0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x6800) [ 1222.491774][T27279] hfsplus: unable to change nls mapping [ 1222.513147][T27280] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1222.532505][T27279] hfsplus: unable to parse mount options 05:29:37 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:29:37 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x300000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:29:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1222.646205][T27280] BTRFS error (device loop1): open_ctree failed [ 1222.728808][T27301] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1222.830615][T27280] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1222.863176][T27280] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1222.936389][T27280] BTRFS error (device loop1): open_ctree failed [ 1222.972746][T27307] batman_adv: batadv0: Adding interface: veth1895 [ 1222.996415][T27307] batman_adv: batadv0: The MTU of interface veth1895 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1223.029707][T27313] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:29:37 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xa0008000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1223.085585][T27307] batman_adv: batadv0: Interface activated: veth1895 [ 1223.119488][T27313] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:29:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000006c0001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:29:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x6c00) [ 1223.256177][T27313] BTRFS error (device loop1): open_ctree failed 05:29:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff00000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1223.508521][T27338] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:29:38 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xa0010000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1223.549164][T27336] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1223.691378][T27336] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1223.754198][T27345] batman_adv: batadv0: Adding interface: veth1897 05:29:38 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1223.815488][T27345] batman_adv: batadv0: The MTU of interface veth1897 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1223.846379][T27345] batman_adv: batadv0: Interface activated: veth1897 [ 1223.853975][T27336] BTRFS error (device loop1): open_ctree failed 05:29:38 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x400000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1223.937574][T27349] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:29:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x7400) [ 1224.081290][T27365] hfsplus: unable to change nls mapping [ 1224.089814][T27336] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1224.107653][T27349] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1224.148458][T27365] hfsplus: unable to parse mount options [ 1224.162386][T27336] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1224.220766][T27376] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:29:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1224.269794][T27365] hfsplus: unable to change nls mapping [ 1224.286182][T27349] BTRFS error (device loop1): open_ctree failed [ 1224.308644][T27365] hfsplus: unable to parse mount options [ 1224.366082][T27336] BTRFS error (device loop1): open_ctree failed 05:29:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000740001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:29:38 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1224.422453][T27379] batman_adv: batadv0: Adding interface: veth1899 [ 1224.507224][T27379] batman_adv: batadv0: The MTU of interface veth1899 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1224.625615][T27384] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1224.670393][T27389] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1224.714455][T27384] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1224.739562][T27389] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1224.746319][T27379] batman_adv: batadv0: Interface activated: veth1899 05:29:39 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xf9fdffff, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:29:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x7a00) [ 1224.886164][T27384] BTRFS error (device loop1): open_ctree failed [ 1224.906492][T27389] BTRFS error (device loop1): open_ctree failed [ 1224.995795][T27384] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1225.107067][T27415] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:29:39 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x500000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:29:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffefffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1225.275825][T27389] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:29:39 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xff000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1225.345593][T27419] batman_adv: batadv0: Adding interface: veth1901 [ 1225.356602][T27419] batman_adv: batadv0: The MTU of interface veth1901 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1225.399976][T27389] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1225.464597][T27419] batman_adv: batadv0: Interface activated: veth1901 [ 1225.509899][T27415] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1225.576199][T27389] BTRFS error (device loop1): open_ctree failed 05:29:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000007a0001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:29:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x8100) [ 1225.690829][T27424] selinux_nlmsg_perm: 2863 callbacks suppressed [ 1225.690843][T27424] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27424 comm=syz-executor.0 [ 1225.715236][T27434] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1225.780748][T27424] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27424 comm=syz-executor.0 [ 1225.810256][T27424] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27424 comm=syz-executor.0 [ 1225.856290][T27424] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27424 comm=syz-executor.0 05:29:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdf9, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1225.947241][T27445] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1225.959676][T27424] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27424 comm=syz-executor.0 [ 1226.036570][T27424] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27424 comm=syz-executor.0 [ 1226.080967][T27448] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1226.082063][T27424] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27424 comm=syz-executor.0 [ 1226.176298][T27424] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27424 comm=syz-executor.0 [ 1226.204269][T27448] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1226.258406][T27453] batman_adv: batadv0: Adding interface: veth1903 [ 1226.265786][T27453] batman_adv: batadv0: The MTU of interface veth1903 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1226.272468][T27424] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27424 comm=syz-executor.0 05:29:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1226.346180][T27453] batman_adv: batadv0: Interface activated: veth1903 [ 1226.356137][T27448] BTRFS error (device loop1): open_ctree failed 05:29:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1226.444282][T27445] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1226.464649][T27424] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27424 comm=syz-executor.0 [ 1226.561857][T27448] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:29:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xf000) 05:29:41 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x600000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1226.771448][T27448] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1226.773715][T27481] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:29:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff8c, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:29:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffa0008000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1226.996155][T27448] BTRFS error (device loop1): open_ctree failed 05:29:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000480101004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1227.080977][T27488] batman_adv: batadv0: Adding interface: veth1905 [ 1227.119117][T27488] batman_adv: batadv0: The MTU of interface veth1905 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1227.146352][T27488] batman_adv: batadv0: Interface activated: veth1905 [ 1227.267078][T27502] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:29:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:29:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x1ad78) [ 1227.376260][T27507] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1227.390128][T27502] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1227.522482][T27507] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1227.586284][T27502] BTRFS error (device loop1): open_ctree failed [ 1227.620550][T27521] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:29:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x1a0ffffffff, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1227.646557][T27507] BTRFS error (device loop1): open_ctree failed [ 1227.737996][T27502] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1227.827530][T27523] batman_adv: batadv0: Adding interface: veth1907 [ 1227.845480][T27523] batman_adv: batadv0: The MTU of interface veth1907 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1227.897909][T27523] batman_adv: batadv0: Interface activated: veth1907 [ 1227.948367][T27502] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1227.971753][T27521] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:29:42 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x700000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:29:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000301004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:29:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:29:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x1ad79) [ 1228.176171][T27502] BTRFS error (device loop1): open_ctree failed [ 1228.210760][T27543] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:29:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffa0010000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1228.331678][T27543] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:29:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a0ffffffff, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1228.386749][T27558] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1228.486495][T27543] BTRFS error (device loop1): open_ctree failed [ 1228.570115][T27564] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:29:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x1ad7a) [ 1228.757058][T27579] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:29:43 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1228.835871][T27543] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1228.861579][T27564] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1228.921243][T27543] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1229.032234][T27581] batman_adv: batadv0: Adding interface: veth1911 [ 1229.066371][T27564] BTRFS error (device loop1): open_ctree failed [ 1229.087808][T27581] batman_adv: batadv0: The MTU of interface veth1911 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1229.126072][T27581] batman_adv: batadv0: Interface activated: veth1911 05:29:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:29:43 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0xa00000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1229.156064][T27543] BTRFS error (device loop1): open_ctree failed 05:29:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x8000a0) 05:29:43 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:29:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffff0700, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1229.480851][T27605] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1229.609339][T27612] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1229.669778][T27611] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1229.684609][T27612] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1229.715036][T27610] batman_adv: batadv0: Adding interface: veth1913 [ 1229.741644][T27610] batman_adv: batadv0: The MTU of interface veth1913 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1229.832034][T27611] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:29:44 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1229.905100][T27610] batman_adv: batadv0: Interface activated: veth1913 [ 1229.916268][T27612] BTRFS error (device loop1): open_ctree failed [ 1229.956131][T27611] BTRFS error (device loop1): open_ctree failed [ 1229.963684][T27605] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1230.060693][T27611] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:29:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffff7f, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:29:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xf0ffff) [ 1230.159851][T27611] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:29:44 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1230.336216][T27611] BTRFS error (device loop1): open_ctree failed [ 1230.402091][T27642] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:29:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000601004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1230.483261][T27641] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:29:45 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0xf00000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:29:45 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:29:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x1000000) [ 1230.854226][T27660] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1230.893114][T27659] selinux_nlmsg_perm: 2416 callbacks suppressed [ 1230.893130][T27659] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27659 comm=syz-executor.0 [ 1230.929457][T27671] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:29:45 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1230.973654][T27660] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1231.003917][T27659] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27659 comm=syz-executor.0 [ 1231.024570][T27659] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27659 comm=syz-executor.0 [ 1231.047349][T27659] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27659 comm=syz-executor.0 [ 1231.075321][T27659] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27659 comm=syz-executor.0 [ 1231.127961][T27659] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27659 comm=syz-executor.0 [ 1231.141578][T27660] BTRFS error (device loop1): open_ctree failed [ 1231.183673][T27676] batman_adv: batadv0: Adding interface: veth1917 [ 1231.192774][T27659] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27659 comm=syz-executor.0 [ 1231.214012][T27676] batman_adv: batadv0: The MTU of interface veth1917 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1231.251309][T27659] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27659 comm=syz-executor.0 [ 1231.279009][T27659] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27659 comm=syz-executor.0 [ 1231.316284][T27676] batman_adv: batadv0: Interface activated: veth1917 [ 1231.320381][T27659] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27659 comm=syz-executor.0 05:29:45 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x600000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1231.400457][T27671] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1231.419338][T27660] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:29:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x2000000) [ 1231.521607][T27660] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1231.616244][T27660] BTRFS error (device loop1): open_ctree failed 05:29:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:29:46 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:29:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000701004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:29:46 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x1000000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1231.779637][T27703] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1231.861038][T27706] batman_adv: batadv0: Adding interface: veth1919 [ 1231.867732][T27706] batman_adv: batadv0: The MTU of interface veth1919 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1231.895424][T27706] batman_adv: batadv0: Interface activated: veth1919 05:29:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x3000000) [ 1232.108300][T27716] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:29:46 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x800000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1232.173648][T27722] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1232.204035][T27716] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1232.317900][T27722] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1232.376507][T27716] BTRFS error (device loop1): open_ctree failed [ 1232.440641][T27731] batman_adv: batadv0: Adding interface: veth1921 [ 1232.447596][T27722] BTRFS error (device loop1): open_ctree failed [ 1232.465286][T27731] batman_adv: batadv0: The MTU of interface veth1921 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1232.509466][T27731] batman_adv: batadv0: Interface activated: veth1921 05:29:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x4000000) 05:29:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x900000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1232.670586][T27716] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1232.781121][T27751] __nla_validate_parse: 