348, 0x4, &(0x7f0000000040), {[{{@ip={@broadcast, @dev={0xac, 0x14, 0x14, 0x28}, 0xffffff00, 0xff000000, 'caif0\x00', 'ip6gretap0\x00', {}, {}, 0x67, 0x2, 0x6}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xc, 0x1, 0x9}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev={[], 0x12}, 0x5, 0x4, [0xf, 0x2a, 0x1a, 0x1e, 0x18, 0x4, 0x3e, 0xa, 0x1c, 0x39, 0x36, 0x3d, 0x1c, 0xb, 0x3c, 0x6], 0x2, 0x5, 0x9}}}, {{@ip={@broadcast, @dev={0xac, 0x14, 0x14, 0x27}, 0xffffffff, 0x6bb8e68ef2a4f07e, 'hwsim0\x00', 'syzkaller0\x00', {}, {0xff}, 0x6f, 0x1, 0x18}, 0x0, 0xc0, 0x100, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xb, 0x0, 0x8, 0x1}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x9, 0x2, 0xffffffff, 0xfefe, 0x20, 0x7ff, 0xfffffffffffffffc]}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x100, [0x7ff, 0x400, 0x195c, 0xf3cd, 0x40d, 0x6], 0x1, 0x400}, {0x4, [0x0, 0x3f, 0x7ff, 0x253, 0x1, 0x2], 0x4, 0x2000}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x20000, 0x0) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000500)) r2 = socket(0x40000000015, 0x5, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f0000000540)={0x1, {0x77359400}, 0x3ae, 0x5}) bind$inet(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) 15:09:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000600000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001ffffff8c0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:54 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r0, 0x2, &(0x7f00000000c0)="72daf90a373464e0a0dcb69608314707ff44970515fb27447916c223b5fa68200fb3f8cdbdc6289b8b69ac554647ab62d4d530935c494fb681668381b4c8855fc342061960a2c00605b661d30004e470d4cff3cc05bac50a19772970a165d5453dffcb9206c8850cef4ea2") ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x40000, 0x0) connect$bt_l2cap(r2, &(0x7f0000000180)={0x1f, 0x8, {0x7, 0x6, 0x80000000, 0x7f, 0x3, 0x4}, 0x1, 0x10000}, 0xe) 15:09:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1687.530946][T13168] IPVS: ftp: loaded support on port[0] = 21 15:09:54 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000099f8c)={@random="cdbf0e000084", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x0, 0x0, @dev, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback, @dev}}}}}}}, 0x0) 15:09:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000700000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:54 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x4, 0x200) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000180), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) 15:09:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x1a}) 15:09:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:09:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000edc00001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:55 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x240, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000100)={0x3, 'lapb0\x00', 0x3}, 0x18) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xf) 15:09:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000900000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:55 executing program 3: clone(0x202, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='io\x00[\xfcW\x16\x9b\xab\xeeT\xed\x16\xe3\x9ez\x00\xe4\xb9\x00\x16\xf2f\xe3\xf60xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x97) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:09:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:55 executing program 3: clone(0x0, 0x0, 0x0, 0x0, 0x0) clock_nanosleep(0x0, 0x0, 0x0, &(0x7f00000000c0)) [ 1688.509152][T13516] IPVS: ftp: loaded support on port[0] = 21 15:09:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000b00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:55 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x1) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x400000, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r4, 0x0, 0xfffffffffffffefe, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) r5 = dup2(r4, r4) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x1}}, 0x0) r6 = dup2(r4, r4) sendto$inet(r6, &(0x7f0000000300)="df", 0x1, 0x1, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, 0x0, 0x0) close(r5) write$P9_RSTATFS(r3, &(0x7f0000000140)={0x43, 0x9, 0x1, {0x9, 0xb875, 0x6, 0xf7ad, 0xc7a, 0x80, 0x7, 0x32, 0x4}}, 0x43) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x70f, 0x0) 15:09:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001fffffff50001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x7f', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:09:56 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00'}) 15:09:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001230f00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1688.914413][T13642] IPVS: ftp: loaded support on port[0] = 21 15:09:56 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1000002, 0x40800000000031, 0xffffffffffffffff, 0x0) ioctl$TCGETS(r1, 0x5412, &(0x7f0000000240)) 15:09:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001fffffff60001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:56 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x30, 0x531, 0x2) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0xdd96e5f6bbe4e3e, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000680)={&(0x7f0000000400), 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x1ac, r3, 0xc08, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3c3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3a6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x19a}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x719}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xe8e}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x20}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10000}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8001}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x84, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4fe0}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xdb29939}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9ec}]}]}, @TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1c04}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_MTU={0x8}]}]}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x8080}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000180)=0x7f800000, 0x4) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0xfffffffffffffffd, 0x0) r5 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xf, 0x101040) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$FUSE_GETXATTR(r5, &(0x7f0000000380)={0x18, 0x0, 0x2, {0x8}}, 0x18) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x4, 0x41e}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={r7, 0x5, 0x7}, &(0x7f0000000340)=0x8) sendmsg$TIPC_NL_BEARER_GET(r5, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="6ac8af5c1de752b2bf6c153af564b5adb98abc5f8a76194a106cb9aec6032bfaf2644461d5825c2429e4a00978c9f67078807df24533b0b16fe1bc5741ecf40ea0f53e7a971abd6b3d9481ba59b08be1c827e07ea08112703058d77cf0df205e0c79208f561dd7e8294f411dbc300439ecea04c58418d2115423df59d4e2b808d7ec2c4aae7559530af4a2cfcee05bbf54371b9713d514aa1d5b0c46bd66fca3894ba8c0566d01cd444b5939f9ddae273246834acb194cbdf2a1023c333d6dc99bd02a380ee676360407cd7fa9d5dd64b07483d8bfa91acbd3181479944bd0b37954fea1e55cc9c26aa239fb88078b0a43911c1f", @ANYRES16=r6, @ANYBLOB="01032bbd7000fddbdf250400ffffff040004001400060004000200040002000800010008000000"], 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x4000080) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)) 15:09:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x2, 0x0, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:09:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001201000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:56 executing program 0: socketpair$unix(0x1, 0x800000002, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:09:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="0400120000000100000000000000000000000200"], 0x1}}, 0x0) 15:09:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001fffffdf90001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1689.403175][T13874] IPVS: ftp: loaded support on port[0] = 21 15:09:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x2, 0x0, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:09:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f0000bd7000)={&(0x7f0000c07e98)=ANY=[@ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000000000002000170001000000000000000000000000000000000000000000000000000000480001006d643500"/272], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x0) 15:09:56 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) socket$unix(0x1, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:09:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001001f00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:57 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x20800, 0x0) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x7) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:09:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001fffffffb0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1689.849086][T14001] IPVS: ftp: loaded support on port[0] = 21 15:09:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001002000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:57 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x20800, 0x0) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x7) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:09:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x2, 0x0, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:09:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:57 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x2000000000000000) 15:09:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001102000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:57 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x20800, 0x0) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x7) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) [ 1690.275921][T14031] IPVS: ftp: loaded support on port[0] = 21 15:09:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001fffffdfc0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:57 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x400000000080000, 0x0) write$capi20(r2, &(0x7f0000000140)={0x10, 0x10001, 0x8f, 0x83, 0x8, 0x1f}, 0x10) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x10) r3 = open(&(0x7f0000001580)='./file0\x00', 0x103002, 0x40) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000001600)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r3, &(0x7f00000016c0)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001680)={&(0x7f0000001640)={0x1c, r4, 0x310, 0x70bd27, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}}, 0x10) 15:09:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001002300000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:57 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x20800, 0x0) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) pipe(&(0x7f00000000c0)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:09:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001fffffdfd0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:09:58 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x204000, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000380)={0x8, 0x7, 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000240)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_targets\x00') ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000002c0)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r3, 0x4008642b, &(0x7f0000000300)={r4, 0x26}) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40, 0x0) ioctl$TUNSETLINK(r5, 0x400454cd, 0x101) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000100)={0x0, 0xffff}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000180)={r6, 0xaf9}, &(0x7f00000001c0)=0x8) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x4) 15:10:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:10:00 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x20800, 0x0) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010f2300000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000fff0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:00 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000240)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x860c2, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000100)={@remote, @loopback, 0x0}, &(0x7f0000000140)=0xc) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000180)=r3) 15:10:00 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x20800, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) [ 1692.957084][ T25] audit: type=1800 audit(1554649800.232:118): pid=14192 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17756 res=0 15:10:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001f9fdffff0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001003f00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:10:00 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:00 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x612880, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000100)=0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000180)=0x400004) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) 15:10:00 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x13) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x17) [ 1693.324050][T14313] IPVS: ftp: loaded support on port[0] = 21 15:10:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001fcfdffff0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:00 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:00 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001004000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:01 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:01 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) sched_getparam(r1, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) 15:10:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001fdfdffff0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:10:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001004800000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:03 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)) 15:10:03 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) 15:10:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000018cffffff0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:03 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)) 15:10:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:03 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)) 15:10:03 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x101000, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:10:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001004c00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001f4ffffff0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:03 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) 15:10:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:03 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) 15:10:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001006800000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:03 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000100)={0xc, 0x2, 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000240)={r3, 0x800}, &(0x7f0000000280)={'enc=', 'oaep', ' hash=', {'nhpoly1305-neon\x00'}}, &(0x7f0000000300)="f6445c10a05aa72bf0678bdfbb18c642829639f00c300c50e993432a777e1de9f3408fbcb8e86c68d83b91c45cc66327d8aac5d234837f646aa3c0a63339a410fc88b431d31dc960436dbfbe4bb63e576e97c7e5fa301ce945f0e1a1b84cb07733", &(0x7f0000000380)="0e8d29a0af8ff015a8af7136537d723ee3d3cd3036382554b35bdcf9ead23282fe07e35bd4b5f496b4c068fda921e63d2230208d978c4d85b4d50ac246868477b4934563b4ecc4444a69b51bfdff224aa5b014b663c1dc793d21a6c062d6a14f3de65e2bc5d07caf3409b058b2da84939f798b9f0659e3c1719a97227286b59b0b7d02ab93e9862f7ce01f245986681a944ef37d1bc4ab431b19e51182d483a50427779f3e528f4af12efbe260908399be") r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f0000000140)=0x1, 0x4) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)) 15:10:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:10:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001f5ffffff0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:04 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) 15:10:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xb, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 15:10:04 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) 15:10:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001006c00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:04 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f00000001c0)=""/135) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) writev(r3, &(0x7f0000000000)=[{&(0x7f00000000c0)='\a', 0x1}], 0x1) socket$alg(0x26, 0x5, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x3) socket$unix(0x1, 0x801, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x4, 0x9, 0x100, 0x0, 0x3}, &(0x7f0000000280)=0x14) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000002c0)={r5, 0x76}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001f6ffffff0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:04 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) 15:10:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) 15:10:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001007400000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x23, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001fbffffff0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) 15:10:05 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) 15:10:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001007a00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:05 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xc002, &(0x7f00000000c0)=0x9, 0x100, 0x2) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) [ 1697.896344][T15158] IPVS: ftp: loaded support on port[0] = 21 15:10:05 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x48, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000200000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001c0ed00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:05 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:05 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x800, 0x400000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x10001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000240)="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", &(0x7f0000001240)=""/253}, 0x18) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000100)=0x10001) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xfffffffffffffffe) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f0000000180)="98bd0f3c3dfdd3dc43fdce17127a552090d861e28408d515315ea1036211466643", &(0x7f0000001340)=""/254}, 0x18) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:05 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:07 executing program 0: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000300000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:07 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) 15:10:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010fff00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x68, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) 15:10:07 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) 15:10:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000400000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:07 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) 15:10:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001001001000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:07 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x101000, 0x0) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x2) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:07 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000240)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x860c2, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000100)={@remote, @loopback, 0x0}, &(0x7f0000000140)=0xc) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000180)=r3) 15:10:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:07 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) 15:10:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000500000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:07 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@loopback, 0x47, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x6) r4 = syz_open_dev$mouse(&(0x7f0000000500)='/dev/input/mouse#\x00', 0xa, 0x20101) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e21, 0x4446, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xbe4}, 0x1c) ioctl$void(r0, 0x5450) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)) 15:10:07 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) 15:10:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000004000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x74, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:08 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xa) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f00000000c0)) 15:10:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000600000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:08 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@loopback, 0x47, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x6) r4 = syz_open_dev$mouse(&(0x7f0000000500)='/dev/input/mouse#\x00', 0xa, 0x20101) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e21, 0x4446, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xbe4}, 0x1c) ioctl$void(r0, 0x5450) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)) 15:10:08 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) 15:10:08 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x8) 15:10:08 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@loopback, 0x47, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x6) r4 = syz_open_dev$mouse(&(0x7f0000000500)='/dev/input/mouse#\x00', 0xa, 0x20101) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e21, 0x4446, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xbe4}, 0x1c) ioctl$void(r0, 0x5450) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)) 15:10:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000010000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:08 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000700000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:08 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:08 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@loopback, 0x47, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x6) r4 = syz_open_dev$mouse(&(0x7f0000000500)='/dev/input/mouse#\x00', 0xa, 0x20101) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e21, 0x4446, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xbe4}, 0x1c) ioctl$void(r0, 0x5450) 15:10:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000110000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:08 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000800000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:08 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r2, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x1000, 0x9}, 0x0, 0x0, &(0x7f0000000180)={0x7f, 0x3f, 0x9, 0x37}, &(0x7f00000001c0)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x1) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)) epoll_wait(r0, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) 15:10:08 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@loopback, 0x47, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x6) r4 = syz_open_dev$mouse(&(0x7f0000000500)='/dev/input/mouse#\x00', 0xa, 0x20101) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e21, 0x4446, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xbe4}, 0x1c) ioctl$void(r0, 0x5450) 15:10:08 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000040000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:09 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:09 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@loopback, 0x47, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x6) r4 = syz_open_dev$mouse(&(0x7f0000000500)='/dev/input/mouse#\x00', 0xa, 0x20101) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e21, 0x4446, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xbe4}, 0x1c) 15:10:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000900000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:09 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:09 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:09 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@loopback, 0x47, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x6) r4 = syz_open_dev$mouse(&(0x7f0000000500)='/dev/input/mouse#\x00', 0xa, 0x20101) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e21, 0x4446, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xbe4}, 0x1c) 15:10:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001fffffe000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:09 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:09 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@loopback, 0x47, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x6) syz_open_dev$mouse(&(0x7f0000000500)='/dev/input/mouse#\x00', 0xa, 0x20101) 15:10:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000a00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:09 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netlink(r0, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x8000, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x210000, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) 15:10:09 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:09 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@loopback, 0x47, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x6) syz_open_dev$mouse(&(0x7f0000000500)='/dev/input/mouse#\x00', 0xa, 0x20101) 15:10:09 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x1, 0x40101) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000240)={0x0, {{0x2, 0x4e24, @multicast1}}, 0x0, 0x6, [{{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x16}}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4e23, @multicast2}}]}, 0x390) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) 15:10:09 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000010001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:09 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@loopback, 0x47, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x6) 15:10:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000b00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:09 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:09 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x8c000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0xf6c, 0x0, 0x4, 0x8, 0x5}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendto(r1, &(0x7f0000000140)="96a19a404da8c69842ed333e5fd0f2cd02cd54d38308b3f0edf17d077deba210cd2f1d0b6fc1a88782eb119f493f8121c75f87f9216fb462d0e5f90b4e6586a92235fcba2182252cf8411e5557c703d27262abd9419510cba0e5555c00918d49863b72875e42e64c5c54c05c39d2609e729dbd07202f6594eefed10169b6daa620cc49350bc1c2669b8fd3e48ca8ade9c98765a544f48167ded67d3e0e5ed7d6d5e8f3231ecb23af9a4771dfa0abdf", 0xaf, 0x4004081, &(0x7f0000000240)=@l2={0x1f, 0x400000000, {0x101, 0x0, 0x6, 0x0, 0x9, 0x6}, 0x7f, 0x6}, 0x80) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCEXCL(r1, 0x540c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) 15:10:09 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@loopback, 0x47, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x6) 15:10:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000020001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:10 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@loopback, 0x47, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x6) 15:10:10 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:10 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x507083683c6e89b1) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x4100, 0x0) dup2(r0, r1) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x10000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x84) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)) 15:10:10 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@loopback, 0x47, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x6) 15:10:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001001000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:10 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:10 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@loopback, 0x47, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x6) 15:10:10 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000030001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:10 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:10 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@loopback, 0x47, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x6) 15:10:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001002300000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:10 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:10 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0xfffffffffffffe01, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:10 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@loopback, 0x47, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x6) 15:10:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000040001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:10 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:11 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) pread64(r0, &(0x7f00000000c0)=""/12, 0xc, 0x0) socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) 15:10:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001004800000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:11 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@loopback, 0x47, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x6) 15:10:11 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)) 15:10:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa00, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:11 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) 15:10:11 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)) 15:10:11 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@loopback, 0x47, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x6) 15:10:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000050001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:11 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)) 15:10:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001004c00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xb00, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:11 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000240)={@loopback, 0x47, r1}) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x6) 15:10:11 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x101100, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000060001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:11 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r1, 0x5423, 0x0) 15:10:11 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000240)={@loopback, 0x47, r1}) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x6) 15:10:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf23, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001006800000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:11 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x1) r3 = openat(r1, &(0x7f00000000c0)='./file0\x00', 0x100, 0x2) bind$pptp(r3, &(0x7f0000000100)={0x18, 0x2, {0x4, @multicast2}}, 0x1e) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000140)={r0, r3}) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) 15:10:11 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r1, 0x5423, 0x0) 15:10:12 