1 callbacks suppressed [ 1232.781132][T27751] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1232.951146][T27722] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:29:47 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1233.000921][T27755] batman_adv: batadv0: Adding interface: veth1923 05:29:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xa00000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1233.075009][T27722] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1233.083883][T27755] batman_adv: batadv0: The MTU of interface veth1923 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1233.276215][T27722] BTRFS error (device loop1): open_ctree failed [ 1233.304773][T27764] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:29:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000901004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1233.334712][T27755] batman_adv: batadv0: Interface activated: veth1923 [ 1233.368962][T27764] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1233.404991][T27751] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:29:47 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x1100000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:29:48 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xb00000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:29:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x5000000) [ 1233.576858][T27764] BTRFS error (device loop1): open_ctree failed [ 1233.581558][T27778] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1233.671938][T27791] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1233.770410][T27778] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:29:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:29:48 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1233.886534][T27796] batman_adv: batadv0: Adding interface: veth1925 [ 1233.910042][T27778] BTRFS error (device loop1): open_ctree failed [ 1233.932163][T27796] batman_adv: batadv0: The MTU of interface veth1925 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1233.966281][T27796] batman_adv: batadv0: Interface activated: veth1925 05:29:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000a01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:29:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x6000000) [ 1234.233338][T27810] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:29:48 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1234.319300][T27817] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1234.352529][T27825] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1234.415768][T27817] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1234.458389][T27810] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1234.526434][T27817] BTRFS error (device loop1): open_ctree failed [ 1234.611628][T27826] batman_adv: batadv0: Adding interface: veth1927 [ 1234.630037][T27826] batman_adv: batadv0: The MTU of interface veth1927 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 05:29:49 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2010000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1234.656594][T27810] BTRFS error (device loop1): open_ctree failed [ 1234.684610][T27826] batman_adv: batadv0: Interface activated: veth1927 [ 1234.743764][T27825] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1234.746431][T27817] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:29:49 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x1200000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:29:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x7000000) [ 1234.932808][T27848] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:29:49 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:29:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000b01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1235.036740][T27810] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1235.153953][T27852] batman_adv: batadv0: Adding interface: veth1929 [ 1235.176940][T27810] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1235.196448][T27852] batman_adv: batadv0: The MTU of interface veth1929 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1235.305638][T27852] batman_adv: batadv0: Interface activated: veth1929 05:29:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xa000000) 05:29:49 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1235.519022][T27810] BTRFS error (device loop1): open_ctree failed 05:29:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:29:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000201001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1235.617305][T27876] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1235.765194][T27881] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:29:50 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x4800000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1235.871209][T27881] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1235.883020][T27879] batman_adv: batadv0: Adding interface: veth1931 [ 1235.926332][T27879] batman_adv: batadv0: The MTU of interface veth1931 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1235.957776][T27879] batman_adv: batadv0: Interface activated: veth1931 [ 1236.008184][T27881] BTRFS error (device loop1): open_ctree failed [ 1236.017569][T27855] selinux_nlmsg_perm: 2655 callbacks suppressed [ 1236.017584][T27855] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27855 comm=syz-executor.0 05:29:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xc000000) [ 1236.084979][T27855] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27855 comm=syz-executor.0 [ 1236.116286][T27889] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1236.135305][T27855] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27855 comm=syz-executor.0 [ 1236.167804][T27855] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27855 comm=syz-executor.0 [ 1236.201393][T27906] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:29:50 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x4c00000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1236.243105][T27855] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27855 comm=syz-executor.0 [ 1236.269671][T27881] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1236.295416][T27889] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1236.306261][T27855] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27855 comm=syz-executor.0 [ 1236.353076][T27881] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1236.423846][T27855] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27855 comm=syz-executor.0 05:29:50 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x6000000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1236.470740][T27910] batman_adv: batadv0: Adding interface: veth1933 [ 1236.491076][T27910] batman_adv: batadv0: The MTU of interface veth1933 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1236.506229][T27855] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27855 comm=syz-executor.0 [ 1236.530170][T27889] BTRFS error (device loop1): open_ctree failed [ 1236.532602][T27910] batman_adv: batadv0: Interface activated: veth1933 [ 1236.566199][T27855] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27855 comm=syz-executor.0 [ 1236.637285][T27881] BTRFS error (device loop1): open_ctree failed [ 1236.666279][T27855] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27855 comm=syz-executor.0 05:29:51 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x1300000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:29:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:29:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xe000000) 05:29:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000002001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:29:51 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x6800000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1236.880984][T27925] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1236.894114][T27934] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1236.987012][T27938] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1236.999898][T27925] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1237.137448][T27941] batman_adv: batadv0: Adding interface: veth1935 [ 1237.161399][T27941] batman_adv: batadv0: The MTU of interface veth1935 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1237.166530][T27938] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:29:51 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x6c00000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1237.242991][T27941] batman_adv: batadv0: Interface activated: veth1935 [ 1237.282585][T27934] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1237.296765][T27925] BTRFS error (device loop1): open_ctree failed [ 1237.346257][T27938] BTRFS error (device loop1): open_ctree failed [ 1237.375106][T27925] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:29:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x10000000) 05:29:52 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x7400000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:29:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000102001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:29:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1237.776776][T27968] batman_adv: batadv0: Adding interface: veth1937 [ 1237.822030][T27968] batman_adv: batadv0: The MTU of interface veth1937 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 05:29:52 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x7a00000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1237.886778][T27979] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1237.898967][T27968] batman_adv: batadv0: Interface activated: veth1937 [ 1237.910396][T27979] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:29:52 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x1400000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1237.986231][T27979] BTRFS error (device loop1): open_ctree failed [ 1237.993272][T27980] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1238.035830][T27966] __nla_validate_parse: 1 callbacks suppressed [ 1238.035840][T27966] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:29:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x20000000) 05:29:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:29:52 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1238.333691][T28006] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:29:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000003f01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1238.518508][T28007] batman_adv: batadv0: Adding interface: veth1939 [ 1238.620523][T28007] batman_adv: batadv0: The MTU of interface veth1939 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1238.766322][T28007] batman_adv: batadv0: Interface activated: veth1939 05:29:53 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:29:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x3f000000) [ 1238.867869][T28022] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1238.979976][T28022] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1239.046781][T28038] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:29:53 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x1500000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:29:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1239.256614][T28022] BTRFS error (device loop1): open_ctree failed [ 1239.267041][T28042] batman_adv: batadv0: Adding interface: veth1941 05:29:53 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xf9fdffff00000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1239.310131][T28042] batman_adv: batadv0: The MTU of interface veth1941 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1239.449550][T28057] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1239.467770][T28042] batman_adv: batadv0: Interface activated: veth1941 05:29:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000004001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:29:54 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xff00000000000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:29:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x40000000) 05:29:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1239.797832][T28071] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1239.827465][T28076] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1239.939992][T28071] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1240.021990][T28082] batman_adv: batadv0: Adding interface: veth1943 05:29:54 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f00000000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1240.088727][T28082] batman_adv: batadv0: The MTU of interface veth1943 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1240.126184][T28071] BTRFS error (device loop1): open_ctree failed [ 1240.214196][T28086] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1240.240968][T28082] batman_adv: batadv0: Interface activated: veth1943 05:29:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x48000000) 05:29:54 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x1600000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1240.352112][T28071] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1240.364372][T28086] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:29:54 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffa0008000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1240.399761][T28071] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1240.476334][T28086] BTRFS error (device loop1): open_ctree failed [ 1240.497408][T28103] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1240.557080][T28071] BTRFS error (device loop1): open_ctree failed [ 1240.589769][T28086] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:29:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000004801004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1240.733515][T28110] batman_adv: batadv0: Adding interface: veth1945 [ 1240.758222][T28110] batman_adv: batadv0: The MTU of interface veth1945 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1240.796330][T28110] batman_adv: batadv0: Interface activated: veth1945 05:29:55 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffa0010000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:29:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x4c000000) [ 1241.044481][T28123] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1241.061755][T28109] selinux_nlmsg_perm: 3422 callbacks suppressed [ 1241.061771][T28109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28109 comm=syz-executor.0 [ 1241.073523][T28131] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:29:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1241.160269][T28123] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1241.193729][T28109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28109 comm=syz-executor.0 05:29:55 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1241.220961][T28109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28109 comm=syz-executor.0 [ 1241.316258][T28123] BTRFS error (device loop1): open_ctree failed [ 1241.324907][T28139] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1241.336321][T28109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28109 comm=syz-executor.0 [ 1241.382674][T28109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28109 comm=syz-executor.0 [ 1241.425004][T28136] batman_adv: batadv0: Adding interface: veth1947 [ 1241.441600][T28109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28109 comm=syz-executor.0 [ 1241.459395][T28136] batman_adv: batadv0: The MTU of interface veth1947 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1241.511558][T28109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28109 comm=syz-executor.0 [ 1241.541869][T28109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28109 comm=syz-executor.0 [ 1241.557308][T28136] batman_adv: batadv0: Interface activated: veth1947 [ 1241.588372][T28109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28109 comm=syz-executor.0 05:29:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000014801004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:29:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x60000000) 05:29:56 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'\nls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1241.656217][T28109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28109 comm=syz-executor.0 05:29:56 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x1800000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:29:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1241.833502][T28160] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1241.874388][T28164] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1241.894976][T28162] hfsplus: unable to parse mount options [ 1241.936099][T28164] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1242.028044][T28162] hfsplus: unable to parse mount options [ 1242.086429][T28169] batman_adv: batadv0: Adding interface: veth1949 [ 1242.096344][T28164] BTRFS error (device loop1): open_ctree failed [ 1242.105133][T28173] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:29:56 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'\"ls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1242.122096][T28169] batman_adv: batadv0: The MTU of interface veth1949 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1242.156150][T28169] batman_adv: batadv0: Interface activated: veth1949 [ 1242.270654][T28164] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1242.285314][T28160] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:29:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x65580000) 05:29:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x14, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1242.397740][T28191] hfsplus: unable to parse mount options [ 1242.418272][T28164] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:29:57 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x494000, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000040)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000080)={0x0, 0xc0000}) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f00000000c0)={r4, r5, 0x2}) r6 = accept4(r2, 0x0, 0x0, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r6, 0x0, 0x80000001, 0x0) [ 1242.462896][T28191] hfsplus: unable to parse mount options [ 1242.566166][T28164] BTRFS error (device loop1): open_ctree failed [ 1242.574439][T28202] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:29:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000004c01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:29:57 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'%ls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1242.720949][T28205] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1242.754062][T28207] batman_adv: batadv0: Adding interface: veth1951 [ 1242.775940][T28207] batman_adv: batadv0: The MTU of interface veth1951 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1242.836405][T28207] batman_adv: batadv0: Interface activated: veth1951 [ 1242.877152][T28205] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1242.887880][T28215] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1242.930110][T28215] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:29:57 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x1900000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:29:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x68000000) [ 1242.979541][T28220] hfsplus: unable to parse mount options [ 1243.006306][T28205] BTRFS error (device loop1): open_ctree failed [ 1243.077144][T28215] BTRFS error (device loop1): open_ctree failed [ 1243.135525][T28220] hfsplus: unable to parse mount options [ 1243.159687][T28205] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1243.192325][T28232] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:29:57 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={',ls', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:29:57 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r3 = socket$inet6(0xa, 0x4, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000040)=@gcm_128={{0x304}, "65c22d81135a4b78", "037a9609dbc638f993773ec898688f8f", "08909a2b", "c1958a15cd2300b4"}, 0x28) io_setup(0xffc00000, &(0x7f0000000000)) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 05:29:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x25, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1243.366758][T28238] batman_adv: batadv0: Adding interface: veth1953 [ 1243.385535][T28238] batman_adv: batadv0: The MTU of interface veth1953 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1243.413015][T28238] batman_adv: batadv0: Interface activated: veth1953 05:29:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000006001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:29:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x6c000000) [ 1243.570272][T28249] hfsplus: unable to parse mount options [ 1243.668532][T28249] hfsplus: unable to parse mount options [ 1243.705485][T28262] BTRFS: device fsid fff69206-0000-0000-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1243.746904][T28269] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:29:58 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'n\ns', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1243.898210][T28268] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1243.980884][T28278] hfsplus: unable to parse mount options [ 1243.991518][T28268] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1244.006593][T28273] batman_adv: batadv0: Adding interface: veth1955 [ 1244.036598][T28273] batman_adv: batadv0: The MTU of interface veth1955 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 05:29:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3d, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1244.087979][T28273] batman_adv: batadv0: Interface activated: veth1955 [ 1244.102463][T28278] hfsplus: unable to parse mount options [ 1244.117464][T28268] BTRFS error (device loop1): open_ctree failed 05:29:58 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x1a00000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:29:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x7100cdd0) 05:29:58 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'n\"s', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:29:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000006801004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1244.405225][T28304] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:29:59 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) setsockopt$inet6_dccp_int(r0, 0x21, 0x8ef7a2325abfbb93, &(0x7f0000000000)=0x2, 0x4) io_uring_setup(0xdef, &(0x7f0000000080)={0x0, 0x0, 0xc, 0x2, 0x7}) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)=0x5) [ 1244.556910][T28311] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1244.618018][T28316] hfsplus: unable to parse mount options [ 1244.630025][T28311] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1244.681377][T28308] batman_adv: batadv0: Adding interface: veth1957 [ 1244.695356][T28308] batman_adv: batadv0: The MTU of interface veth1957 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1244.724626][T28308] batman_adv: batadv0: Interface activated: veth1957 05:29:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x74000000) 05:29:59 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'n#s', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:29:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x63, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1244.856189][T28311] BTRFS error (device loop1): open_ctree failed [ 1244.940038][T28311] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1245.021267][T28336] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1245.083224][T28311] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1245.098588][T28337] hfsplus: unable to parse mount options [ 1245.150090][T28342] batman_adv: batadv0: Adding interface: veth1959 [ 1245.166219][T28342] batman_adv: batadv0: The MTU of interface veth1959 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1245.233397][T28342] batman_adv: batadv0: Interface activated: veth1959 05:29:59 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'n%s', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:29:59 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x1c00000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1245.318833][T28311] BTRFS error (device loop1): open_ctree failed 05:29:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x78ad0100) 05:29:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000006c01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6c, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1245.520069][T28363] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:00 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x20000400203) read$usbfs(r5, &(0x7f0000000000)=""/231, 0xe7) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1245.668784][T28367] hfsplus: unable to parse mount options [ 1245.689184][T28376] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1245.775025][T28370] batman_adv: batadv0: Adding interface: veth1961 [ 1245.792974][T28367] hfsplus: unable to parse mount options [ 1245.800555][T28376] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1245.816050][T28370] batman_adv: batadv0: The MTU of interface veth1961 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 05:30:00 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'n*s', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1245.887502][T28370] batman_adv: batadv0: Interface activated: veth1961 [ 1245.996423][T28376] BTRFS error (device loop1): open_ctree failed 05:30:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x79ad0100) [ 1246.086154][T28357] selinux_nlmsg_perm: 2719 callbacks suppressed [ 1246.086169][T28357] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28357 comm=syz-executor.0 05:30:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x37a, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1246.148708][T28396] hfsplus: unable to parse mount options 05:30:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000007401004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1246.193496][T28357] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28357 comm=syz-executor.0 [ 1246.246416][T28357] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28357 comm=syz-executor.0 [ 1246.295015][T28357] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28357 comm=syz-executor.0 [ 1246.333490][T28406] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1246.346204][T28357] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28357 comm=syz-executor.0 [ 1246.382458][T28396] hfsplus: unable to parse mount options [ 1246.420817][T28357] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28357 comm=syz-executor.0 05:30:01 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'n+s', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1246.506973][T28414] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1246.526522][T28357] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28357 comm=syz-executor.0 [ 1246.586258][T28357] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28357 comm=syz-executor.0 [ 1246.609150][T28411] batman_adv: batadv0: Adding interface: veth1963 [ 1246.623808][T28357] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28357 comm=syz-executor.0 [ 1246.657495][T28414] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1246.670591][T28411] batman_adv: batadv0: The MTU of interface veth1963 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 05:30:01 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256\x00'}, 0x10000001a) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0xe889533ce03f3490, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000040)={r2}) setsockopt$sock_void(r5, 0x1, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYPTR64, @ANYRES32=0x0, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x44844}, 0x20000000) r6 = accept4(r2, 0x0, 0x0, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r6, 0x0, 0x80000001, 0x0) [ 1246.718287][T28428] hfsplus: unable to parse mount options [ 1246.735919][T28357] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28357 comm=syz-executor.0 [ 1246.776198][T28414] BTRFS error (device loop1): open_ctree failed [ 1246.782705][T28411] batman_adv: batadv0: Interface activated: veth1963 05:30:01 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x1d00000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1246.850572][T28428] hfsplus: unable to parse mount options [ 1246.866252][T28414] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x7a000000) 05:30:01 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'n,s', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1246.986653][T28414] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1247.143603][T28452] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1247.206156][T28414] BTRFS error (device loop1): open_ctree failed [ 1247.220276][T28454] hfsplus: unable to parse mount options 05:30:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000007a01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1247.305907][T28454] hfsplus: unable to parse mount options [ 1247.343072][T28457] batman_adv: batadv0: Adding interface: veth1965 [ 1247.366171][T28457] batman_adv: batadv0: The MTU of interface veth1965 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1247.440975][T28457] batman_adv: batadv0: Interface activated: veth1965 [ 1247.492995][T28452] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:02 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'n-s', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2200, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1247.618975][T28467] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x7aad0100) [ 1247.673291][T28467] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1247.705862][T28475] hfsplus: unable to parse mount options 05:30:02 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) shmget$private(0x0, 0x1000, 0xd76ece577e7bb3ad, &(0x7f0000ffc000/0x1000)=nil) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1247.802033][T28475] hfsplus: unable to parse mount options [ 1247.809427][T28467] BTRFS error (device loop1): open_ctree failed [ 1247.823980][T28483] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1247.922984][T28488] batman_adv: batadv0: Adding interface: veth1967 [ 1247.932660][T28488] batman_adv: batadv0: The MTU of interface veth1967 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1247.970883][T28488] batman_adv: batadv0: Interface activated: veth1967 05:30:02 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x1e00000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:30:02 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'n.s', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x81000000) [ 1248.107444][T28467] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1248.235928][T28467] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1248.255403][T28507] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xff00, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1248.356536][T28511] hfsplus: unable to parse mount options [ 1248.366146][T28467] BTRFS error (device loop1): open_ctree failed 05:30:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed020000000000ff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:03 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'n/s', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x88a8ffff) [ 1248.682747][T28528] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1248.741146][T28532] hfsplus: unable to parse mount options [ 1248.806693][T28537] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1248.821770][T28528] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1248.897882][T28532] hfsplus: unable to parse mount options [ 1248.926175][T28528] BTRFS error (device loop1): open_ctree failed 05:30:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffffff2, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:03 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'n0s', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:03 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r3 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r3, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r3, 0xc0845658, &(0x7f0000000040)={0x0, @bt={0x8001, 0x4, 0x1, 0x3, 0x2, 0x8, 0x8000, 0x3, 0x5, 0x8001, 0x200, 0x10000, 0x4, 0x7e, 0xde621e24a1ef6889, 0x20}}) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) r7 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r7, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r7, 0x0, 0x29, &(0x7f0000000140)={@multicast2, @loopback, 0x1}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r7, 0x84, 0x15, &(0x7f0000000000)={0x3}, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) [ 1249.030349][T28542] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000000ff4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:03 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x2000000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:30:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x9effffff) [ 1249.268046][T28562] hfsplus: unable to parse mount options [ 1249.346670][T28562] hfsplus: unable to parse mount options [ 1249.421611][T28573] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:04 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nLs', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1249.498513][T28578] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1249.629984][T28578] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffffff8, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1249.736128][T28578] BTRFS error (device loop1): open_ctree failed [ 1249.758481][T28592] hfsplus: unable to parse mount options 05:30:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xa0008000) 05:30:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000201004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1249.897605][T28592] hfsplus: unable to parse mount options 05:30:04 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nXs', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1250.039798][T28609] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:04 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x4, 0x101000) setsockopt$inet6_dccp_int(r0, 0x21, 0x3, &(0x7f0000000040)=0x8, 0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write(r2, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r1, 0x0, r4, 0x0, 0x80000001, 0x0) [ 1250.146064][T28615] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1250.263986][T28625] hfsplus: unable to parse mount options [ 1250.266241][T28615] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xa0010000) 05:30:04 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x2100000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:30:04 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'n\\s', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1250.416219][T28615] BTRFS error (device loop1): open_ctree failed [ 1250.538161][T28615] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1250.582851][T28647] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1250.600005][T28644] hfsplus: unable to parse mount options [ 1250.619826][T28615] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffffff9, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1250.716775][T28615] BTRFS error (device loop1): open_ctree failed [ 1250.745052][T28644] hfsplus: unable to parse mount options 05:30:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000301004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:05 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nus', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xc3ffffff) [ 1251.064034][T28666] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1251.102319][T28646] selinux_nlmsg_perm: 2962 callbacks suppressed [ 1251.102334][T28646] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28646 comm=syz-executor.0 [ 1251.120380][T28675] hfsplus: unable to parse mount options [ 1251.129204][T28674] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:05 