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000240)={@loopback, 0x47, r1}) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x6) 15:10:12 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) ioctl$TIOCSETD(r1, 0x5423, 0x0) 15:10:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000070001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1020, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:12 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180), &(0x7f00000001c0)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x6) 15:10:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x8bf2}, 0x4) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x2000200) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/mnt\x00') clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 15:10:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001006c00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:12 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x100, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f00000001c0)={0x698, 0x80000001, 0x502, 0xf6, &(0x7f0000000240)=""/246, 0x82, &(0x7f0000000340)=""/130, 0x68, &(0x7f0000000400)=""/104}) r3 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r3, 0xc0845658, &(0x7f0000000100)={0x0, @bt={0xa3e, 0x1f, 0x1, 0x1, 0x8, 0x7, 0x6, 0x1, 0xfffffffffffffff5, 0xcc, 0xbe, 0x3, 0x9, 0x6, 0x8, 0xb}}) 15:10:12 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x6) 15:10:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1f00, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1705.087097][T16020] IPVS: ftp: loaded support on port[0] = 21 15:10:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000080001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:12 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x6) 15:10:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001007400000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:12 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)=0x20080000) 15:10:12 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) 15:10:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000090001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x8bf2}, 0x4) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x2000200) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/mnt\x00') clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 15:10:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001007a00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:12 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) 15:10:12 executing program 0: socketpair$unix(0x1, 0x800000001, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xfff, 0x100) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x20000400202) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x3, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) [ 1705.660076][T16158] IPVS: ftp: loaded support on port[0] = 21 15:10:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000a0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2010, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:13 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) 15:10:13 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x84001, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f0000000140)={0x0, 0x8, 0x0, [], &(0x7f0000000100)=0x55}) socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) 15:10:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffab) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x8bf2}, 0x4) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x2000200) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/mnt\x00') clone(0x70024100, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 15:10:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000003000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:13 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x6) [ 1706.130243][T16288] IPVS: ftp: loaded support on port[0] = 21 15:10:13 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept4(r0, 0x0, &(0x7f0000000300), 0x80000) setsockopt$inet_mreqsrc(r2, 0x0, 0x26, &(0x7f0000000340)={@dev={0xac, 0x14, 0x14, 0x2b}, @empty, @dev={0xac, 0x14, 0x14, 0x1f}}, 0xc) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x1) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0x9, "c79fc8496067fb143f1cd5046565547b189caa22444498e41f3d5c4ea704a243", 0x2, 0x1}) r5 = fcntl$dupfd(r1, 0x406, r1) getsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f0000000080), &(0x7f0000000100)=0x4) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000002c0)={0x43, 0x1, 0x2}, 0x10) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)) 15:10:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000b0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000005000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:13 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x6) 15:10:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2300, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:13 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffffb7, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 15:10:13 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) open(&(0x7f00000000c0)='./file0\x00', 0x1, 0x10) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x207ffc, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x12d000, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x6000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x20000004) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:13 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x6) 15:10:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000006000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000100001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:14 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) 15:10:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x230f, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:14 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x1) r2 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000140)={0x0, 0xfffffffffffffff9}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000001c0)={r3, 0xf, "af3f6e4cd87ad6855c894566d435cb"}, &(0x7f0000000240)=0x17) 15:10:14 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) 15:10:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000007000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:14 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0xca5b, 0x1, 0x8008, 0x5e97d6be, 0x0, 0x6b0d, 0x8001, 0xb843, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000140)={r3, 0xfffffffffffffffa, 0x3, [0x6, 0x1, 0x92]}, &(0x7f0000000180)=0xe) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000240)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x28}}, {0x2, 0x4e22, @empty}, {0x2, 0x4e22, @multicast1}, 0x88, 0x0, 0x0, 0x0, 0x8, &(0x7f00000001c0)='bridge_slave_0\x00', 0x9, 0x15d9ead9, 0x80}) 15:10:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000001f0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:14 executing program 3: r0 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) unshare(0x400) flock(r0, 0x8) 15:10:14 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) 15:10:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:14 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) sched_getscheduler(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0xffffffffb43819a6, 0x4400) ioctl$SIOCX25SCUDMATCHLEN(r3, 0x89e7, &(0x7f0000000140)={0x72}) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000240), 0x4) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) ioctl$NBD_CLEAR_QUE(r3, 0xab05) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000280)={0x0, 0x2000}) fsetxattr$security_selinux(r3, &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:sudo_exec_t:s0\x00', 0x21, 0x2) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) 15:10:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000009000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000200001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x99f, 0x101000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fd) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:14 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) 15:10:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000280)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000000)) 15:10:15 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) 15:10:15 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = msgget$private(0x0, 0x400) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000001c0), &(0x7f0000000240)=0x0, &(0x7f0000000280)) r4 = geteuid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)=0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000003c0)=0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000400)={{0x8, r2, r3, r4, r5, 0x40, 0x6}, 0x4, 0x4, 0x0, 0x3, 0x9, 0x68, r6, r7}) r8 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) r9 = gettid() r10 = fcntl$getown(r0, 0x9) setpgid(r9, r10) ioctl$KDADDIO(r8, 0x4b34, 0x81) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r11 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r11, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r11, 0x5423, &(0x7f0000000040)) 15:10:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:15 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) 15:10:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000a000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:15 executing program 3: syz_emit_ethernet(0xfffffffffffffd24, &(0x7f0000000000)={@broadcast, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 15:10:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x1000080, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) r3 = socket(0x10, 0x4008000000803, 0x0) setsockopt$sock_int(r3, 0x1, 0x10, &(0x7f00000000c0)=0x81a, 0x4) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000180)=0xc) migrate_pages(r4, 0x100000001, &(0x7f00000001c0)=0x3, &(0x7f0000000200)=0xa000000000000000) recvmmsg(r3, &(0x7f0000000440), 0x13b, 0x0, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:15 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x6) 15:10:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000010200001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000fddfff)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x2) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4}) 15:10:15 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x6) 15:10:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4800, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:15 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x6) 15:10:15 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xdc54, 0x10200) ioctl$CAPI_INSTALLED(r1, 0x80024322) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40180, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) 15:10:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000b000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:15 executing program 0: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) r2 = syz_open_dev$sg(&(0x7f00000001c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$int_out(r2, 0xa000000001, &(0x7f0000fd3ffc)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000100)={0x2, 0x81, 0x8, 0x3710, 0x0, 0x800, 0x3ff, 0xffffffffffffffff, 0x3ff, 0x3, 0x9000000000}) r3 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0x200000) ioctl$KVM_PPC_GET_PVINFO(r3, 0x4080aea1, &(0x7f0000000180)=""/4096) 15:10:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000230001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:15 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x3d9, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) listen(r1, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe7c) r2 = accept4$inet6(r1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) close(r2) 15:10:15 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x6) 15:10:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c00, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:16 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x6) 15:10:16 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xfa93) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000180)=0x8) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x40, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0xc00, 0x0) 15:10:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a9061", 0x21) 15:10:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100230f000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:16 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x6) 15:10:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000f230001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6800, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:16 executing program 3: 15:10:16 executing program 0: socketpair$unix(0x1, 0x800000000, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) syncfs(r0) uselib(&(0x7f0000000140)='./file0\x00') r1 = add_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000001240)='id_resolver\x00', &(0x7f0000001280)='/dev/ptmx\x00') r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) ioctl$sock_netdev_private(r0, 0x89fb, &(0x7f0000001380)="59116ab899c4d4193fae930917ec01d38ea74ca69ab505b0276a3d05292e23c0a4fe67f2c228ea4b3fe1a0013118af91f3c22eb792c6b1e79c49b9ba62379ec8f248adb6f4bb38d8d226ec05b3a57d994ea5ac899d45446d51ea24421fa718e9c895d784aa3f03b7c176e0238fe9aa813de107c66e1b631ac6a4") r3 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000240)=""/4096, 0x1000}, &(0x7f00000000c0), 0x4}, 0x20) 15:10:16 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x6) 15:10:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001002010000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:16 executing program 3: 15:10:16 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x6) 15:10:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c00, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000003f0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:16 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xa) 15:10:16 executing program 3: 15:10:16 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x6) 15:10:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100001f000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:16 executing program 3: 15:10:16 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x6) 15:10:16 executing program 3: 15:10:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000400001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7400, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:17 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) 15:10:17 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') ioctl$TCGETA(r2, 0x5405, &(0x7f0000000240)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x4e20, 0x21, @mcast2, 0x8}, {0xa, 0x4e24, 0x3abc, @empty, 0x40}, 0x9, [0x0, 0x6, 0x7, 0x2, 0x100000001, 0x4, 0x577, 0x1b]}, 0x5c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f00000001c0)='dummy0\x00') ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x1) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000000c0)={r0, 0x0, 0x8bd, 0xba39, 0x6}) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)) 15:10:17 executing program 3: 15:10:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, &(0x7f0000005280)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r1, 0x0, 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000400)={0x0, 0xb6}, 0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={r4, 0x3}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x2020000000000, 0xa9a2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) listen(r3, 0x5eb857) r5 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r5, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r6 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg(r6, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 15:10:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000020000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:17 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) 15:10:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x3, 0x0, 