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind$alg(r5, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r6 = accept4(r2, 0x0, 0x0, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r6, 0x0, 0x80000001, 0x0) [ 1251.188790][T28646] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28646 comm=syz-executor.0 [ 1251.242825][T28646] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28646 comm=syz-executor.0 [ 1251.291757][T28666] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1251.305582][T28675] hfsplus: unable to parse mount options [ 1251.324214][T28646] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28646 comm=syz-executor.0 05:30:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xd0cd0071) [ 1251.402316][T28646] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28646 comm=syz-executor.0 05:30:05 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nl\n', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1251.442531][T28646] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28646 comm=syz-executor.0 [ 1251.466302][T28666] BTRFS error (device loop1): open_ctree failed [ 1251.551986][T28651] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28651 comm=syz-executor.0 [ 1251.556556][T28694] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1251.589359][T28666] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff1f, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1251.622150][T28702] hfsplus: unable to parse mount options [ 1251.658131][T28646] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28646 comm=syz-executor.0 [ 1251.673022][T28651] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28651 comm=syz-executor.0 [ 1251.703234][T28666] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1251.743771][T28702] hfsplus: unable to parse mount options [ 1251.756590][T28646] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28646 comm=syz-executor.0 05:30:06 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x2200000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:30:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xe4ffffff) [ 1251.812777][T28704] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1251.876152][T28666] BTRFS error (device loop1): open_ctree failed 05:30:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nl\"', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000401004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1252.032941][T28722] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xf0ffffff) 05:30:06 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x28) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) r6 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r6, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r6, 0x400c6615, &(0x7f0000000000)={0x0, @aes128}) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1252.208020][T28728] hfsplus: unable to parse mount options 05:30:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1252.269687][T28728] hfsplus: unable to parse mount options [ 1252.295122][T28731] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nl#', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1252.444766][T28731] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xfeffffff) [ 1252.567849][T28731] BTRFS error (device loop1): open_ctree failed [ 1252.583157][T28754] hfsplus: unable to parse mount options 05:30:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1252.753304][T28754] hfsplus: unable to parse mount options 05:30:07 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nl%', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1252.971545][T28774] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1252.990910][T28779] hfsplus: unable to parse mount options 05:30:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xffffa888) 05:30:07 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x2400000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:30:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da40a3ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1253.081988][T28774] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1253.156879][T28779] hfsplus: unable to parse mount options [ 1253.196330][T28774] BTRFS error (device loop1): open_ctree failed 05:30:07 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000000)={0xc9, 0x6}) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:30:07 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nl*', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1253.294110][T28792] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1253.333918][T28798] __nla_validate_parse: 2 callbacks suppressed [ 1253.333930][T28798] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1253.428024][T28774] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1253.444717][T28792] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1253.457704][T28807] hfsplus: unable to parse mount options [ 1253.468610][T28774] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xfffff000) [ 1253.567948][T28807] hfsplus: unable to parse mount options [ 1253.597462][T28792] BTRFS error (device loop1): open_ctree failed 05:30:08 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nl+', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1253.676655][T28774] BTRFS error (device loop1): open_ctree failed [ 1253.737308][T28792] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1253.752067][T28820] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000601004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1253.803914][T28792] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1253.897483][T28824] hfsplus: unable to parse mount options [ 1253.986398][T28792] BTRFS error (device loop1): open_ctree failed 05:30:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4233ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xffffff7f) [ 1254.037581][T28829] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1254.066848][T28824] hfsplus: unable to parse mount options 05:30:08 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nl,', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:08 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x2500000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1254.200675][T28829] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1254.251025][T28845] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:08 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r8, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0], &(0x7f0000000040), &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0), 0x1, 0x0, 0x6}) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) r9 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r9, r9, r10}, &(0x7f0000000280)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000080)={'sha384-generic\x00'}}) r11 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/capi/capi20\x00', 0xcbbd7d71608655ad, 0x0) keyctl$read(0xb, r11, &(0x7f0000000240)=""/112, 0x135df627) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r13 = socket$inet6(0xa, 0x2, 0x0) r14 = fcntl$dupfd(r13, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) ioctl$TCGETA(r14, 0x5405, &(0x7f0000000480)) keyctl$link(0x8, r10, r11) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1254.381574][T28854] hfsplus: unable to parse mount options [ 1254.387771][T28829] BTRFS error (device loop1): open_ctree failed [ 1254.394588][T28847] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:30:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xffffff9e) [ 1254.564348][T28869] encrypted_key: insufficient parameters specified [ 1254.566379][T28854] hfsplus: unable to parse mount options 05:30:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4253ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1254.670832][T28872] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1254.697807][T28829] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:09 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nl-', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1254.795552][T28829] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xffffffc3) [ 1254.959641][T28886] hfsplus: unable to parse mount options [ 1254.966678][T28829] BTRFS error (device loop1): open_ctree failed [ 1254.973230][T28881] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:30:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000701004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1255.052231][T28881] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1255.077222][T28886] hfsplus: unable to parse mount options [ 1255.105907][T28893] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:09 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nl.', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1255.196451][T28881] BTRFS error (device loop1): open_ctree failed 05:30:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xffffffe4) 05:30:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da42b3ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:09 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x2600000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1255.387841][T28905] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1255.448704][T28907] encrypted_key: insufficient parameters specified [ 1255.474058][T28911] hfsplus: unable to parse mount options [ 1255.504459][T28905] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1255.561125][T28922] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1255.616802][T28911] hfsplus: unable to parse mount options 05:30:10 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x5, 0x8200) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1255.658971][T28905] BTRFS error (device loop1): open_ctree failed 05:30:10 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nl/', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1255.728466][T28930] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:30:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xfffffff0) [ 1255.876353][T28905] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1255.901082][T28930] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1255.942554][T28946] hfsplus: unable to parse mount options [ 1255.967711][T28905] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1256.007014][T28950] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1256.062298][T28946] hfsplus: unable to parse mount options [ 1256.076786][T28930] BTRFS error (device loop1): open_ctree failed [ 1256.112157][T28920] selinux_nlmsg_perm: 3757 callbacks suppressed [ 1256.112170][T28920] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28920 comm=syz-executor.0 [ 1256.165595][T28920] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28920 comm=syz-executor.0 [ 1256.205383][T28920] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28920 comm=syz-executor.0 [ 1256.243673][T28920] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28920 comm=syz-executor.0 [ 1256.266630][T28905] BTRFS error (device loop1): open_ctree failed 05:30:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xfffffffe) [ 1256.292398][T28920] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28920 comm=syz-executor.0 05:30:10 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nl0', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1256.341257][T28930] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1256.363170][T28930] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000801004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1256.387768][T28920] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28920 comm=syz-executor.0 [ 1256.416204][T28920] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28920 comm=syz-executor.0 [ 1256.430563][T28920] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28920 comm=syz-executor.0 [ 1256.552812][T28969] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1256.553374][T28920] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28920 comm=syz-executor.0 [ 1256.576221][T28930] BTRFS error (device loop1): open_ctree failed [ 1256.583669][T28966] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da42d3ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1256.636435][T28973] hfsplus: unable to parse mount options [ 1256.685837][T28920] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28920 comm=syz-executor.0 05:30:11 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x2800000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:30:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x1a0ffffffff) [ 1256.816628][T28966] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:11 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc-aes-ce\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) prctl$PR_GET_CHILD_SUBREAPER(0x25) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffffffffffe59) r6 = socket$inet6_sctp(0xa, 0x7, 0x84) getsockopt(r6, 0x2, 0x9, &(0x7f00000000c0)=""/172, &(0x7f0000000240)=0xac) getpeername(r3, &(0x7f0000000000)=@rc, &(0x7f0000000080)=0x80) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1256.870692][T28973] hfsplus: unable to parse mount options [ 1256.936333][T28966] BTRFS error (device loop1): open_ctree failed [ 1256.946064][T28986] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:30:11 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nlX', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1257.030185][T28996] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1257.267544][T29012] hfsplus: unable to parse mount options 05:30:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000901004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4303ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x8000a0ffffffff) 05:30:11 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nl\\', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:11 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r6, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r6, 0x0, 0x29, &(0x7f0000000140)=ANY=[@ANYBLOB="e00000024015834089ad40e800000000"], 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r6, 0x0, 0x2d, &(0x7f0000000000)={0x92c0, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x22}}}}, 0x88) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1257.580328][T29033] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1257.622667][T29028] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1257.697063][T29037] hfsplus: unable to parse mount options [ 1257.812302][T29028] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1257.846627][T29037] hfsplus: unable to parse mount options 05:30:12 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x2900000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1257.896189][T29028] BTRFS error (device loop1): open_ctree failed [ 1257.939031][T29047] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:30:12 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nlc', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xf0ffffffffffff) [ 1258.127867][T29028] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1258.206984][T29028] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1258.222495][T29047] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1258.247044][T29075] hfsplus: unable to parse mount options [ 1258.296106][T29028] BTRFS error (device loop1): open_ctree failed 05:30:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000a01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x100000000000000) [ 1258.439659][T29075] hfsplus: unable to parse mount options [ 1258.456154][T29047] BTRFS error (device loop1): open_ctree failed 05:30:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4373ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:13 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nld', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1258.576301][T29086] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1258.609279][T29091] __nla_validate_parse: 2 callbacks suppressed [ 1258.609289][T29091] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1258.633569][T29086] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1258.736420][T29086] BTRFS error (device loop1): open_ctree failed [ 1258.808726][T29086] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:13 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0x8, 0x7}, 0xc) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000000)) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000140)=0xff, &(0x7f0000000240)=0x1) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1258.865242][T29095] batman_adv: batadv0: Adding interface: veth2011 [ 1258.877042][T29086] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1258.894153][T29095] batman_adv: batadv0: The MTU of interface veth2011 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1258.920464][T29102] hfsplus: unable to parse mount options [ 1258.982229][T29095] batman_adv: batadv0: Interface activated: veth2011 [ 1258.986335][T29086] BTRFS error (device loop1): open_ctree failed [ 1259.002872][T29098] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:30:13 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nli', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000b01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x200000000000000) 05:30:13 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x2a00000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1259.154134][T29098] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1259.253363][T29129] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1259.269259][T29124] hfsplus: unable to parse mount options [ 1259.416278][T29098] BTRFS error (device loop1): open_ctree failed [ 1259.432281][T29135] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:14 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nll', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da43d3ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1259.496864][T29133] batman_adv: batadv0: Adding interface: veth2013 [ 1259.503336][T29133] batman_adv: batadv0: The MTU of interface veth2013 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1259.576121][T29133] batman_adv: batadv0: Interface activated: veth2013 [ 1259.607642][T29135] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x300000000000000) [ 1259.706386][T29148] hfsplus: unable to parse mount options [ 1259.727190][T29135] BTRFS error (device loop1): open_ctree failed [ 1259.797731][T29151] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1259.820003][T29148] hfsplus: unable to parse mount options [ 1259.848995][T29135] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1259.875322][T29151] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:14 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nlo', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1259.919641][T29163] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1259.956749][T29135] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1260.006118][T29151] BTRFS error (device loop1): open_ctree failed 05:30:14 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-clmulni\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1260.088665][T29167] batman_adv: batadv0: Adding interface: veth2015 [ 1260.095211][T29167] batman_adv: batadv0: The MTU of interface veth2015 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1260.122293][T29167] batman_adv: batadv0: Interface activated: veth2015 [ 1260.146104][T29135] BTRFS error (device loop1): open_ctree failed 05:30:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000001001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x400000000000000) 05:30:14 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x2c00000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1260.269079][T29172] hfsplus: unable to parse mount options [ 1260.275836][T29151] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1260.437150][T29196] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4633ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1260.493253][T29186] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:15 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nlp', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1260.553596][T29186] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1260.666436][T29186] BTRFS error (device loop1): open_ctree failed [ 1260.685265][T29209] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1260.759642][T29213] hfsplus: unable to parse mount options [ 1260.768177][T29198] batman_adv: batadv0: Adding interface: veth2017 [ 1260.791525][T29198] batman_adv: batadv0: The MTU of interface veth2017 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1260.856194][T29198] batman_adv: batadv0: Interface activated: veth2017 05:30:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x500000000000000) [ 1260.937726][T29186] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:15 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nlu', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da46c3ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1261.074047][T29186] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:15 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x400000) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r4, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r5, 0x14, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$FS_IOC_FSSETXATTR(r7, 0x401c5820, &(0x7f0000000240)={0x57a3, 0x5, 0x10001, 0xffffffff, 0xd366}) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1261.124484][T29200] selinux_nlmsg_perm: 2878 callbacks suppressed [ 1261.124544][T29200] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29200 comm=syz-executor.0 [ 1261.155384][T29229] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1261.186148][T29186] BTRFS error (device loop1): open_ctree failed [ 1261.208920][T29200] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29200 comm=syz-executor.0 [ 1261.235408][T29230] hfsplus: unable to parse mount options 05:30:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000004801004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1261.299216][T29233] batman_adv: batadv0: Adding interface: veth2019 [ 1261.328203][T29230] hfsplus: unable to parse mount options [ 1261.338306][T29233] batman_adv: batadv0: The MTU of interface veth2019 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1261.354117][T29238] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1261.388236][T29200] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29200 comm=syz-executor.0 [ 1261.411590][T29200] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29200 comm=syz-executor.0 [ 1261.426327][T29233] batman_adv: batadv0: Interface activated: veth2019 [ 1261.460917][T29201] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29201 comm=syz-executor.0 05:30:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x600000000000000) 05:30:16 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nlx', 0x3d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1261.540241][T29200] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29200 comm=syz-executor.0 [ 1261.610290][T29201] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29201 comm=syz-executor.0 [ 1261.641866][T29252] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4360ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1261.711503][T29200] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29200 comm=syz-executor.0 [ 1261.733525][T29259] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1261.736347][T29201] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29201 comm=syz-executor.0 [ 1261.781181][T29262] hfsplus: unable to parse mount options [ 1261.790370][T29252] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1261.852659][T29200] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29200 comm=syz-executor.0 [ 1261.869751][T29262] hfsplus: unable to parse mount options [ 1261.896272][T29252] BTRFS error (device loop1): open_ctree failed [ 1261.940374][T29267] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1261.969837][T29264] batman_adv: batadv0: Adding interface: veth2021 05:30:16 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x2, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1262.010909][T29252] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:16 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x2d00000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1262.043298][T29264] batman_adv: batadv0: The MTU of interface veth2021 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1262.156400][T29252] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1262.176484][T29264] batman_adv: batadv0: Interface activated: veth2021 [ 1262.188932][T29267] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1262.224448][T29279] hfsplus: unable to parse mount options [ 1262.276243][T29252] BTRFS error (device loop1): open_ctree failed 05:30:16 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r8 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r14 = socket$inet6(0xa, 0x2, 0x0) r15 = fcntl$dupfd(r14, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r17 = socket$inet6(0xa, 0x2, 0x0) r18 = fcntl$dupfd(r17, 0x0, r16) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r20 = socket$inet6(0xa, 0x2, 0x0) r21 = fcntl$dupfd(r20, 0x0, r19) ioctl$PERF_EVENT_IOC_ENABLE(r21, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r23 = socket$inet6(0xa, 0x2, 0x0) r24 = fcntl$dupfd(r23, 0x0, r22) ioctl$PERF_EVENT_IOC_ENABLE(r24, 0x8912, 0x400200) sendmsg$NBD_CMD_STATUS(r11, &(0x7f0000000380)={&(0x7f0000000100), 0xc, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="98000000", @ANYRES16=r12, @ANYBLOB="000825bd7000fcdbdf25050000000c00020002000000000000000c00050008010000000000000c00060002000000000000000c00040000000000000000003c00070008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r15, @ANYBLOB="08000100", @ANYRES32=r18, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="84061fea", @ANYRES32=r21, @ANYBLOB="08000100", @ANYRES32=r24, @ANYBLOB="0c00020000080000000000000c0005000202000000000000"], 0x98}, 0x1, 0x0, 0x0, 0x8000}, 0x5c000) r25 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r25, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r25, 0xc00c55ca, &(0x7f00000000c0)={0xf, 0x2, 0x9}) r26 = socket$inet6(0xa, 0x2, 0x0) r27 = fcntl$dupfd(r26, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r27, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r27, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111, 0x3}}, 0x20) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000000)) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:30:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x700000000000000) [ 1262.319784][T29279] hfsplus: unable to parse mount options 05:30:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000004c01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1262.426149][T29267] BTRFS error (device loop1): open_ctree failed 05:30:17 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1262.506320][T29296] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1262.549894][T29267] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1262.652809][T29304] hfsplus: unable to parse mount options [ 1262.735712][T29298] batman_adv: batadv0: Adding interface: veth2023 [ 1262.766910][T29304] hfsplus: unable to parse mount options 05:30:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da43625c0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1262.776745][T29298] batman_adv: batadv0: The MTU of interface veth2023 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1262.803189][T29310] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1262.842506][T29298] batman_adv: batadv0: Interface activated: veth2023 05:30:17 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x4, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1262.920681][T29310] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1262.990408][T29296] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xa00000000000000) [ 1263.096197][T29310] BTRFS error (device loop1): open_ctree failed [ 1263.103137][T29321] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1263.178125][T29328] hfsplus: unable to parse mount options [ 1263.213446][T29310] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:17 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x2e00000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1263.283480][T29336] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1263.309668][T29328] hfsplus: unable to parse mount options [ 1263.342745][T29321] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:17 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x5, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1263.386272][T29310] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1263.494604][T29341] batman_adv: batadv0: Adding interface: veth2025 [ 1263.506267][T29341] batman_adv: batadv0: The MTU of interface veth2025 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1263.516533][T29321] BTRFS error (device loop1): open_ctree failed [ 1263.566061][T29341] batman_adv: batadv0: Interface activated: veth2025 [ 1263.606410][T29310] BTRFS error (device loop1): open_ctree failed 05:30:18 executing program 4: syz_emit_ethernet(0xe, &(0x7f0000000200)={@local}, 0x0) 05:30:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000006001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1263.682391][T29321] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1263.693303][T29356] hfsplus: unable to parse mount options [ 1263.711370][T29336] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000200)={@dev, 0x0, 0x0, 0x3, 0x1, 0x5e5}, 0x20) [ 1263.800953][T29356] hfsplus: unable to parse mount options [ 1263.807410][T29321] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xc00000000000000) 05:30:18 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x6, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000006801004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000001280)=""/189, 0x3a, 0xbd, 0x1}, 0x20) [ 1264.016945][T29321] BTRFS error (device loop1): open_ctree failed 05:30:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363dc0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1264.133212][T29381] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1264.137879][T29378] hfsplus: unable to parse mount options [ 1264.228267][T29382] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:18 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) flistxattr(r0, &(0x7f0000000240)=""/48, 0x30) [ 1264.354999][T29390] batman_adv: batadv0: Adding interface: veth2027 [ 1264.363232][T29390] batman_adv: batadv0: The MTU of interface veth2027 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1264.430648][T29390] batman_adv: batadv0: Interface activated: veth2027 [ 1264.464320][T29382] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:19 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x3000000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:30:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xe00000000000000) [ 1264.488578][T29378] hfsplus: unable to parse mount options 05:30:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000001280)=""/189, 0x2e, 0xbd, 0x1}, 0x20) 05:30:19 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x7, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1264.646090][T29382] BTRFS error (device loop1): open_ctree failed [ 1264.676192][T29396] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1264.716871][T29413] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$9p_virtio(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20, 0x0) [ 1264.845642][T29422] batman_adv: batadv0: Adding interface: veth2029 [ 1264.878801][T29396] BTRFS error (device loop5): superblock checksum mismatch [ 1264.891463][T29422] batman_adv: batadv0: The MTU of interface veth2029 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 05:30:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000006c01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1264.968338][T29421] hfsplus: unable to parse mount options [ 1265.002347][T29422] batman_adv: batadv0: Interface activated: veth2029 [ 1265.038566][T29396] BTRFS error (device loop5): open_ctree failed [ 1265.076144][T29421] hfsplus: unable to parse mount options 05:30:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x1000000000000000) 05:30:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4366cc0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1265.139866][T29427] EXT4-fs (sda1): re-mounted. Opts: (null) 05:30:19 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x8, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1265.192541][T29436] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1265.209465][T29440] EXT4-fs (sda1): re-mounted. Opts: (null) 05:30:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x3ff]}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1265.269439][T29444] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1265.366800][T29436] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1265.466155][T29436] BTRFS error (device loop1): open_ctree failed [ 1265.468913][T29449] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1265.507575][T29445] batman_adv: batadv0: Adding interface: veth2031 [ 1265.521267][T29445] batman_adv: batadv0: The MTU of interface veth2031 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1265.548953][T29445] batman_adv: batadv0: Interface activated: veth2031 [ 1265.583905][T29457] hfsplus: unable to parse mount options [ 1265.615136][T29449] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x2000000000000000) [ 1265.647946][T29436] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1265.660698][T29457] hfsplus: unable to parse mount options 05:30:20 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x9, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:20 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x3100000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1265.804519][T29436] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1265.810513][T29470] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1265.866474][T29449] BTRFS error (device loop1): open_ctree failed [ 1265.966872][T29472] batman_adv: batadv0: Adding interface: veth2033 [ 1265.976235][T29436] BTRFS error (device loop1): open_ctree failed [ 1265.995096][T29475] hfsplus: unable to parse mount options 05:30:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0300000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1266.003354][T29472] batman_adv: batadv0: The MTU of interface veth2033 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 05:30:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000007401004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1266.088236][T29475] hfsplus: unable to parse mount options [ 1266.097492][T29472] batman_adv: batadv0: Interface activated: veth2033 [ 1266.159635][T29470] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1266.169567][T29480] selinux_nlmsg_perm: 2862 callbacks suppressed [ 1266.169583][T29480] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29480 comm=syz-executor.0 05:30:20 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0xa, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1266.215572][T29450] debugfs: Directory '29450-4' with parent 'kvm' already present! [ 1266.247585][T29480] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29480 comm=syz-executor.0 05:30:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x3f00000000000000) [ 1266.277395][T29480] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29480 comm=syz-executor.0 [ 1266.312993][T29480] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29480 comm=syz-executor.0 [ 1266.369811][T29480] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29480 comm=syz-executor.0 [ 1266.371119][T29499] hfsplus: unable to parse mount options [ 1266.427885][T29480] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29480 comm=syz-executor.0 [ 1266.439071][T29490] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1266.486929][T29507] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1266.508036][T29480] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29480 comm=syz-executor.0 [ 1266.547979][T29503] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1266.572441][T29490] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1266.586495][T29480] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29480 comm=syz-executor.0 [ 1266.615483][T29499] hfsplus: unable to parse mount options [ 