0x0, 0x2000, 0xff], 0x1f004}) fstat(r1, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x6]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x6) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$PPPIOCCONNECT(r6, 0x4004743a, &(0x7f0000000140)=0x4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0xfffffffffffffffb, 0xd0, 0x8, 0x3f, 0x7, 0x3f}) ioctl$PPPIOCGFLAGS(r6, 0x8004745a, &(0x7f00000001c0)) 15:10:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000480001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1710.127866][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1710.133805][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1710.139670][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1710.145439][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:10:17 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) 15:10:17 executing program 3: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 15:10:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a00, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001001020000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:17 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) 15:10:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000004c0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:17 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) 15:10:17 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x480, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x60, 0xfa00, {0x3, &(0x7f00000002c0), 0x4002, 0x4}}, 0x20) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f0000000180)) r3 = getpgid(0x0) sched_setscheduler(r3, 0x2, &(0x7f0000000100)=0xb6) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000700)={{{@in6=@mcast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000b00)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000c40)={@loopback, @empty, 0x0}, &(0x7f0000000c80)=0xc) accept$packet(r2, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000d00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000d40)={{{@in6=@remote, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000000e40)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f0000001100)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000420}, 0xc, &(0x7f00000010c0)={&(0x7f0000000e80)={0x20c, r4, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r5}, {0xf0, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9a}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xaa85}}, {0x8, 0x7, 0xf096}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}}]}}, {{0x8, 0x1, r7}, {0xb4, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xc218}}}]}}]}, 0x20c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r11 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x7, 0x10000) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x2400, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) 15:10:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000023000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000680001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:18 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) 15:10:18 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x14) r2 = syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x7, 0x22000) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f00000004c0)=0x6, 0x8) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x400200, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x24480}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x230, r4, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x60, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffd}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3d}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0x94, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x1, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x200}}, {0x14, 0x2, @in={0x2, 0x4e23, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xa}}}, {0x14, 0x2, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x24}}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'tunl0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x265c}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}]}, @TIPC_NLA_LINK={0x94, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x132}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbe5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe126}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}, @TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80}]}]}, 0x230}, 0x1, 0x0, 0x0, 0x4}, 0x10) r5 = shmget(0x1, 0x3000, 0x68, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_LOCK(r5, 0xb) 15:10:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 15:10:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="070000000000000000a070000000f7c364"]}) 15:10:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000f23000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:18 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) r2 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x8, 0x0) write$P9_RLOCK(r2, &(0x7f0000000100)={0x8, 0x35, 0x1, 0x3}, 0x8) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0x1a) 15:10:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000006c0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000004c0)='NET_DM\x00') inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 15:10:18 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:18 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000280)={0xe00000000000000, "e5a2c65575e8155cc783445c487ea82055d801da01ec66fd69557b956c869d72", 0x3, 0x83, 0x1, 0x100000, 0x2}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x6) 15:10:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000740001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100003f000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:19 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) signalfd4(r1, &(0x7f00000000c0)={0x400}, 0x8, 0x80000) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a9061", 0x21) 15:10:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000040000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000007a0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000004c0)='NET_DM\x00') inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 15:10:19 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x1) r3 = dup(r0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f00000000c0)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) 15:10:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a9061", 0x21) 15:10:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a9061", 0x21) 15:10:19 executing program 0: socketpair$unix(0x1, 0x20000000003, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$KDDELIO(r2, 0x4b35, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000140)={0x400, 0x9}) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x1) dup2(r0, r1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)) 15:10:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001ffffff8c0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000048000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a9061", 0x21) 15:10:19 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x400000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a9061", 0x21) 15:10:19 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x6e51a3e7, 0x400000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@empty}}, &(0x7f00000001c0)=0xe8) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$nfc_llcp(r2, 0x118, 0x2, &(0x7f0000000140)=""/35, 0x23) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000400)={{{@in=@dev={0xac, 0x14, 0x14, 0x1b}, @in6=@mcast1, 0x4e22, 0x2, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x6c, r3, r4}, {0x7f, 0x5, 0x401, 0x5, 0x18000000000000, 0x3, 0x1ff, 0x7fff0}, {0x80000001, 0x0, 0x10001, 0xfff}, 0x40, 0x6e6bc0, 0x1, 0x0, 0x2}, {{@in=@multicast1, 0x4d6, 0xff}, 0x2, @in6=@empty, 0x0, 0x1, 0x1, 0x5, 0x27, 0x20000, 0x5d}}, 0xe8) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) [ 1712.721607][T17750] mkiss: ax0: crc mode is auto. 15:10:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100004c000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000edc00001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a9061", 0x21) 15:10:20 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:20 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x20a80, 0x0) connect$netlink(r1, &(0x7f0000000100)=@unspec, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) 15:10:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:20 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a9061", 0x21) 15:10:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000068000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1713.125228][T17775] mkiss: ax0: crc mode is auto. 15:10:20 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xa) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:20 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a9061", 0x21) 15:10:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001fffffff40001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:20 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:20 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a9061", 0x21) 15:10:20 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vfio/vfio\x00', 0x400, 0x0) recvfrom$rxrpc(r2, &(0x7f00000004c0)=""/20, 0x14, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={[], [], @local}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}}}, &(0x7f0000000840)=0xe8) syz_mount_image$f2fs(&(0x7f0000000500)='f2fs\x00', &(0x7f0000000540)='./file0\x00', 0x1, 0x2, &(0x7f0000000700)=[{&(0x7f0000000580)="43fdd5adedf826e6f8172e50d640a35de61d5ce6ed20eb682bd074648fc3eab1e06321f5db88513d63db9ac748d0985e2ac731c5be585ca00ba859be965b0f1e7a967b6008e69f6f8e28969bce223d15017899a01cc063d04d6644e415d5a153640ee317c361f08fa6b0f7", 0x6b, 0x7}, {&(0x7f0000000600)="76fcd9878cf64f94cd979d47a33037c344de1ae2f63326bf65fd95c6b1bfdb0d0704e88e13510af50b620468add597fb678fd6c6cf7bac1840a7c1a1414698a0e9ec286a03490081f365b608853d61c1a5ccf34a33ff70793dbcbf4cc155c194a00edb2b63414f9f5ac180bb7b39508f825d0cb2c56ae21353597353f179ca49eb8a2ad41ff338e0184b2244db1d7cf2d83782d2cea636b666dfcd3f020ec884d566713ebed231cf982df86864a3044390db225e5b0329bacdbae5502aca15a48d1610", 0xc3, 0x100000001}], 0x0, &(0x7f0000000880)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@extent_cache='extent_cache'}], [{@fowner_gt={'fowner>', r3}}, {@dont_appraise='dont_appraise'}, {@hash='hash'}]}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000100)='.\x00', 0x400, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000140)="b226f182d6c7841ed8f267426650b46aad8d387af373d17c6e271013ffc05bd95a0f2bdf01d60a27a444b1940ca13dd9e5f9e08d8cd3e4e3225e33f566152ff73f36ce524086f6a50b2c75598a977069effba123aabd4dc898fae94738d73c7eb78cb0", 0x63, 0x1}], 0x2000, &(0x7f0000000380)={[{@nolazytime='nolazytime'}, {@usrjquota={'usrjquota', 0x3d, '/dev/ptmx\x00'}}, {@inline_xattr='inline_xattr'}, {@inline_data='inline_data'}, {@whint_mode_off='whint_mode=off'}, {@resgid={'resgid', 0x3d, r5}}, {@noinline_xattr='noinline_xattr'}], [{@obj_role={'obj_role', 0x3d, ','}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@appraise_type='appraise_type=imasig'}, {@uid_lt={'uid<', r6}}, {@obj_user={'obj_user'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@audit='audit'}, {@seclabel='seclabel'}, {@measure='measure'}]}) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)) 15:10:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1713.520094][T17798] mkiss: ax0: crc mode is auto. 15:10:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001fffffff50001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:20 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a9061", 0x21) 15:10:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100006c000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1713.621427][T17802] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1713.684404][T17802] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock 15:10:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1713.748482][T17802] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1713.756348][T17802] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 1713.772894][T17815] mkiss: ax0: crc mode is auto. 15:10:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a9061", 0x21) 15:10:21 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001fffffff60001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a9061", 0x21) 15:10:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000074000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1714.032119][T17804] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1714.060759][T17804] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 1714.089755][T17804] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1714.102773][T17831] mkiss: ax0: crc mode is auto. [ 1714.141866][T17804] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 15:10:21 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f00000000c0)="d994820398f1c89e0a621ef43092379f069c69641ceeddaab9425ad0173a1602b4326cee2ee2b68eff19742875c888ca02b24bb57c9bb48ee3da054391f581ba7a1dc6c3cc2de5aba357767513e1c73c3dab166282f59bba6970ee07d9b3428a2959") 15:10:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a9061", 0x21) 15:10:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001fffffdf90001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:21 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a9061", 0x21) 15:10:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100007a000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1714.370838][T17853] mkiss: ax0: crc mode is auto. 15:10:21 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x5) 15:10:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f00000000c0)=""/243) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001fffffffb0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a9061", 0x21) 15:10:21 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x5) 15:10:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100c0ed000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a9061", 0x21) 15:10:21 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x5) 15:10:22 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000300)={0xffffffffffffffff}, 0x800) r3 = dup(r0) dup3(r1, r0, 0x80000) recvfrom$unix(r3, &(0x7f0000000100)=""/146, 0x92, 0x40012043, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x100000000000) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x1) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000000c0)=0x0) fcntl$lock(r4, 0x5, &(0x7f00000001c0)={0x2, 0x4, 0x6, 0x5, r5}) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)) 15:10:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a9061", 0x21) 15:10:22 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) 15:10:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001fffffdfc0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:22 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = dup2(r2, r0) ioctl$NBD_DISCONNECT(r3, 0xab08) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) [ 1715.010285][T17896] mkiss: ax0: crc mode is auto. 15:10:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a9061", 0x21) 15:10:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000fff000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:22 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) 15:10:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 1715.280515][T17912] mkiss: ax0: crc mode is auto. 15:10:22 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0xe3fd, 0x400000) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) 15:10:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000040001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001fffffdfd0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:22 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) 15:10:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 15:10:22 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x5, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 1715.551779][T17927] mkiss: ax0: crc mode is auto. 15:10:22 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) 15:10:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) [ 1715.771023][T17941] mkiss: ax0: crc mode is auto. 15:10:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000100001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:23 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x5, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000fff0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:23 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) 15:10:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) 15:10:23 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat(r2, &(0x7f0000000100)='./file0\x00', 0x20002, 0x20) 15:10:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) [ 1716.071501][T17958] mkiss: ax0: crc mode is auto. 15:10:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b0", 0x11) 15:10:23 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) 15:10:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001f9fdffff0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000400001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b0", 0x11) 15:10:23 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x4000, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x1, 0x70, 0x10001, 0x64, 0x0, 0x6, 0x0, 0x2, 0x0, 0x2, 0x0, 0x3, 0x3f, 0x8, 0x0, 0x3ff, 0x6, 0x7f, 0x8, 0xe26, 0x4, 0x800, 0x10001, 0x44e, 0x1, 0x43f4b5ef, 0x4, 0x3, 0x4, 0x5, 0x5, 0x7, 0x2, 0x3, 0x1000, 0x8000000000000000, 0x5, 0x6, 0x0, 0x100, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x2400, 0x30d, 0x6, 0x6, 0xa, 0xffff, 0x9}, r2, 0xc, r1, 0x4) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) r3 = add_key(&(0x7f0000000240)='logon\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)="8fbdab0aeff7302318aae6c6c67d57c681d429a3e666a09a8fd124", 0x1b, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000300)={r3, 0x2, 0x6b}, &(0x7f0000000340)={'enc=', 'raw', ' hash=', {'streebog512-generic\x00'}}, &(0x7f00000003c0)="41e2ae0b41829b0c1342209d18e71cbc9b1f965b61cb01942be9506f2033b0a2af26c5811ca09c82dd5e5d875328764a9ab15c256e8ab4728f8540d5432143cdac7cc622a86376819ee96e3145aed6344f9f2bdcc9654483391056e72e605488", &(0x7f0000000440)="5b38f9ff5454029226e33784d30b679fdaeece452e7aadf59106db14a1e2e32f6af9a3a1d4165f5abb7debcf11d952d737") ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x1a) 15:10:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1716.349560][T17978] mkiss: ax0: crc mode is auto. 15:10:23 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b0", 0x11) 15:10:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001fcfdffff0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:23 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f00000000c0)={0x29, 0x6, 0x0, {0x0, 0x2}}, 0x29) 15:10:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01", 0x19) 15:10:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000101000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xb000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1716.666426][T17999] mkiss: ax0: crc mode is auto. 15:10:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01", 0x19) 15:10:24 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:24 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) fallocate(r0, 0x40, 0xffffffff, 0x10001) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001fdfdffff0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01", 0x19) 15:10:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d", 0x1d) [ 1716.917922][T18020] mkiss: ax0: crc mode is auto. 15:10:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000201000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d", 0x1d) 15:10:24 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:24 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x62, 0x8000) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000100)={0x0, 0xbc, "71f9e8a0cfde22e37f36f4d47bc5fc4e0799e7578b27b64ca8cd250b8a5630e066e07a9efafad34ebc184eac7583e327127f58f19adfe17e71a1f38495f502d22ea7393ceda6557734306a0a419fe2388e73c5dd994e81ea04551f7911720fee86d9fe538c50c62622eebecfa9002c60159df5e1cfb624551b55fa7c29ab7a27093dd1df11f239ebf12add3b8b2f3cad3671f65e8935c9c1608a575c8c9fe94833334e2f7dcb811b5528976678648ccbea92dc966f21613747eaed07"}, &(0x7f0000000240)=0xc4) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000280)={r3, @in6={{0xa, 0x4e23, 0x2, @empty, 0x9}}, 0x7, 0x1}, &(0x7f0000000340)=0x90) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r2, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x2, 0x401}, 0x0, 0x0, &(0x7f0000000400)={0x200, 0x5, 0xfffffffffffff800, 0x6}, &(0x7f0000000440)=0xd0ef, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x20}}, 0x10) 15:10:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d", 0x1d) 15:10:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100feffff0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000301000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1f000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1717.285595][T18043] mkiss: ax0: crc mode is auto. 15:10:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a", 0x1f) 15:10:24 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:24 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) 15:10:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a", 0x1f) 15:10:24 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x220000) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000240)=0x11) utimensat(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {r2, r3/1000+10000}}, 0x100) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000002c0)={0x0, @multicast1, @empty}, &(0x7f0000000300)=0xc) bind$packet(r1, &(0x7f0000000340)={0x11, 0xf7, r4, 0x1, 0x0, 0x6, @dev={[], 0xd}}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x10041, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0x1) setsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000180), 0x4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)) 15:10:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a", 0x1f) [ 1717.580791][T18061] mkiss: ax0: crc mode is auto. 15:10:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:24 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) 15:10:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a90", 0x20) 15:10:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000018cffffff0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000401000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:25 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) 15:10:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a90", 0x20) [ 1717.846854][T18079] mkiss: ax0: crc mode is auto. 15:10:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20100000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:25 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) 15:10:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc1fbc01abc8464d4f8a90", 0x20) 15:10:25 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000002c0)={0xd5, 0x1, 0x8001, "b0b80acc48ac22a8e743406c2126f4b2f4b311b9e8f516293cf549448b07cac1d0f5ddd14ec3622f5ecaee12732815216524e1a8753b05d07c385b4ca53ea6a12830d4d881860ca94466b41ce7737b1bd6e2a0d1fdc95a4d7802abeb36f15dc1ea804b9b7b7afa805ae01015ae98742126610bd95b8ca34c9b7ffba36264ba9b8183c3a2807d85097c8900e38753277d5cfd440f57e8a2269a35fcfa5faa993a815df8f7fc5d52b8916e0b6d336ccc086d1bbee81966a809f14923c2b3ed6d5148e48b6b294f3a493d5a20d40f87c67f1be3a1b339"}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) r2 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r3, 0x800, 0x70bd2d, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x73}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x40000) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)) 15:10:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000501000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:25 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f00000000c0)={0x29, 0x6, 0x0, {0x0, 0x2}}, 0x29) 15:10:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001f4ffffff0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x23000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1718.090307][T18099] mkiss: ax0: crc mode is auto. 15:10:25 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = geteuid() fstat(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r1, &(0x7f0000000140)={0x90, 0xffffffffffffffda, 0x4, {0x8, 0x3, 0x5, 0xe88, 0x3, 0x6, {0x1, 0xfffe000000000000, 0xffffffff, 0xffffffffffff8001, 0x9, 0x8, 0x80000001, 0x2, 0xfffffffffffffff8, 0x7f, 0x9, r2, r3, 0x3f, 0x1fa}}}, 0x90) accept4$unix(r0, &(0x7f00000003c0)=@abs, &(0x7f0000000440)=0x6e, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x101000, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ashmem\x00', 0x4000, 0x0) r5 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') sendmsg$FOU_CMD_DEL(r4, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40105}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, r5, 0x721, 0x70bd2c, 0x25dfdbfd, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x20}}, 0x8000) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000280)=0x14) getegid() ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000040)) 15:10:25 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) 15:10:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x230f0000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:25 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f00000000c0)={0x29, 0x6, 0x0, {0x0, 0x2}}, 0x29) 15:10:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000601000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:25 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x400003, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) sendto$inet6(r1, &(0x7f00000000c0)="87631a78b9e4b19e62efb61120ff314cba9bd42a52b8dc65e0a8177fd260b913b27061488dfdb3c814f347e51a8d3f6ec293bc60ae36ded730d2d01493e1836405f7b567fce4a10a8d8e311fb2c4490f9306bf22302cea7e5b67890cbf3a1ec5a429094793a6de987c2334082176e35f77b7f33c984d6c964c07942970ab67b301cf519cffc555989aad4cf1e0", 0x8d, 0x40040, &(0x7f0000000180)={0xa, 0x4e24, 0x6, @ipv4={[], [], @local}, 0x9}, 0x1c) 15:10:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001f5ffffff0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1718.426681][T18175] mkiss: ax0: crc mode is auto. 15:10:25 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) 15:10:25 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) 15:10:25 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) r2 = dup(r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f00000000c0)={0x29, 0x6, 0x0, {0x0, 0x2}}, 0x29) 15:10:25 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) 15:10:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1718.652837][T18241] mkiss: ax0: crc mode is auto. 15:10:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001f6ffffff0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:26 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) 15:10:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000701000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:26 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) 15:10:26 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) dup(r1) 15:10:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001fbffffff0001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1718.971458][T18355] mkiss: ax0: crc mode is auto. 15:10:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:26 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) 15:10:26 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:26 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000801000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:26 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) 15:10:26 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) [ 1719.224611][T18470] mkiss: ax0: crc mode is auto. 15:10:26 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000200000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:26 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) 15:10:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x48000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:26 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5437, &(0x7f0000000040)) [ 1719.437503][T18487] mkiss: ax0: crc mode is auto. 15:10:26 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:26 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) 15:10:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000901000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:26 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5437, &(0x7f0000000040)) 15:10:27 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) 15:10:27 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5437, &(0x7f0000000040)) [ 1719.694097][T18500] mkiss: ax0: crc mode is auto. 15:10:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000300000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:27 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:27 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) 15:10:27 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5437, &(0x7f0000000040)) 15:10:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:27 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:27 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) 15:10:27 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5437, &(0x7f0000000040)) 15:10:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000a01000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:27 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000400000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:27 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) 15:10:27 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5437, &(0x7f0000000040)) 15:10:27 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x68000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1720.319317][T18545] mkiss: ax0: crc mode is auto. 15:10:27 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:27 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5437, &(0x7f0000000040)) 15:10:27 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) 15:10:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000500000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1720.469613][T18553] mkiss: ax0: crc mode is auto. 15:10:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000b01000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:27 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:27 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) 15:10:27 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5437, &(0x7f0000000040)) [ 1720.698075][T18572] mkiss: ax0: crc mode is auto. 15:10:28 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000001001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:28 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5437, &(0x7f0000000040)) 15:10:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000600000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:28 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) 15:10:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x74000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1720.910222][T18578] mkiss: ax0: crc mode is auto. 15:10:28 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) 15:10:28 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:28 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) 15:10:28 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) [ 1721.185193][T18595] mkiss: ax0: crc mode is auto. 15:10:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:28 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000700000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000001f01000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:28 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) [ 1721.399077][T18608] mkiss: ax0: crc mode is auto. 15:10:28 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) 15:10:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:28 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:28 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5437, &(0x7f0000000040)) 