1266.622107][T29503] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:21 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x1c, 0x4000040000002, 0x1, 0x1, 0x0, 0x0, {}, [@typed={0x8, 0x8, @str='ife\x00'}]}, 0x1c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 05:30:21 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0xb, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1266.664833][T29480] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29480 comm=syz-executor.0 [ 1266.706322][T29490] BTRFS error (device loop1): open_ctree failed [ 1266.740718][T29480] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29480 comm=syz-executor.0 [ 1266.745229][T29514] batman_adv: batadv0: Adding interface: veth2035 [ 1266.761229][T29503] BTRFS error (device loop1): open_ctree failed [ 1266.770870][T29514] batman_adv: batadv0: The MTU of interface veth2035 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1266.856204][T29514] batman_adv: batadv0: Interface activated: veth2035 05:30:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0400000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x4000000000000000) 05:30:21 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x3200000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1266.977495][T29503] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1267.097082][T29528] hfsplus: unable to parse mount options [ 1267.110688][T29539] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1267.134460][T29503] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:21 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0xc, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1267.299780][T29503] BTRFS error (device loop1): open_ctree failed [ 1267.329124][T29545] batman_adv: batadv0: Adding interface: veth2037 05:30:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0500000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1267.335596][T29545] batman_adv: batadv0: The MTU of interface veth2037 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 05:30:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000007a01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1267.433390][T29554] hfsplus: unable to parse mount options [ 1267.496041][T29545] batman_adv: batadv0: Interface activated: veth2037 05:30:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x4800000000000000) [ 1267.600496][T29558] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1267.628074][T29554] hfsplus: unable to parse mount options 05:30:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000001b80)={0x2, 0x0, @remote}, 0x10) getsockname$inet(r0, 0x0, &(0x7f0000000100)) 05:30:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0xd, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1267.765538][T29569] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1267.806837][T29566] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1267.896145][T29566] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1267.911908][T29578] hfsplus: unable to parse mount options 05:30:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0600000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1267.986293][T29566] BTRFS error (device loop1): open_ctree failed [ 1268.003881][T29578] hfsplus: unable to parse mount options 05:30:22 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000001280)=""/189, 0x42, 0xbd, 0x1}, 0x20) [ 1268.030368][T29576] batman_adv: batadv0: Adding interface: veth2039 [ 1268.071232][T29576] batman_adv: batadv0: The MTU of interface veth2039 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1268.106356][T29576] batman_adv: batadv0: Interface activated: veth2039 05:30:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0xe, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000003004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:22 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x3400000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:30:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x4c00000000000000) [ 1268.212597][T29599] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:30:22 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c09, 0xffffffffffffffff) [ 1268.350051][T29607] hfsplus: unable to parse mount options [ 1268.412490][T29619] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1268.457367][T29611] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1268.480577][T29607] hfsplus: unable to parse mount options [ 1268.497391][T29611] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:23 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0xf, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1268.547080][T29624] batman_adv: batadv0: Adding interface: veth2041 [ 1268.562028][T29624] batman_adv: batadv0: The MTU of interface veth2041 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 05:30:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioperm(0x0, 0x2, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1268.596285][T29624] batman_adv: batadv0: Interface activated: veth2041 [ 1268.603366][T29611] BTRFS error (device loop1): open_ctree failed [ 1268.681069][T29636] hfsplus: unable to parse mount options [ 1268.689552][T29611] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0700000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x6000000000000000) 05:30:23 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x10, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1268.808647][T29611] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1268.953582][T29652] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="7c0000002c00015200"/20, @ANYRES32, @ANYBLOB="000000000000000003000000080001006270660050000200080004000001000004000500400002003c00010000000000020000200000000000000000000011000000000000001000000000000000000000009fad74347f1d42d9a10000000000000000"], 0x7c}}, 0x0) [ 1269.039568][T29655] hfsplus: unable to parse mount options [ 1269.067740][T29611] BTRFS error (device loop1): open_ctree failed [ 1269.128802][T29645] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1269.146236][T29655] hfsplus: unable to parse mount options [ 1269.174470][T29657] batman_adv: batadv0: Adding interface: veth2043 05:30:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000005004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:23 executing program 4: [ 1269.205912][T29657] batman_adv: batadv0: The MTU of interface veth2043 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1269.273039][T29657] batman_adv: batadv0: Interface activated: veth2043 [ 1269.296719][T29645] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:23 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x11, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:23 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x3a00000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1269.332692][T29652] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:23 executing program 4: [ 1269.428367][T29645] BTRFS error (device loop1): open_ctree failed 05:30:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0800000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x6558000000000000) [ 1269.483351][T29671] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1269.509083][T29681] hfsplus: unable to parse mount options 05:30:24 executing program 4: [ 1269.581408][T29671] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1269.632651][T29688] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:24 executing program 4: [ 1269.736167][T29671] BTRFS error (device loop1): open_ctree failed 05:30:24 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x12, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1269.815316][T29696] batman_adv: batadv0: Adding interface: veth2045 [ 1269.822003][T29696] batman_adv: batadv0: The MTU of interface veth2045 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1269.849032][T29696] batman_adv: batadv0: Interface activated: veth2045 [ 1269.889441][T29671] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:24 executing program 4: [ 1269.963390][T29671] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x6800000000000000) [ 1270.018874][T29706] hfsplus: unable to parse mount options [ 1270.076686][T29671] BTRFS error (device loop1): open_ctree failed [ 1270.118752][T29697] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1270.152014][T29706] hfsplus: unable to parse mount options [ 1270.157169][T29715] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000006004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:24 executing program 4: 05:30:24 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x13, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1270.287570][T29697] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1270.395913][T29721] batman_adv: batadv0: Adding interface: veth2047 [ 1270.403707][T29729] hfsplus: unable to parse mount options [ 1270.438265][T29721] batman_adv: batadv0: The MTU of interface veth2047 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1270.473919][T29721] batman_adv: batadv0: Interface activated: veth2047 05:30:25 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x3e00000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:30:25 executing program 4: [ 1270.513299][T29729] hfsplus: unable to parse mount options [ 1270.597375][T29697] BTRFS error (device loop1): open_ctree failed 05:30:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0900000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:25 executing program 4: 05:30:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x6c00000000000000) 05:30:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000007004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x14, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:25 executing program 4: [ 1270.789274][T29754] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1270.847747][T29756] hfsplus: unable to parse mount options [ 1270.874799][T29758] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:25 executing program 4: [ 1271.002583][T29758] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1271.021589][T29756] hfsplus: unable to parse mount options [ 1271.049411][T29762] batman_adv: batadv0: Adding interface: veth2049 [ 1271.056478][T29762] batman_adv: batadv0: The MTU of interface veth2049 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1271.094557][T29762] batman_adv: batadv0: Interface activated: veth2049 05:30:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x7100cdd000000000) 05:30:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x15, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1271.126120][T29758] BTRFS error (device loop1): open_ctree failed 05:30:25 executing program 4: [ 1271.289490][T29782] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1271.342328][T29758] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1271.388370][T29758] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:25 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x3f00000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:30:25 executing program 4: 05:30:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0a00000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:26 executing program 4: [ 1271.507535][T29793] hfsplus: unable to parse mount options [ 1271.586143][T29758] BTRFS error (device loop1): open_ctree failed [ 1271.606457][T29787] batman_adv: batadv0: Adding interface: veth2051 [ 1271.634483][T29787] batman_adv: batadv0: The MTU of interface veth2051 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1271.646062][T29797] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:30:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000009004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:26 executing program 4: [ 1271.702735][T29793] hfsplus: unable to parse mount options [ 1271.742126][T29787] batman_adv: batadv0: Interface activated: veth2051 05:30:26 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x16, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x7400000000000000) [ 1271.805815][T29802] selinux_nlmsg_perm: 3103 callbacks suppressed [ 1271.805830][T29802] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29802 comm=syz-executor.0 [ 1271.833864][T29802] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29802 comm=syz-executor.0 [ 1271.862958][T29802] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29802 comm=syz-executor.0 [ 1271.894363][T29802] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29802 comm=syz-executor.0 [ 1271.908075][T29802] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29802 comm=syz-executor.0 [ 1271.921864][T29802] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29802 comm=syz-executor.0 [ 1271.935444][T29802] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29802 comm=syz-executor.0 05:30:26 executing program 4: [ 1271.956746][T29802] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29802 comm=syz-executor.0 [ 1272.037048][T29826] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1272.038430][T29822] hfsplus: unable to parse mount options [ 1272.046767][T29802] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29802 comm=syz-executor.0 [ 1272.100815][T29802] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29802 comm=syz-executor.0 [ 1272.126596][T29814] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:26 executing program 4: [ 1272.212797][T29814] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1272.242547][T29828] batman_adv: batadv0: Adding interface: veth2053 [ 1272.249451][T29828] batman_adv: batadv0: The MTU of interface veth2053 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1272.275149][T29828] batman_adv: batadv0: Interface activated: veth2053 [ 1272.282814][T29822] hfsplus: unable to parse mount options 05:30:26 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x17, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:26 executing program 4: [ 1272.336156][T29814] BTRFS error (device loop1): open_ctree failed [ 1272.347282][T29797] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:30:27 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x4000000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1272.440661][T29797] BTRFS error (device loop5): superblock checksum mismatch [ 1272.596075][T29797] BTRFS error (device loop5): open_ctree failed [ 1272.626920][T29843] hfsplus: unable to parse mount options [ 1272.632760][T29814] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed1000000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x78ad010000000000) 05:30:27 executing program 4: [ 1272.741012][T29857] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1272.760753][T29814] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1272.892374][T29861] batman_adv: batadv0: Adding interface: veth2055 [ 1272.908834][T29861] batman_adv: batadv0: The MTU of interface veth2055 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1272.980507][T29861] batman_adv: batadv0: Interface activated: veth2055 [ 1273.066280][T29814] BTRFS error (device loop1): open_ctree failed [ 1273.072815][T29864] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:30:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed020000000000000a004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:27 executing program 4: 05:30:27 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x18, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x79ad010000000000) [ 1273.127337][T29864] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:27 executing program 4: [ 1273.213496][T29878] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1273.266262][T29864] BTRFS error (device loop1): open_ctree failed [ 1273.276706][T29875] hfsplus: unable to parse mount options [ 1273.343370][T29883] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1273.369247][T29875] hfsplus: unable to parse mount options 05:30:27 executing program 4: [ 1273.420859][T29882] batman_adv: batadv0: Adding interface: veth2057 [ 1273.445777][T29882] batman_adv: batadv0: The MTU of interface veth2057 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1273.475272][T29882] batman_adv: batadv0: Interface activated: veth2057 05:30:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x7a00000000000000) 05:30:28 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x19, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1273.521068][T29883] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:28 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x4200000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:30:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed1400000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:28 executing program 4: [ 1273.616203][T29883] BTRFS error (device loop1): open_ctree failed [ 1273.707555][T29883] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1273.741498][T29901] hfsplus: unable to parse mount options 05:30:28 executing program 4: [ 1273.805442][T29916] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1273.837424][T29883] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1273.905044][T29920] batman_adv: batadv0: Adding interface: veth2059 [ 1273.911702][T29920] batman_adv: batadv0: The MTU of interface veth2059 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1273.938870][T29920] batman_adv: batadv0: Interface activated: veth2059 [ 1273.988073][T29916] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1274.046177][T29883] BTRFS error (device loop1): open_ctree failed [ 1274.073894][T29910] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:30:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed020000000000000b004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:28 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x1a, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x7aad010000000000) 05:30:28 executing program 4: [ 1274.324889][T29937] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:28 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000140)={0x0, 0x5}) dup(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x38f4168b7592eaea, 0xed13f8ac3df0acdb, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x5d8, 0x0, 0x150) [ 1274.373698][T29935] hfsplus: unable to parse mount options [ 1274.405399][T29936] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed3d00000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1274.499805][T29936] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1274.539427][T29935] hfsplus: unable to parse mount options 05:30:29 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x1b, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1274.581585][T29945] batman_adv: batadv0: Adding interface: veth2061 [ 1274.599818][T29945] batman_adv: batadv0: The MTU of interface veth2061 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1274.684457][T29945] batman_adv: batadv0: Interface activated: veth2061 [ 1274.706390][T29936] BTRFS error (device loop1): open_ctree failed 05:30:29 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x4300000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:30:29 executing program 4: r0 = mq_open(&(0x7f0000000040)=':\x00', 0x840, 0x0, 0x0) mq_timedreceive(r0, &(0x7f0000000200)=""/249, 0xf9, 0x0, 0x0) 05:30:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x8100000000000000) [ 1274.800867][T29964] hfsplus: unable to parse mount options [ 1274.819623][T29966] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1274.934393][T29964] hfsplus: unable to parse mount options [ 1274.945985][T29936] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1274.965165][T29966] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1274.988419][T29980] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:29 executing program 4: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000010000001809"], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$apparmor_exec(r1, &(0x7f0000000880)={'\\CB\xec\x1f\xb7\x06C\xc3MY\x1dtG\x03\xc3\x16\xb1\xee\x9bFy\xeaU\x0e3\\C6\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00\x995\xe9^\xd4\xdd\xf4\x16\x1d\xb1\xef\xa4=\xe2q,\xbc\xbc\x8e\xc8iy\xb1\x18\x9c$\x15\xbfO\xa4s3I\xf3\x13b\x7f\xbbc\x88\xf6!\x1dq'}, 0x299) [ 1275.062422][T29936] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:29 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x1c, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1275.146503][T29966] BTRFS error (device loop1): open_ctree failed [ 1275.187591][T29984] batman_adv: batadv0: Adding interface: veth2063 [ 1275.196261][T29984] batman_adv: batadv0: The MTU of interface veth2063 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1275.224398][T29936] BTRFS error (device loop1): open_ctree failed [ 1275.264817][ T26] audit: type=1804 audit(1572154229.766:124): pid=29996 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/" dev="sda1" ino=2328 res=1 [ 1275.296118][T29984] batman_adv: batadv0: Interface activated: veth2063 05:30:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed020000000000000f004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed6c00000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1275.347718][T29994] hfsplus: unable to parse mount options 05:30:29 executing program 4: futex(0x0, 0x85, 0x0, 0x0, 0x0, 0x30000000) [ 1275.381050][ T26] audit: type=1800 audit(1572154229.826:125): pid=29996 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="/" dev="sda1" ino=2328 res=0 [ 1275.405868][T29980] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x88a8ffff00000000) [ 1275.506387][T30003] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1275.519841][T29994] hfsplus: unable to parse mount options [ 1275.567515][T30011] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1275.594300][T30003] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:30 executing program 4: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000010000001809"], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$apparmor_exec(r1, &(0x7f0000000880)={'\x1b[c\xec\x1f\xb7\x06C\xc3MY\x1dtG\x03\xc3\x16\xb1\xeeLFy\xeaU\x0e3\\C6\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00\x995\xe9^\xd4\xdd\xf4\x16\x1d\xb1\xef\xa4=\xe2q,\xbc\xbc\x8e\xc8iy\xb1\x18\x9c$\x15\xbfO\xa4s3I\xf3\x13b\x7f\xbbc\x88\xf6!\x1dq'}, 0x299) 05:30:30 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x1d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1275.617552][T30018] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1275.728063][T30011] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1275.740374][ T26] audit: type=1804 audit(1572154230.246:126): pid=30023 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/" dev="sda1" ino=2328 res=1 [ 1275.816336][ T26] audit: type=1804 audit(1572154230.316:127): pid=30025 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/" dev="sda1" ino=2328 res=1 05:30:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1275.876190][T30003] BTRFS error (device loop1): open_ctree failed [ 1275.886922][T30011] BTRFS error (device loop1): open_ctree failed [ 1275.894901][T30029] hfsplus: unable to parse mount options [ 1275.975248][T30021] batman_adv: batadv0: Adding interface: veth2065 [ 1275.995497][T30021] batman_adv: batadv0: The MTU of interface veth2065 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1276.025622][T30021] batman_adv: batadv0: Interface activated: veth2065 05:30:30 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x4800000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:30:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0202000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x9effffff00000000) [ 1276.152983][T30029] hfsplus: unable to parse mount options [ 1276.174868][T30011] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:30 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x1e, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1276.322830][T30011] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1276.333711][T30057] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000014004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1276.386198][T30011] BTRFS error (device loop1): open_ctree failed [ 1276.464713][T30062] batman_adv: batadv0: Adding interface: veth2067 [ 1276.468877][T30041] BTRFS: device fsid fff69206-0000-0000-b81e-1b00920efd9a devid 0 transid 0 /dev/loop4 05:30:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0203000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1276.537217][T30066] hfsplus: unable to parse mount options [ 1276.575889][T30062] batman_adv: batadv0: The MTU of interface veth2067 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1276.630572][T30062] batman_adv: batadv0: Interface activated: veth2067 05:30:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xc3ffffff00000000) [ 1276.708042][T30066] hfsplus: unable to parse mount options [ 1276.766813][T30073] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1276.817331][T30056] selinux_nlmsg_perm: 4119 callbacks suppressed [ 1276.817345][T30056] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30056 comm=syz-executor.0 05:30:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:31 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x21, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1276.861680][T30073] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0204000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1276.905531][T30056] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30056 comm=syz-executor.0 [ 1276.926118][T30087] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1277.006202][T30073] BTRFS error (device loop1): open_ctree failed [ 1277.085926][T30101] hfsplus: unable to parse mount options [ 1277.118277][T30056] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30056 comm=syz-executor.0 [ 1277.140532][T30100] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1277.144124][T30093] batman_adv: batadv0: Adding interface: veth2069 [ 1277.176315][T30093] batman_adv: batadv0: The MTU of interface veth2069 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1277.181344][T30056] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30056 comm=syz-executor.0 [ 1277.225788][T30056] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30056 comm=syz-executor.0 [ 1277.248095][T30093] batman_adv: batadv0: Interface activated: veth2069 [ 1277.268111][T30056] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30056 comm=syz-executor.0 [ 1277.284052][T30056] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30056 comm=syz-executor.0 05:30:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xe4ffffff00000000) [ 1277.285793][T30060] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30060 comm=syz-executor.0 [ 1277.367248][T30060] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30060 comm=syz-executor.0 [ 1277.388884][T30073] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1277.408181][T30115] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1277.416290][T30100] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1277.427086][T30060] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30060 comm=syz-executor.0 [ 1277.458694][T30073] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:32 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x22, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1277.556161][T30100] BTRFS error (device loop1): open_ctree failed 05:30:32 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x4900000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:30:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1277.620144][T30116] batman_adv: batadv0: Adding interface: veth2071 [ 1277.644391][T30073] BTRFS error (device loop1): open_ctree failed [ 1277.664225][T30100] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1277.682222][T30124] hfsplus: unable to parse mount options [ 1277.709817][T30116] batman_adv: batadv0: The MTU of interface veth2071 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 05:30:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000025004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xf0ffffff00000000) [ 1277.796044][T30116] batman_adv: batadv0: Interface activated: veth2071 [ 1277.986449][T30140] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1278.085031][T30124] hfsplus: unable to parse mount options 05:30:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0205000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:32 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x23, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1278.198475][T30143] batman_adv: batadv0: Adding interface: veth2073 [ 1278.207235][T30147] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) [ 1278.246581][T30143] batman_adv: batadv0: The MTU of interface veth2073 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1278.284940][T30143] batman_adv: batadv0: Interface activated: veth2073 [ 1278.367708][T30147] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xfeffffff00000000) [ 1278.427383][T30160] hfsplus: unable to parse mount options [ 1278.446191][T30147] BTRFS error (device loop1): open_ctree failed [ 1278.488168][T30160] hfsplus: unable to parse mount options [ 1278.488724][T30158] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1278.522968][T30171] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:33 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x24, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1278.725671][T30174] batman_adv: batadv0: Adding interface: veth2075 [ 1278.734087][T30174] batman_adv: batadv0: The MTU of interface veth2075 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1278.759964][T30174] batman_adv: batadv0: Interface activated: veth2075 05:30:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed020000000000003c004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xffffff7f00000000) 05:30:33 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x4a00000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1278.911994][T30184] hfsplus: unable to parse mount options 05:30:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) [ 1279.068087][T30202] batman_adv: batadv0: Adding interface: veth2077 [ 1279.074854][T30202] batman_adv: batadv0: The MTU of interface veth2077 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1279.140014][T30202] batman_adv: batadv0: Interface activated: veth2077 [ 1279.150822][T30184] hfsplus: unable to parse mount options 05:30:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xffffffff00000000) [ 1279.238813][T30190] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0206000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:33 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x25, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1279.336691][T30190] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1279.412386][T30219] __nla_validate_parse: 1 callbacks suppressed [ 1279.412396][T30219] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1279.511427][T30221] batman_adv: batadv0: Adding interface: veth2079 [ 1279.527853][T30221] batman_adv: batadv0: The MTU of interface veth2079 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1279.566183][T30221] batman_adv: batadv0: Interface activated: veth2079 [ 1279.573950][T30190] BTRFS error (device loop1): open_ctree failed 05:30:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) [ 1279.646951][T30219] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1279.712249][T30226] hfsplus: unable to parse mount options [ 1279.718973][T30190] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xffffffffa0008000) [ 1279.805762][T30226] hfsplus: unable to parse mount options 05:30:34 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x26, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1279.928798][T30190] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1279.961263][T30245] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:34 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x4c00000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:30:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xffffffffa0010000) 05:30:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed020000000000003f004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1280.216294][T30190] BTRFS error (device loop1): open_ctree failed 05:30:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0207000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1280.320793][T30263] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1280.400984][T30258] hfsplus: unable to parse mount options 05:30:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:30:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0xfffffffffffff000) [ 1280.559101][T30258] hfsplus: unable to parse mount options [ 1280.597195][T30271] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:35 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x27, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1280.692705][T30271] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1280.742011][T30290] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1280.809743][T30295] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0208000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1280.866150][T30271] BTRFS error (device loop1): open_ctree failed [ 1280.884771][T30297] hfsplus: unable to parse mount options 05:30:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:30:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2c, r7, 0x1, 0x0, 0x4000, {}, [@SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r5, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r7, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x8) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1281.032992][T30271] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1281.078987][T30297] hfsplus: unable to parse mount options [ 1281.097321][T30271] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:35 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x4e00000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:30:35 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x28, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1281.206112][T30271] BTRFS error (device loop1): open_ctree failed [ 1281.208749][T30314] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:30:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000040004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1281.258347][T30317] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 1281.282800][T30317] netlink: 'syz-executor.2': attribute type 6 has an invalid length. [ 1281.293909][T30325] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1281.397912][T30330] hfsplus: unable to parse mount options [ 1281.480910][T30317] batman_adv: batadv0: Adding interface: veth2087 [ 1281.508919][T30330] hfsplus: unable to parse mount options [ 1281.546091][T30317] batman_adv: batadv0: The MTU of interface veth2087 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1281.596181][T30317] batman_adv: batadv0: Interface activated: veth2087 [ 1281.630057][T30345] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 05:30:36 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x29, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRESOCT=0x0, @ANYRES64, @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004040}, 0x0) [ 1281.687620][T30345] netlink: 'syz-executor.2': attribute type 6 has an invalid length. [ 1281.709968][T30338] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1281.826707][T30328] selinux_nlmsg_perm: 4069 callbacks suppressed [ 1281.826721][T30328] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30328 comm=syz-executor.0 [ 1281.847020][T30328] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30328 comm=syz-executor.0 [ 1281.861581][T30328] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30328 comm=syz-executor.0 [ 1281.875078][T30328] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30328 comm=syz-executor.0 [ 1281.890516][T30328] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30328 comm=syz-executor.0 [ 1281.906246][T30328] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30328 comm=syz-executor.0 [ 1281.906885][T30338] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0209000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 1281.994139][T30328] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30328 comm=syz-executor.0 [ 1282.059850][T30328] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30328 comm=syz-executor.0 05:30:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KDSETKEYCODE(r6, 0x4b4d, &(0x7f0000000140)={0x1, 0xbaa}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1282.108463][T30328] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30328 