15:10:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000002001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000800000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:28 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) [ 1721.645693][T18624] mkiss: ax0: crc mode is auto. 15:10:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:29 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5437, &(0x7f0000000040)) 15:10:29 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000900000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:29 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) 15:10:29 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5437, &(0x7f0000000040)) 15:10:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000102001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1721.889726][T18643] mkiss: ax0: crc mode is auto. 15:10:29 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) 15:10:29 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) [ 1722.108298][T18654] mkiss: ax0: crc mode is auto. 15:10:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000a00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:29 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5437, &(0x7f0000000040)) 15:10:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf4ffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:29 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x5) 15:10:29 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) 15:10:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000002301000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:29 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x5) 15:10:29 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5437, &(0x7f0000000040)) 15:10:29 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) 15:10:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000b00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:29 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x5) 15:10:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf5ffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:30 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5437, &(0x7f0000000040)) 15:10:30 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) 15:10:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000f2301000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:30 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, 0x0) 15:10:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001001000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:30 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) 15:10:30 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) 15:10:30 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, 0x0) 15:10:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:30 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) 15:10:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000003f01000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:30 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) 15:10:30 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, 0x0) 15:10:30 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) 15:10:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf9fdffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001002300000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:30 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:30 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) 15:10:30 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) 15:10:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000004001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:30 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:30 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) 15:10:30 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) 15:10:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001004800000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:31 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) 15:10:31 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 15:10:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:31 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) 15:10:31 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) 15:10:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000004801000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:31 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) 15:10:31 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) 15:10:31 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) 15:10:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001004c00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:31 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) 15:10:31 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) 15:10:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000004c01000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1724.299433][T18773] mkiss: ax0: crc mode is auto. 15:10:31 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) 15:10:31 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) 15:10:31 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) 15:10:31 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) 15:10:31 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) 15:10:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001006800000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1724.569992][T18796] mkiss: ax0: crc mode is auto. 15:10:31 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) 15:10:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000006801000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:31 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) 15:10:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:32 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) 15:10:32 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) 15:10:32 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) 15:10:32 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) [ 1724.891539][T18813] mkiss: ax0: crc mode is auto. 15:10:32 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) 15:10:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000006c01000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:32 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) 15:10:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001006c00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:32 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) [ 1725.103722][T18828] mkiss: ax0: crc mode is auto. 15:10:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:32 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) 15:10:32 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) 15:10:32 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000000040)) [ 1725.352427][T18843] mkiss: ax0: crc mode is auto. 15:10:32 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) 15:10:32 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5437, &(0x7f0000000040)) 15:10:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001007400000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:32 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) 15:10:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000007401000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:32 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) 15:10:32 executing program 3: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) 15:10:32 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5437, &(0x7f0000000040)) [ 1725.600699][T18861] mkiss: ax0: crc mode is auto. 15:10:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdf9, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:33 executing program 3 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) 15:10:33 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x5) 15:10:33 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5437, &(0x7f0000000040)) [ 1725.808480][T18869] FAULT_INJECTION: forcing a failure. [ 1725.808480][T18869] name failslab, interval 1, probability 0, space 0, times 0 [ 1725.835508][T18869] CPU: 1 PID: 18869 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #56 [ 1725.843625][T18869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1725.853787][T18869] Call Trace: [ 1725.857093][T18869] dump_stack+0x172/0x1f0 [ 1725.861465][T18869] should_fail.cold+0xa/0x15 [ 1725.866060][T18869] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1725.872327][T18869] ? ___might_sleep+0x163/0x280 [ 1725.877280][T18869] __should_failslab+0x121/0x190 [ 1725.882217][T18869] should_failslab+0x9/0x14 [ 1725.886999][T18869] kmem_cache_alloc_node_trace+0x270/0x720 [ 1725.893101][T18869] ? mutex_trylock+0x1e0/0x1e0 [ 1725.897900][T18869] __kmalloc_node+0x3d/0x70 [ 1725.902498][T18869] kvmalloc_node+0x68/0x100 [ 1725.907002][T18869] alloc_netdev_mqs+0x98/0xd30 [ 1725.911771][T18869] ? sl_free_netdev+0x70/0x70 [ 1725.916456][T18869] slip_open+0x38e/0x1138 [ 1725.920790][T18869] ? sl_uninit+0x20/0x20 [ 1725.925201][T18869] ? lock_downgrade+0x880/0x880 [ 1725.930149][T18869] ? sl_uninit+0x20/0x20 [ 1725.934481][T18869] tty_ldisc_open.isra.0+0x8b/0xe0 [ 1725.939595][T18869] tty_set_ldisc+0x2d7/0x690 [ 1725.944447][T18869] tty_ioctl+0x5dc/0x15c0 [ 1725.948885][T18869] ? tty_register_device+0x40/0x40 [ 1725.954085][T18869] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1725.960528][T18869] ? tomoyo_init_request_info+0x105/0x1d0 [ 1725.966452][T18869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1725.972886][T18869] ? tomoyo_path_number_perm+0x263/0x520 [ 1725.978620][T18869] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1725.984525][T18869] ? ___might_sleep+0x163/0x280 [ 1725.989472][T18869] ? tty_register_device+0x40/0x40 [ 1725.994584][T18869] do_vfs_ioctl+0xd6e/0x1390 [ 1725.999281][T18869] ? ioctl_preallocate+0x210/0x210 [ 1726.004567][T18869] ? selinux_file_mprotect+0x620/0x620 [ 1726.010130][T18869] ? __fget+0x381/0x550 [ 1726.014465][T18869] ? ksys_dup3+0x3e0/0x3e0 [ 1726.019105][T18869] ? tomoyo_file_ioctl+0x23/0x30 [ 1726.024131][T18869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1726.030458][T18869] ? security_file_ioctl+0x93/0xc0 [ 1726.035662][T18869] ksys_ioctl+0xab/0xd0 [ 1726.040036][T18869] __x64_sys_ioctl+0x73/0xb0 [ 1726.044625][T18869] do_syscall_64+0x103/0x610 [ 1726.049319][T18869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1726.055524][T18869] RIP: 0033:0x4582b9 [ 1726.059421][T18869] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1726.079893][T18869] RSP: 002b:00007fbeeb65ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1726.088418][T18869] RAX: ffffffffffffffda RBX: 00007fbeeb65ac90 RCX: 00000000004582b9 [ 1726.096734][T18869] RDX: 0000000020000000 RSI: 0000000000005423 RDI: 0000000000000005 15:10:33 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x5) 15:10:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001007a00000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1726.104707][T18869] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1726.112779][T18869] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbeeb65b6d4 [ 1726.120919][T18869] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 15:10:33 executing program 3 (fault-call:3 fault-nth:1): socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) [ 1726.265138][T18885] FAULT_INJECTION: forcing a failure. [ 1726.265138][T18885] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1726.278578][T18885] CPU: 1 PID: 18885 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #56 [ 1726.278589][T18885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1726.278594][T18885] Call Trace: [ 1726.278620][T18885] dump_stack+0x172/0x1f0 [ 1726.278641][T18885] should_fail.cold+0xa/0x15 [ 1726.278659][T18885] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1726.278674][T18885] ? __lock_acquire+0x548/0x3fb0 [ 1726.278695][T18885] should_fail_alloc_page+0x50/0x60 [ 1726.278709][T18885] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1726.278729][T18885] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1726.278747][T18885] ? find_held_lock+0x35/0x130 [ 1726.297271][T18885] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1726.297295][T18885] cache_grow_begin+0x9c/0x860 [ 1726.297310][T18885] ? __kmalloc_node+0x3d/0x70 [ 1726.297326][T18885] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1726.297345][T18885] kmem_cache_alloc_node_trace+0x658/0x720 [ 1726.297360][T18885] ? mutex_trylock+0x1e0/0x1e0 [ 1726.297381][T18885] __kmalloc_node+0x3d/0x70 [ 1726.297402][T18885] kvmalloc_node+0x68/0x100 [ 1726.384171][T18885] alloc_netdev_mqs+0x98/0xd30 [ 1726.388952][T18885] ? sl_free_netdev+0x70/0x70 [ 1726.393819][T18885] slip_open+0x38e/0x1138 [ 1726.398159][T18885] ? sl_uninit+0x20/0x20 [ 1726.402496][T18885] ? lock_downgrade+0x880/0x880 [ 1726.407361][T18885] ? sl_uninit+0x20/0x20 [ 1726.411798][T18885] tty_ldisc_open.isra.0+0x8b/0xe0 [ 1726.417117][T18885] tty_set_ldisc+0x2d7/0x690 [ 1726.422842][T18885] tty_ioctl+0x5dc/0x15c0 [ 1726.427356][T18885] ? tty_register_device+0x40/0x40 [ 1726.432563][T18885] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1726.439244][T18885] ? tomoyo_init_request_info+0x105/0x1d0 [ 1726.444965][T18885] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1726.451398][T18885] ? tomoyo_path_number_perm+0x263/0x520 [ 1726.457053][T18885] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1726.463256][T18885] ? ___might_sleep+0x163/0x280 [ 1726.468448][T18885] ? tty_register_device+0x40/0x40 [ 1726.473663][T18885] do_vfs_ioctl+0xd6e/0x1390 [ 1726.478351][T18885] ? ioctl_preallocate+0x210/0x210 [ 1726.483812][T18885] ? selinux_file_mprotect+0x620/0x620 [ 1726.489527][T18885] ? __fget+0x381/0x550 [ 1726.493804][T18885] ? ksys_dup3+0x3e0/0x3e0 [ 1726.498490][T18885] ? tomoyo_file_ioctl+0x23/0x30 [ 1726.503438][T18885] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1726.509682][T18885] ? security_file_ioctl+0x93/0xc0 [ 1726.514796][T18885] ksys_ioctl+0xab/0xd0 [ 1726.518957][T18885] __x64_sys_ioctl+0x73/0xb0 [ 1726.523576][T18885] do_syscall_64+0x103/0x610 [ 1726.528267][T18885] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1726.534167][T18885] RIP: 0033:0x4582b9 [ 1726.538068][T18885] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1726.557764][T18885] RSP: 002b:00007fbeeb65ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:10:33 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x5) [ 1726.566305][T18885] RAX: ffffffffffffffda RBX: 00007fbeeb65ac90 RCX: 00000000004582b9 [ 1726.574362][T18885] RDX: 0000000020000000 RSI: 0000000000005423 RDI: 0000000000000005 [ 1726.582379][T18885] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1726.590348][T18885] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbeeb65b6d4 [ 1726.598417][T18885] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 15:10:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000007a01000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:33 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5437, 0x0) 15:10:33 executing program 3 (fault-call:3 fault-nth:2): socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) 15:10:34 executing program 1: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) [ 1726.897236][T18896] FAULT_INJECTION: forcing a failure. [ 1726.897236][T18896] name failslab, interval 1, probability 0, space 0, times 0 [ 1726.915515][T18896] CPU: 0 PID: 18896 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #56 [ 1726.923739][T18896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1726.933972][T18896] Call Trace: [ 1726.937300][T18896] dump_stack+0x172/0x1f0 [ 1726.941645][T18896] should_fail.cold+0xa/0x15 [ 1726.946255][T18896] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1726.952959][T18896] __should_failslab+0x121/0x190 [ 1726.957915][T18896] should_failslab+0x9/0x14 [ 1726.962488][T18896] kmem_cache_alloc_trace+0x4b/0x760 [ 1726.967894][T18896] __hw_addr_create_ex+0x5e/0x310 [ 1726.972933][T18896] __hw_addr_add_ex+0x1ef/0x2b0 [ 1726.978050][T18896] dev_addr_init+0x118/0x200 [ 1726.982747][T18896] ? dev_mc_flush+0x40/0x40 [ 1726.987345][T18896] ? __kmalloc_node+0x4e/0x70 [ 1726.992037][T18896] alloc_netdev_mqs+0x142/0xd30 [ 1726.996983][T18896] ? sl_free_netdev+0x70/0x70 [ 1727.001669][T18896] slip_open+0x38e/0x1138 [ 1727.006120][T18896] ? sl_uninit+0x20/0x20 [ 1727.010371][T18896] ? lock_downgrade+0x880/0x880 [ 1727.015461][T18896] ? sl_uninit+0x20/0x20 [ 1727.020117][T18896] tty_ldisc_open.isra.0+0x8b/0xe0 [ 1727.025408][T18896] tty_set_ldisc+0x2d7/0x690 [ 1727.030018][T18896] tty_ioctl+0x5dc/0x15c0 [ 1727.034439][T18896] ? tty_register_device+0x40/0x40 [ 1727.039670][T18896] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1727.045999][T18896] ? tomoyo_init_request_info+0x105/0x1d0 [ 1727.051729][T18896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1727.058056][T18896] ? tomoyo_path_number_perm+0x263/0x520 [ 1727.063693][T18896] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1727.069601][T18896] ? ___might_sleep+0x163/0x280 [ 1727.074461][T18896] ? tty_register_device+0x40/0x40 [ 1727.079762][T18896] do_vfs_ioctl+0xd6e/0x1390 [ 1727.084369][T18896] ? ioctl_preallocate+0x210/0x210 [ 1727.089689][T18896] ? selinux_file_mprotect+0x620/0x620 [ 1727.095239][T18896] ? __fget+0x381/0x550 [ 1727.099430][T18896] ? ksys_dup3+0x3e0/0x3e0 [ 1727.104135][T18896] ? tomoyo_file_ioctl+0x23/0x30 [ 1727.109082][T18896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1727.115520][T18896] ? security_file_ioctl+0x93/0xc0 [ 1727.120643][T18896] ksys_ioctl+0xab/0xd0 [ 1727.124977][T18896] __x64_sys_ioctl+0x73/0xb0 [ 1727.129573][T18896] do_syscall_64+0x103/0x610 [ 1727.134258][T18896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1727.140152][T18896] RIP: 0033:0x4582b9 [ 1727.144073][T18896] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1727.163778][T18896] RSP: 002b:00007fbeeb65ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1727.172303][T18896] RAX: ffffffffffffffda RBX: 00007fbeeb65ac90 RCX: 00000000004582b9 [ 1727.180392][T18896] RDX: 0000000020000000 RSI: 0000000000005423 RDI: 0000000000000005 [ 1727.188452][T18896] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 15:10:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:34 executing program 0 (fault-call:4 fault-nth:0): socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5437, 0x0) 15:10:34 executing program 3 (fault-call:3 fault-nth:3): socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) [ 1727.196513][T18896] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbeeb65b6d4 [ 1727.204660][T18896] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 15:10:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000003000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1727.280456][T18894] mkiss: ax0: crc mode is auto. [ 1727.313127][T18900] FAULT_INJECTION: forcing a failure. [ 1727.313127][T18900] name failslab, interval 1, probability 0, space 0, times 0 [ 1727.335676][T18900] CPU: 1 PID: 18900 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #56 [ 1727.343878][T18900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1727.354033][T18900] Call Trace: [ 1727.357779][T18900] dump_stack+0x172/0x1f0 [ 1727.362134][T18900] should_fail.cold+0xa/0x15 [ 1727.366745][T18900] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1727.372569][T18900] ? ___might_sleep+0x163/0x280 [ 1727.377514][T18900] __should_failslab+0x121/0x190 [ 1727.382454][T18900] should_failslab+0x9/0x14 [ 1727.386975][T18900] kmem_cache_alloc_node+0x264/0x710 [ 1727.392523][T18900] ? lock_downgrade+0x880/0x880 [ 1727.397492][T18900] __alloc_skb+0xd5/0x5e0 [ 1727.401819][T18900] ? skb_trim+0x190/0x190 [ 1727.406145][T18900] ? kfree+0x173/0x230 [ 1727.410219][T18900] ? __devinet_sysctl_unregister.isra.0+0x6b/0xb0 [ 1727.416643][T18900] ? kfree+0x173/0x230 [ 1727.420722][T18900] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1727.426204][T18900] inet_netconf_notify_devconf+0xea/0x260 [ 1727.431935][T18900] __devinet_sysctl_unregister.isra.0+0x85/0xb0 [ 1727.438275][T18900] devinet_sysctl_unregister+0x92/0xf0 [ 1727.443912][T18900] inetdev_event+0x2e7/0x1240 [ 1727.448607][T18900] ? lock_downgrade+0x880/0x880 [ 1727.453548][T18900] ? kasan_check_read+0x11/0x20 [ 1727.458509][T18900] ? inetdev_init+0x470/0x470 [ 1727.463303][T18900] ? kasan_check_write+0x14/0x20 [ 1727.468509][T18900] ? up_read+0x131/0x180 [ 1727.473129][T18900] notifier_call_chain+0xc7/0x240 [ 1727.478237][T18900] ? inetdev_init+0x470/0x470 [ 1727.483358][T18900] ? notifier_call_chain+0xc7/0x240 [ 1727.488833][T18900] raw_notifier_call_chain+0x2e/0x40 [ 1727.494301][T18900] call_netdevice_notifiers_info+0x3f/0x90 [ 1727.500204][T18900] rollback_registered_many+0x9c0/0xfd0 [ 1727.505750][T18900] ? generic_xdp_install+0x3d0/0x3d0 [ 1727.511044][T18900] ? mutex_trylock+0x1e0/0x1e0 [ 1727.516000][T18900] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1727.521393][T18900] rollback_registered+0x109/0x1d0 [ 1727.526952][T18900] ? rollback_registered_many+0xfd0/0xfd0 [ 1727.532781][T18900] ? try_to_del_timer_sync+0xc1/0x110 [ 1727.538157][T18900] unregister_netdevice_queue+0x1ee/0x2c0 [ 1727.544158][T18900] unregister_netdev+0x1d/0x30 [ 1727.549194][T18900] slip_close+0x16d/0x1d0 [ 1727.553708][T18900] ? slip_close+0x1d0/0x1d0 [ 1727.558662][T18900] slip_hangup+0x16/0x20 [ 1727.562912][T18900] tty_ldisc_hangup+0x138/0x640 [ 1727.567761][T18900] __tty_hangup.part.0+0x2cc/0x6f0 [ 1727.572910][T18900] ? tty_read+0x2a0/0x2a0 [ 1727.577369][T18900] tty_ioctl+0xf64/0x15c0 [ 1727.581789][T18900] ? tty_register_device+0x40/0x40 [ 1727.587206][T18900] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1727.593538][T18900] ? tomoyo_init_request_info+0x105/0x1d0 [ 1727.599273][T18900] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1727.605511][T18900] ? tomoyo_path_number_perm+0x263/0x520 [ 1727.611248][T18900] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1727.617529][T18900] ? ___might_sleep+0x163/0x280 [ 1727.626215][T18900] ? tty_register_device+0x40/0x40 [ 1727.637418][T18900] do_vfs_ioctl+0xd6e/0x1390 [ 1727.642013][T18900] ? ioctl_preallocate+0x210/0x210 [ 1727.647122][T18900] ? selinux_file_mprotect+0x620/0x620 [ 1727.652579][T18900] ? __fget+0x381/0x550 [ 1727.656741][T18900] ? ksys_dup3+0x3e0/0x3e0 [ 1727.661376][T18900] ? tomoyo_file_ioctl+0x23/0x30 [ 1727.666487][T18900] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1727.672989][T18900] ? security_file_ioctl+0x93/0xc0 [ 1727.678453][T18900] ksys_ioctl+0xab/0xd0 [ 1727.682793][T18900] __x64_sys_ioctl+0x73/0xb0 [ 1727.687387][T18900] do_syscall_64+0x103/0x610 [ 1727.691980][T18900] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1727.698043][T18900] RIP: 0033:0x4582b9 [ 1727.702044][T18900] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1727.721905][T18900] RSP: 002b:00007fc66fa1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1727.730842][T18900] RAX: ffffffffffffffda RBX: 00007fc66fa1bc90 RCX: 00000000004582b9 [ 1727.738810][T18900] RDX: 0000000000000000 RSI: 0000000000005437 RDI: 0000000000000005 [ 1727.746890][T18900] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1727.754951][T18900] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc66fa1c6d4 15:10:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) [ 1727.762948][T18900] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 [ 1727.796153][T18903] FAULT_INJECTION: forcing a failure. [ 1727.796153][T18903] name failslab, interval 1, probability 0, space 0, times 0 [ 1727.840826][T18903] CPU: 1 PID: 18903 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #56 [ 1727.849018][T18903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1727.859340][T18903] Call Trace: [ 1727.862651][T18903] dump_stack+0x172/0x1f0 [ 1727.866994][T18903] should_fail.cold+0xa/0x15 [ 1727.871771][T18903] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1727.877616][T18903] ? ___might_sleep+0x163/0x280 [ 1727.882471][T18903] __should_failslab+0x121/0x190 [ 1727.887429][T18903] should_failslab+0x9/0x14 [ 1727.892032][T18903] kmem_cache_alloc_node_trace+0x270/0x720 [ 1727.897927][T18903] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1727.904175][T18903] ? dev_addr_init+0x17f/0x200 [ 1727.909198][T18903] __kmalloc_node+0x3d/0x70 [ 1727.913879][T18903] kvmalloc_node+0x68/0x100 [ 1727.918533][T18903] alloc_netdev_mqs+0x67f/0xd30 [ 1727.923493][T18903] ? sl_free_netdev+0x70/0x70 [ 1727.928190][T18903] slip_open+0x38e/0x1138 [ 1727.932534][T18903] ? sl_uninit+0x20/0x20 [ 1727.936870][T18903] ? lock_downgrade+0x880/0x880 [ 1727.941738][T18903] ? sl_uninit+0x20/0x20 [ 1727.946070][T18903] tty_ldisc_open.isra.0+0x8b/0xe0 [ 1727.951369][T18903] tty_set_ldisc+0x2d7/0x690 [ 1727.956385][T18903] tty_ioctl+0x5dc/0x15c0 [ 1727.961249][T18903] ? tty_register_device+0x40/0x40 [ 1727.966450][T18903] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1727.973387][T18903] ? tomoyo_init_request_info+0x105/0x1d0 [ 1727.979196][T18903] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1727.985872][T18903] ? tomoyo_path_number_perm+0x263/0x520 [ 1727.991597][T18903] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1727.997591][T18903] ? ___might_sleep+0x163/0x280 [ 1728.002651][T18903] ? tty_register_device+0x40/0x40 [ 1728.007915][T18903] do_vfs_ioctl+0xd6e/0x1390 [ 1728.012776][T18903] ? ioctl_preallocate+0x210/0x210 [ 1728.018361][T18903] ? selinux_file_mprotect+0x620/0x620 [ 1728.023918][T18903] ? __fget+0x381/0x550 [ 1728.028078][T18903] ? ksys_dup3+0x3e0/0x3e0 [ 1728.032511][T18903] ? tomoyo_file_ioctl+0x23/0x30 [ 1728.037540][T18903] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1728.044062][T18903] ? security_file_ioctl+0x93/0xc0 [ 1728.049365][T18903] ksys_ioctl+0xab/0xd0 [ 1728.053886][T18903] __x64_sys_ioctl+0x73/0xb0 [ 1728.058551][T18903] do_syscall_64+0x103/0x610 [ 1728.063252][T18903] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1728.069314][T18903] RIP: 0033:0x4582b9 [ 1728.073210][T18903] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1728.093203][T18903] RSP: 002b:00007fbeeb65ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1728.101785][T18903] RAX: ffffffffffffffda RBX: 00007fbeeb65ac90 RCX: 00000000004582b9 [ 1728.109957][T18903] RDX: 0000000020000000 RSI: 0000000000005423 RDI: 0000000000000005 [ 1728.118103][T18903] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1728.126453][T18903] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbeeb65b6d4 [ 1728.136090][T18903] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 15:10:35 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x5437, 0x0) 15:10:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100ffffff8c01000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:35 executing program 3 (fault-call:3 fault-nth:4): socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) [ 1728.252823][T18911] mkiss: ax0: crc mode is auto. [ 1728.301863][T18920] FAULT_INJECTION: forcing a failure. [ 1728.301863][T18920] name failslab, interval 1, probability 0, space 0, times 0 [ 1728.315318][T18920] CPU: 1 PID: 18920 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #56 [ 1728.323797][T18920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1728.334350][T18920] Call Trace: [ 1728.337745][T18920] dump_stack+0x172/0x1f0 [ 1728.342391][T18920] should_fail.cold+0xa/0x15 [ 1728.347101][T18920] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1728.353304][T18920] ? ___might_sleep+0x163/0x280 [ 1728.358253][T18920] __should_failslab+0x121/0x190 [ 1728.363476][T18920] should_failslab+0x9/0x14 [ 1728.368073][T18920] kmem_cache_alloc_trace+0x2d1/0x760 [ 1728.373535][T18920] ? init_timer_key+0x122/0x370 [ 1728.378487][T18920] slip_open+0x8ed/0x1138 [ 1728.382822][T18920] ? sl_uninit+0x20/0x20 [ 1728.387191][T18920] ? lock_downgrade+0x880/0x880 [ 1728.392152][T18920] ? sl_uninit+0x20/0x20 [ 1728.396504][T18920] tty_ldisc_open.isra.0+0x8b/0xe0 [ 1728.401622][T18920] tty_set_ldisc+0x2d7/0x690 [ 1728.406219][T18920] tty_ioctl+0x5dc/0x15c0 [ 1728.410640][T18920] ? tty_register_device+0x40/0x40 [ 1728.415848][T18920] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1728.422181][T18920] ? tomoyo_init_request_info+0x105/0x1d0 [ 1728.428002][T18920] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1728.434243][T18920] ? tomoyo_path_number_perm+0x263/0x520 [ 1728.439882][T18920] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1728.445722][T18920] ? ___might_sleep+0x163/0x280 [ 1728.451018][T18920] ? tty_register_device+0x40/0x40 [ 1728.456224][T18920] do_vfs_ioctl+0xd6e/0x1390 [ 1728.460862][T18920] ? ioctl_preallocate+0x210/0x210 [ 1728.465973][T18920] ? selinux_file_mprotect+0x620/0x620 [ 1728.471607][T18920] ? __fget+0x381/0x550 [ 1728.475772][T18920] ? ksys_dup3+0x3e0/0x3e0 [ 1728.480199][T18920] ? tomoyo_file_ioctl+0x23/0x30 [ 1728.485146][T18920] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1728.491475][T18920] ? security_file_ioctl+0x93/0xc0 [ 1728.496868][T18920] ksys_ioctl+0xab/0xd0 [ 1728.501035][T18920] __x64_sys_ioctl+0x73/0xb0 [ 1728.506411][T18920] do_syscall_64+0x103/0x610 [ 1728.511015][T18920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1728.518044][T18920] RIP: 0033:0x4582b9 [ 1728.522030][T18920] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1728.541830][T18920] RSP: 002b:00007fbeeb65ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1728.550418][T18920] RAX: ffffffffffffffda RBX: 00007fbeeb65ac90 RCX: 00000000004582b9 [ 1728.558391][T18920] RDX: 0000000020000000 RSI: 0000000000005423 RDI: 0000000000000005 [ 1728.566361][T18920] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1728.574330][T18920] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbeeb65b6d4 [ 1728.582402][T18920] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 15:10:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) 15:10:35 executing program 3 (fault-call:3 fault-nth:5): socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) 15:10:35 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x2, 0x0) 15:10:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1728.718259][T18922] FAULT_INJECTION: forcing a failure. [ 1728.718259][T18922] name failslab, interval 1, probability 0, space 0, times 0 [ 1728.757708][T18922] CPU: 0 PID: 18922 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #56 [ 1728.765772][T18922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1728.775929][T18922] Call Trace: [ 1728.779249][T18922] dump_stack+0x172/0x1f0 [ 1728.784076][T18922] should_fail.cold+0xa/0x15 [ 1728.788793][T18922] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1728.794714][T18922] ? ___might_sleep+0x163/0x280 [ 1728.800124][T18922] __should_failslab+0x121/0x190 [ 1728.805075][T18922] should_failslab+0x9/0x14 [ 1728.809597][T18922] kmem_cache_alloc_trace+0x2d1/0x760 [ 1728.815210][T18922] ? init_timer_key+0x122/0x370 [ 1728.820070][T18922] slip_open+0x933/0x1138 [ 1728.824411][T18922] ? sl_uninit+0x20/0x20 [ 1728.828743][T18922] ? lock_downgrade+0x880/0x880 [ 1728.833753][T18922] ? sl_uninit+0x20/0x20 [ 1728.838005][T18922] tty_ldisc_open.isra.0+0x8b/0xe0 [ 1728.843131][T18922] tty_set_ldisc+0x2d7/0x690 [ 1728.847884][T18922] tty_ioctl+0x5dc/0x15c0 [ 1728.852220][T18922] ? tty_register_device+0x40/0x40 [ 1728.857338][T18922] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1728.863696][T18922] ? tomoyo_init_request_info+0x105/0x1d0 [ 1728.869422][T18922] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1728.875664][T18922] ? tomoyo_path_number_perm+0x263/0x520 [ 1728.881302][T18922] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1728.887140][T18922] ? ___might_sleep+0x163/0x280 [ 1728.892281][T18922] ? tty_register_device+0x40/0x40 [ 1728.897423][T18922] do_vfs_ioctl+0xd6e/0x1390 [ 1728.902111][T18922] ? ioctl_preallocate+0x210/0x210 [ 1728.907412][T18922] ? selinux_file_mprotect+0x620/0x620 [ 1728.912880][T18922] ? __fget+0x381/0x550 [ 1728.917048][T18922] ? ksys_dup3+0x3e0/0x3e0 [ 1728.921652][T18922] ? tomoyo_file_ioctl+0x23/0x30 [ 1728.926864][T18922] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1728.933127][T18922] ? security_file_ioctl+0x93/0xc0 [ 1728.938337][T18922] ksys_ioctl+0xab/0xd0 [ 1728.942514][T18922] __x64_sys_ioctl+0x73/0xb0 [ 1728.947109][T18922] do_syscall_64+0x103/0x610 [ 1728.951727][T18922] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1728.957714][T18922] RIP: 0033:0x4582b9 [ 1728.961835][T18922] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1728.981554][T18922] RSP: 002b:00007fbeeb65ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1728.990160][T18922] RAX: ffffffffffffffda RBX: 00007fbeeb65ac90 RCX: 00000000004582b9 [ 1728.998151][T18922] RDX: 0000000020000000 RSI: 0000000000005423 RDI: 0000000000000005 [ 1729.006215][T18922] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 15:10:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000005000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) 15:10:36 executing program 3 (fault-call:3 fault-nth:6): socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) [ 1729.014476][T18922] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbeeb65b6d4 [ 1729.022837][T18922] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 15:10:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000edc001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) [ 1729.204754][T18938] FAULT_INJECTION: forcing a failure. [ 1729.204754][T18938] name failslab, interval 1, probability 0, space 0, times 0 [ 1729.227729][T18938] CPU: 0 PID: 18938 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #56 [ 1729.235760][T18938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1729.245912][T18938] Call Trace: [ 1729.249227][T18938] dump_stack+0x172/0x1f0 [ 1729.253659][T18938] should_fail.cold+0xa/0x15 [ 1729.258264][T18938] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1729.264087][T18938] ? ___might_sleep+0x163/0x280 [ 1729.268971][T18938] __should_failslab+0x121/0x190 [ 1729.273925][T18938] should_failslab+0x9/0x14 [ 1729.278525][T18938] kmem_cache_alloc_trace+0x2d1/0x760 [ 1729.283940][T18938] ? init_timer_key+0x122/0x370 [ 1729.288977][T18938] slip_open+0x933/0x1138 [ 1729.293403][T18938] ? sl_uninit+0x20/0x20 [ 1729.297650][T18938] ? lock_downgrade+0x880/0x880 [ 1729.303136][T18938] ? sl_uninit+0x20/0x20 [ 1729.307580][T18938] tty_ldisc_open.isra.0+0x8b/0xe0 [ 1729.313061][T18938] tty_set_ldisc+0x2d7/0x690 [ 1729.317937][T18938] tty_ioctl+0x5dc/0x15c0 [ 1729.322276][T18938] ? tty_register_device+0x40/0x40 [ 1729.327483][T18938] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1729.334026][T18938] ? tomoyo_init_request_info+0x105/0x1d0 [ 1729.339770][T18938] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1729.346340][T18938] ? tomoyo_path_number_perm+0x263/0x520 [ 1729.352089][T18938] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1729.357927][T18938] ? ___might_sleep+0x163/0x280 [ 1729.362907][T18938] ? tty_register_device+0x40/0x40 [ 1729.368670][T18938] do_vfs_ioctl+0xd6e/0x1390 [ 1729.373276][T18938] ? ioctl_preallocate+0x210/0x210 [ 1729.378388][T18938] ? selinux_file_mprotect+0x620/0x620 [ 1729.383847][T18938] ? __fget+0x381/0x550 [ 1729.388382][T18938] ? ksys_dup3+0x3e0/0x3e0 [ 1729.392903][T18938] ? tomoyo_file_ioctl+0x23/0x30 [ 1729.397843][T18938] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1729.404087][T18938] ? security_file_ioctl+0x93/0xc0 [ 1729.409383][T18938] ksys_ioctl+0xab/0xd0 [ 1729.413836][T18938] __x64_sys_ioctl+0x73/0xb0 [ 1729.418429][T18938] do_syscall_64+0x103/0x610 [ 1729.423210][T18938] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1729.429187][T18938] RIP: 0033:0x4582b9 [ 1729.433347][T18938] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:10:36 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x4b47, 0x0) [ 1729.453328][T18938] RSP: 002b:00007fbeeb65ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1729.461970][T18938] RAX: ffffffffffffffda RBX: 00007fbeeb65ac90 RCX: 00000000004582b9 [ 1729.470038][T18938] RDX: 0000000020000000 RSI: 0000000000005423 RDI: 0000000000000005 [ 1729.478337][T18938] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1729.486398][T18938] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbeeb65b6d4 [ 1729.494377][T18938] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 15:10:36 executing program 3 (fault-call:3 fault-nth:7): socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) 15:10:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) [ 1729.634846][T18950] FAULT_INJECTION: forcing a failure. [ 1729.634846][T18950] name failslab, interval 1, probability 0, space 0, times 0 [ 1729.662497][T18950] CPU: 1 PID: 18950 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #56 [ 1729.670625][T18950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1729.680776][T18950] Call Trace: [ 1729.684167][T18950] dump_stack+0x172/0x1f0 [ 1729.688697][T18950] should_fail.cold+0xa/0x15 [ 1729.693492][T18950] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1729.699403][T18950] ? ___might_sleep+0x163/0x280 [ 1729.704261][T18950] __should_failslab+0x121/0x190 [ 1729.709214][T18950] should_failslab+0x9/0x14 [ 1729.713730][T18950] kmem_cache_alloc_trace+0x2d1/0x760 [ 1729.719120][T18950] ? init_timer_key+0x122/0x370 [ 1729.723979][T18950] slip_open+0x976/0x1138 [ 1729.728583][T18950] ? sl_uninit+0x20/0x20 [ 1729.732830][T18950] ? lock_downgrade+0x880/0x880 [ 1729.737814][T18950] ? sl_uninit+0x20/0x20 [ 1729.742064][T18950] tty_ldisc_open.isra.0+0x8b/0xe0 [ 1729.747184][T18950] tty_set_ldisc+0x2d7/0x690 [ 1729.751781][T18950] tty_ioctl+0x5dc/0x15c0 [ 1729.756117][T18950] ? tty_register_device+0x40/0x40 [ 1729.761228][T18950] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1729.767556][T18950] ? tomoyo_init_request_info+0x105/0x1d0 [ 1729.773282][T18950] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1729.779521][T18950] ? tomoyo_path_number_perm+0x263/0x520 [ 1729.785244][T18950] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1729.791554][T18950] ? ___might_sleep+0x163/0x280 [ 1729.796502][T18950] ? tty_register_device+0x40/0x40 [ 1729.801638][T18950] do_vfs_ioctl+0xd6e/0x1390 [ 1729.806236][T18950] ? ioctl_preallocate+0x210/0x210 [ 1729.811438][T18950] ? selinux_file_mprotect+0x620/0x620 [ 1729.817173][T18950] ? __fget+0x381/0x550 [ 1729.821354][T18950] ? ksys_dup3+0x3e0/0x3e0 [ 1729.825868][T18950] ? tomoyo_file_ioctl+0x23/0x30 [ 1729.830811][T18950] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1729.837055][T18950] ? security_file_ioctl+0x93/0xc0 [ 1729.842181][T18950] ksys_ioctl+0xab/0xd0 [ 1729.846720][T18950] __x64_sys_ioctl+0x73/0xb0 [ 1729.851400][T18950] do_syscall_64+0x103/0x610 [ 1729.856099][T18950] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1729.862014][T18950] RIP: 0033:0x4582b9 [ 1729.865912][T18950] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:10:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000006000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1729.885668][T18950] RSP: 002b:00007fbeeb65ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1729.894172][T18950] RAX: ffffffffffffffda RBX: 00007fbeeb65ac90 RCX: 00000000004582b9 [ 1729.902145][T18950] RDX: 0000000020000000 RSI: 0000000000005423 RDI: 0000000000000005 [ 1729.910986][T18950] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1729.919152][T18950] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbeeb65b6d4 [ 1729.927268][T18950] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 15:10:37 executing program 3 (fault-call:3 fault-nth:8): socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) 15:10:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2259748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) 15:10:37 executing program 0: socketpair$unix(0x1, 0x800000003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r1, 0x4b49, 0x0) [ 1730.020102][T18952] mkiss: ax0: crc mode is auto. 15:10:37 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) 15:10:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100fffffff401000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1c", 0xbe, 0x10000}], 0x0, 0x0) [ 1730.198629][T18960] mkiss: ax0: crc mode is auto. [ 1730.210220][T18963] FAULT_INJECTION: forcing a failure. [ 1730.210220][T18963] name failslab, interval 1, probability 0, space 0, times 0 [ 1730.240704][T18963] CPU: 0 PID: 18963 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #56 [ 1730.249015][T18963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1730.259193][T18963] Call Trace: [ 1730.262579][T18963] dump_stack+0x172/0x1f0 [ 1730.266909][T18963] should_fail.cold+0xa/0x15 [ 1730.271621][T18963] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1730.277559][T18963] ? ___might_sleep+0x163/0x280 [ 1730.282514][T18963] __should_failslab+0x121/0x190 [ 1730.287532][T18963] should_failslab+0x9/0x14 [ 1730.292039][T18963] __kmalloc+0x2dc/0x740 [ 1730.296414][T18963] ? kmem_cache_alloc_trace+0x354/0x760 [ 1730.301996][T18963] ? slip_open+0x976/0x1138 [ 1730.306523][T18963] ? rcu_read_lock_sched_held+0x110/0x130 [ 1730.312511][T18963] ? slhc_init+0x1cc/0x52a [ 1730.316924][T18963] slhc_init+0x1cc/0x52a [ 1730.321179][T18963] slip_open+0x99a/0x1138 [ 1730.325540][T18963] ? sl_uninit+0x20/0x20 [ 1730.329810][T18963] ? lock_downgrade+0x880/0x880 [ 1730.334678][T18963] ? sl_uninit+0x20/0x20 [ 1730.338933][T18963] tty_ldisc_open.isra.0+0x8b/0xe0 [ 1730.344080][T18963] tty_set_ldisc+0x2d7/0x690 [ 1730.348692][T18963] tty_ioctl+0x5dc/0x15c0 [ 1730.353204][T18963] ? tty_register_device+0x40/0x40 [ 1730.358324][T18963] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1730.364934][T18963] ? tomoyo_init_request_info+0x105/0x1d0 [ 1730.371044][T18963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1730.377472][T18963] ? tomoyo_path_number_perm+0x263/0x520 [ 1730.383156][T18963] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1730.389084][T18963] ? ___might_sleep+0x163/0x280 [ 1730.394026][T18963] ? tty_register_device+0x40/0x40 [ 1730.399229][T18963] do_vfs_ioctl+0xd6e/0x1390 [ 1730.403822][T18963] ? ioctl_preallocate+0x210/0x210 [ 1730.409018][T18963] ? selinux_file_mprotect+0x620/0x620 [ 1730.414595][T18963] ? __fget+0x381/0x550 [ 1730.418894][T18963] ? ksys_dup3+0x3e0/0x3e0 [ 1730.423328][T18963] ? tomoyo_file_ioctl+0x23/0x30 [ 1730.428294][T18963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1730.434539][T18963] ? security_file_ioctl+0x93/0xc0 [ 1730.439771][T18963] ksys_ioctl+0xab/0xd0 [ 1730.443961][T18963] __x64_sys_ioctl+0x73/0xb0 [ 1730.448705][T18963] do_syscall_64+0x103/0x610 [ 1730.453321][T18963] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1730.459702][T18963] RIP: 0033:0x4582b9 [ 1730.463693][T18963] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1730.483611][T18963] RSP: 002b:00007fbeeb65ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1730.492619][T18963] RAX: ffffffffffffffda RBX: 00007fbeeb65ac90 RCX: 00000000004582b9 [ 1730.500713][T18963] RDX: 0000000020000000 RSI: 0000000000005423 RDI: 0000000000000005 [ 1730.508685][T18963] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1730.516693][T18963] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbeeb65b6d4 [ 1730.525009][T18963] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 [ 1730.533520][T18963] BUG: unable to handle kernel paging request at fffffffffffffff4 [ 1730.541614][T18963] #PF error: [normal kernel read fault] [ 1730.547648][T18963] PGD 8874067 P4D 8874067 PUD 8876067 PMD 0 [ 1730.553724][T18963] Oops: 0000 [#1] PREEMPT SMP KASAN [ 1730.558918][T18963] CPU: 1 PID: 18963 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #56 [ 1730.566902][T18963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1730.577066][T18963] RIP: 0010:slhc_free+0x31/0xb0 [ 1730.582060][T18963] Code: 54 49 89 fc e8 10 32 1c fd 4d 85 e4 74 77 e8 06 32 1c fd 4c 89 e2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 75 6d <4d> 8b 2c 24 4d 85 ed 74 0d e8 e1 31 1c fd 4c 89 ef e8 e9 fe 53 fd [ 1730.602183][T18963] RSP: 0018:ffff88805b1df9f0 EFLAGS: 00010246 [ 1730.608418][T18963] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc90005b63000 [ 1730.616799][T18963] RDX: 1ffffffffffffffe RSI: ffffffff84545cfa RDI: fffffffffffffff4 [ 1730.625042][T18963] RBP: ffff88805b1dfa00 R08: ffff888057e66140 R09: ffff888057e66a30 [ 1730.633282][T18963] R10: 0000000000000000 R11: 0000000000000000 R12: fffffffffffffff4 [ 1730.641664][T18963] R13: ffff88805a6e56c0 R14: 00000000ffffff97 R15: ffff88808a2d6600 [ 1730.650381][T18963] FS: 00007fbeeb65b700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1730.659943][T18963] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1730.666789][T18963] CR2: fffffffffffffff4 CR3: 0000000098ce4000 CR4: 00000000001406e0 [ 1730.674880][T18963] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1730.682852][T18963] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1730.691104][T18963] Call Trace: [ 1730.694399][T18963] slip_open+0xe16/0x1138 [ 1730.698747][T18963] ? sl_uninit+0x20/0x20 [ 1730.703360][T18963] ? lock_downgrade+0x880/0x880 [ 1730.708305][T18963] ? sl_uninit+0x20/0x20 [ 1730.712635][T18963] tty_ldisc_open.isra.0+0x8b/0xe0 [ 1730.717747][T18963] tty_set_ldisc+0x2d7/0x690 [ 1730.722422][T18963] tty_ioctl+0x5dc/0x15c0 [ 1730.726752][T18963] ? tty_register_device+0x40/0x40 [ 1730.731862][T18963] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1730.738109][T18963] ? tomoyo_init_request_info+0x105/0x1d0 [ 1730.744295][T18963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1730.750532][T18963] ? tomoyo_path_number_perm+0x263/0x520 [ 1730.756426][T18963] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1730.762502][T18963] ? ___might_sleep+0x163/0x280 [ 1730.767452][T18963] ? tty_register_device+0x40/0x40 [ 1730.772566][T18963] do_vfs_ioctl+0xd6e/0x1390 [ 1730.777168][T18963] ? ioctl_preallocate+0x210/0x210 [ 1730.782374][T18963] ? selinux_file_mprotect+0x620/0x620 [ 1730.787828][T18963] ? __fget+0x381/0x550 [ 1730.791982][T18963] ? ksys_dup3+0x3e0/0x3e0 [ 1730.796399][T18963] ? tomoyo_file_ioctl+0x23/0x30 [ 1730.801334][T18963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1730.807859][T18963] ? security_file_ioctl+0x93/0xc0 [ 1730.812966][T18963] ksys_ioctl+0xab/0xd0 [ 1730.817210][T18963] __x64_sys_ioctl+0x73/0xb0 [ 1730.821801][T18963] do_syscall_64+0x103/0x610 [ 1730.826395][T18963] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1730.832282][T18963] RIP: 0033:0x4582b9 [ 1730.836174][T18963] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1730.855862][T18963] RSP: 002b:00007fbeeb65ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1730.864379][T18963] RAX: ffffffffffffffda RBX: 00007fbeeb65ac90 RCX: 00000000004582b9 [ 1730.872486][T18963] RDX: 0000000020000000 RSI: 0000000000005423 RDI: 0000000000000005 [ 1730.880536][T18963] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1730.888514][T18963] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbeeb65b6d4 [ 1730.896588][T18963] R13: 00000000004c2564 R14: 00000000004d52d0 R15: 0000000000000006 [ 1730.904841][T18963] Modules linked in: [ 1730.908729][T18963] CR2: fffffffffffffff4 [ 1730.912885][T18963] ---[ end trace c2ddd0dab6ef240f ]--- [ 1730.918351][T18963] RIP: 0010:slhc_free+0x31/0xb0 [ 1730.923208][T18963] Code: 54 49 89 fc e8 10 32 1c fd 4d 85 e4 74 77 e8 06 32 1c fd 4c 89 e2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 75 6d <4d> 8b 2c 24 4d 85 ed 74 0d e8 e1 31 1c fd 4c 89 ef e8 e9 fe 53 fd [ 1730.943225][T18963] RSP: 0018:ffff88805b1df9f0 EFLAGS: 00010246 [ 1730.950332][T18963] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc90005b63000 [ 1730.958305][T18963] RDX: 1ffffffffffffffe RSI: ffffffff84545cfa RDI: fffffffffffffff4 [ 1730.966601][T18963] RBP: ffff88805b1dfa00 R08: ffff888057e66140 R09: ffff888057e66a30 [ 1730.975746][T18963] R10: 0000000000000000 R11: 0000000000000000 R12: fffffffffffffff4 [ 1730.983814][T18963] R13: ffff88805a6e56c0 R14: 00000000ffffff97 R15: ffff88808a2d6600 [ 1730.991798][T18963] FS: 00007fbeeb65b700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1731.001325][T18963] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1731.008082][T18963] CR2: fffffffffffffff4 CR3: 0000000098ce4000 CR4: 00000000001406e0 [ 1731.016240][T18963] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1731.022445][ T3876] kobject: 'loop2' (00000000db9bfeb1): kobject_uevent_env [ 1731.024307][T18963] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1731.024315][T18963] Kernel panic - not syncing: Fatal exception [ 1731.026248][T18963] Kernel Offset: disabled [ 1731.053615][T18963] Rebooting in 86400 seconds..