comm=syz-executor.0 [ 1282.146418][T30338] BTRFS error (device loop1): open_ctree failed [ 1282.155871][T30360] hfsplus: unable to parse mount options [ 1282.173756][T30328] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30328 comm=syz-executor.0 [ 1282.206674][T30366] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1282.225023][T30370] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:36 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x2a, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000063004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1282.433674][T30377] batman_adv: batadv0: Adding interface: veth2089 05:30:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1282.563040][T30377] batman_adv: batadv0: The MTU of interface veth2089 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1282.596322][T30377] batman_adv: batadv0: Interface activated: veth2089 [ 1282.631030][T30377] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1282.649551][T30390] hfsplus: unable to parse mount options 05:30:37 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x4f00000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1282.697268][T30389] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$bt_BT_SECURITY(r5, 0x112, 0x4, &(0x7f0000000140)={0x9}, 0x2) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x5a, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x24863, 0x80}}, 0x20}}, 0x0) [ 1282.773739][T30390] hfsplus: unable to parse mount options 05:30:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed020a000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:37 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x2b, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1282.823854][T30389] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1282.976272][T30389] BTRFS error (device loop1): open_ctree failed [ 1283.036934][T30414] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000365004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1283.153090][T30418] hfsplus: unable to parse mount options [ 1283.170549][T30417] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1283.267225][T30418] hfsplus: unable to parse mount options 05:30:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r7, &(0x7f0000000100)={0x0, 0x5d, &(0x7f00000001c0)={&(0x7f0000000400)={0x54, r8, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @multicast1}}, {0x14, 0x2, @in={0x2, 0x0, @dev}}}}]}]}, 0x54}}, 0x0) sendmsg$TIPC_NL_SOCK_GET(r6, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80040200}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xb0, r8, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x100}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x460}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8bcf}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0xd649978f5d5dba1e}, 0x40) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 05:30:37 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x2c, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1283.498407][T30437] Started in network mode [ 1283.524694][T30437] Own node identity e0000001, cluster identity 4711 [ 1283.555141][T30437] Enabling of bearer rejected, failed to enable media [ 1283.613367][T30440] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1283.614579][T30449] hfsplus: unable to parse mount options 05:30:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1283.688075][T30449] hfsplus: unable to parse mount options [ 1283.702613][T30437] batman_adv: batadv0: Adding interface: veth2093 [ 1283.718201][T30437] batman_adv: batadv0: The MTU of interface veth2093 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 05:30:38 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x2d, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed020b000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1283.769341][T30440] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1283.806150][T30437] batman_adv: batadv0: Interface activated: veth2093 [ 1283.876611][T30440] BTRFS error (device loop1): open_ctree failed 05:30:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 05:30:38 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x5000000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1284.008776][T30469] hfsplus: unable to parse mount options 05:30:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$vsock_stream(r5, &(0x7f0000000140)={0x28, 0x0, 0x2710, @hyper}, 0x10) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1284.089110][T30440] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1284.150378][T30440] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1284.188156][T30469] hfsplus: unable to parse mount options 05:30:38 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:38 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x2e, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1284.297212][T30440] BTRFS error (device loop1): open_ctree failed [ 1284.308545][T30483] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1284.391686][T30483] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000370004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1284.435861][T30497] __nla_validate_parse: 2 callbacks suppressed [ 1284.435872][T30497] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1284.561264][T30483] BTRFS error (device loop1): open_ctree failed [ 1284.627181][T30508] hfsplus: unable to parse mount options 05:30:39 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1284.714098][T30505] batman_adv: batadv0: Adding interface: veth2095 [ 1284.750374][T30505] batman_adv: batadv0: The MTU of interface veth2095 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 05:30:39 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x2f, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1284.807226][T30515] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1284.819368][T30505] batman_adv: batadv0: Interface activated: veth2095 [ 1284.875187][T30515] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0210000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1284.935904][T30530] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1284.966338][T30515] BTRFS error (device loop1): open_ctree failed 05:30:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) recvmsg(r0, &(0x7f0000000140)={&(0x7f0000000240)=@vsock, 0x80, &(0x7f0000001a40)=[{&(0x7f00000000c0)=""/23, 0x17}, {&(0x7f00000002c0)=""/134, 0x86}, {&(0x7f00000004c0)=""/137, 0x89}, {&(0x7f0000000380)=""/127, 0x7f}, {&(0x7f0000000780)=""/106, 0x6a}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/105, 0x69}, {&(0x7f0000001880)=""/144, 0x90}, {&(0x7f0000001940)=""/202, 0xca}], 0x9, &(0x7f0000001b00)=""/200, 0xc8}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(r5, 0x8927, &(0x7f0000000580)) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f00000006c0)=0xe8) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@mpls_getnetconf={0x5c, 0x52, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@NETCONFA_IFINDEX={0x8, 0x1, r6}, @NETCONFA_IFINDEX={0x8, 0x1, r6}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x1}, @NETCONFA_IFINDEX={0x8, 0x1, r7}, @NETCONFA_IFINDEX={0x8, 0x1, r6}, @NETCONFA_IFINDEX={0x8, 0x1, r6}, @NETCONFA_IFINDEX={0x1, 0x1, r6}]}, 0x5c}}, 0x0) 05:30:39 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x5100000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1285.078725][T30531] hfsplus: unable to parse mount options [ 1285.094497][T30540] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1285.155528][T30540] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:39 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1285.194944][T30515] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1285.207030][T30531] hfsplus: unable to parse mount options [ 1285.263781][T30515] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:39 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x30, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1285.326165][T30540] BTRFS error (device loop1): open_ctree failed [ 1285.347879][T30560] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000081004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1285.426471][T30515] BTRFS error (device loop1): open_ctree failed 05:30:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0223000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1285.724590][T30579] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1285.763999][T30582] hfsplus: unable to parse mount options 05:30:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0241000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1285.806848][T30579] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1285.966145][T30579] BTRFS error (device loop1): open_ctree failed [ 1286.021178][T30560] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1286.042948][T30596] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:30:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000001000250800"/20, @ANYRES32=r3, @ANYBLOB="634802000000000008000a0014000000"], 0x28}}, 0x0) 05:30:40 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x5200000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1286.168092][T30582] hfsplus: unable to parse mount options 05:30:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000ff004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x31, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1286.341365][T30614] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$EVIOCGLED(r5, 0x80404519, &(0x7f0000000240)=""/212) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd0577298111ba7d5992611a22d8e6242bdfa19c7fba81ca617f2546751977644302978dab07ba5d0bed28b540650071db9b479a318dce7150a235a925433564c837c1de6f145896e1b8286356b3c2d9851cfd09f35f6fc8079ee718bfff95081790aa6ce235df144673e2cfb23058581b9cff8f66367b106899e81eacc0c588fb25877a1774494fe439135f76db0141e3ee89079f4c813a26e6454078c55597f1c7d59aa939c6d5fce3d7e79255f2c494e709ee3a00b081ed35dba5fb024da2f77efb62d0bfbda10c17580912be70645b7dfca2256acbab58156b6ba5156832863b9c0c47581e9cfe6255e666b8ec7c8fd543c44cecffe76d9d92b413783ae4d85bf1b8dd64599cabc93dd8dcafc27dd71e3103478287dcb43fbe2f088aff2c773a07faba6df43af2094271657ae929a1b1a52803ef086b494e2d60ce3c8334759afa5511cf3efa42fcf6d222460f0d7e88f298599ff625a8b58dcfb848ef68ffd801ba698de440d6c4ab1cd812fbe00a", @ANYBLOB="72e2b16757619be3dca9a0cb97d251cc959525a2ae09aae1040ed86ced9adfedc3f15ad6790d843a26c5c7ce0c8898805f49c6feff8e4cc04a78d0696a3ca1d523ddfab7a5dd05be71dd4d9a1726398911458f22f2a517d60a9737a62f09be0710a4df84680432885d88573dd0f4f57f8012aeaa0745aadcb95bae8c3e2516c7a2fe59aacabc73708ff2b2ba2852bbcbb7cb19843d190c77e67409ce04a012d339ac6df7c49ac5607cb762c06bf972a158080b17b8bf7b545106d4c07e45fe1f79278b543a98", @ANYRES64], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 05:30:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1286.666881][T30635] hfsplus: unable to parse mount options [ 1286.744129][T30636] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1286.758207][T30635] hfsplus: unable to parse mount options 05:30:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0248000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1286.804982][T30636] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1286.836487][T30617] selinux_nlmsg_perm: 3593 callbacks suppressed 05:30:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x32, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1286.836505][T30617] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30617 comm=syz-executor.0 05:30:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000140)=0x4, 0x4) [ 1286.906201][T30617] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30617 comm=syz-executor.0 [ 1286.927525][T30617] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30617 comm=syz-executor.0 [ 1286.986282][T30617] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30617 comm=syz-executor.0 [ 1286.986456][T30636] BTRFS error (device loop1): open_ctree failed [ 1287.016251][T30617] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30617 comm=syz-executor.0 05:30:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1287.054710][T30617] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30617 comm=syz-executor.0 [ 1287.069655][T30617] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30617 comm=syz-executor.0 [ 1287.082798][T30617] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30617 comm=syz-executor.0 [ 1287.096043][T30617] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30617 comm=syz-executor.0 [ 1287.109113][T30617] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30617 comm=syz-executor.0 [ 1287.306340][T30668] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1287.340082][T30665] hfsplus: unable to parse mount options 05:30:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000002004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:41 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x5400000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1287.355071][T30671] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1287.418712][T30679] batman_adv: batadv0: Adding interface: veth2103 [ 1287.431890][T30679] batman_adv: batadv0: The MTU of interface veth2103 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1287.458712][T30679] batman_adv: batadv0: Interface activated: veth2103 05:30:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="04000000000000000000001444f5d7a62d8d332e30fec9123265792c1c279681e03f76273b6c32a893d1e11d7e1800000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="28000000100025080061a10e0600f9bd3660958a1553dc91b51866bada000000000000f538ea49639d16b4c81aea3d99fe34c0217caff77c9c040cf77f59abd7e9929e19021dd2b180eb26986b82a2f77e6d5d3d0c5921caad099579ff65e1b41d5fd82c347a9fb45a32977d292fc49dfbaa58112bef2deaf7853cc37518671d779a4c2f6f73df3ebd50d8b06bd7bd8580b455", @ANYRES32=r3, @ANYBLOB="634802000000000008000a0014000000"], 0x28}}, 0x0) [ 1287.527714][T30665] hfsplus: unable to parse mount options 05:30:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x33, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1287.666971][T30688] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1287.727913][T30701] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1287.780248][T30705] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1287.808605][T30688] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:42 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) [ 1287.926707][T30707] hfsplus: unable to parse mount options 05:30:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed024c000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1288.021821][T30712] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1288.036063][T30688] BTRFS error (device loop1): open_ctree failed 05:30:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000003004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0xffffffffffffffc8, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES16=r0, @ANYRES16=0x0], 0x5}}, 0x20051802) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 05:30:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x34, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1288.270357][T30726] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:30:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0260000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1288.570855][T30740] hfsplus: unable to parse mount options [ 1288.590586][T30741] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:43 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x5500000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:30:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x820001, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f00000004c0)={{0x5, 0x5, 0x1, 0x401, 'syz1\x00', 0x3}, 0x0, [0x3, 0xa04c, 0x80000000, 0x7, 0x80000000, 0xd78, 0x0, 0xbed, 0x8001, 0xffff, 0x30000, 0x1000, 0x200, 0x8, 0xd3, 0x268f, 0x800000000000000, 0x3ff, 0x9, 0x407, 0x3, 0x1, 0x400, 0x7, 0x1, 0x36, 0x9, 0x80000000000000, 0x10001, 0x8001, 0x4, 0x57dd, 0x4, 0x6fb7, 0x20, 0x6, 0x7, 0x8, 0x75ac, 0x5d92, 0x0, 0x5, 0x8001, 0xb04, 0x101, 0x6, 0xf69, 0x6, 0x4, 0x9, 0xc7a, 0xffffffff80000001, 0x9, 0x7f, 0x1ff, 0x4, 0x800, 0x734822a4, 0x100000000, 0xffffffffffffff7f, 0x401, 0xff, 0x3, 0x8, 0x7, 0x0, 0x5, 0x100000000, 0x8eda, 0x1ba5c235, 0x100, 0x0, 0x5, 0x200, 0xfffffffffffffffe, 0x5, 0x4, 0x8, 0x0, 0x8, 0xff, 0x2, 0x855, 0xffffffff, 0xa56, 0x7, 0x2, 0x64, 0x8, 0xffff, 0xff, 0x2, 0xcebc, 0x2, 0xd1266a4, 0x6, 0xa85, 0x5, 0x7b1, 0x4, 0x3, 0x6, 0x9, 0x6, 0xc4, 0x3, 0xfffffffffffffffe, 0x6, 0x0, 0x1, 0x678d, 0x100000001, 0x5, 0x3, 0xce, 0xfffffffffffffff7, 0x1, 0x3ff, 0x8, 0xbc4b, 0x5, 0xfffffffffffffffa, 0x6, 0x80, 0x7, 0x7, 0x20, 0x570b], {r2, r3+10000000}}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 05:30:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1288.683572][T30741] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1288.735500][T30765] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:43 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x35, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1288.836504][T30741] BTRFS error (device loop1): open_ctree failed [ 1288.866755][T30760] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1288.951186][T30767] batman_adv: batadv0: Adding interface: veth2107 [ 1288.961648][T30767] batman_adv: batadv0: The MTU of interface veth2107 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1289.017000][T30767] batman_adv: batadv0: Interface activated: veth2107 [ 1289.071862][T30760] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000005004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3c) ptrace$cont(0x18, r5, 0x0, 0x0) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r5, 0x0, 0x0) r6 = syz_open_procfs(r5, &(0x7f00000003c0)='smaps\x00') setsockopt$inet_sctp_SCTP_INITMSG(r6, 0x84, 0x2, &(0x7f00000004c0)={0xff, 0x2a22, 0x40, 0x7}, 0x8) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRESDEC, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r10, &(0x7f0000000100)={0x0, 0x5d, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00', @ANYRES16=r11, @ANYBLOB="010000000000000000000300000040000100100001007564703a73797a30000000002c0004001400010002000000e000000100000000000000001400020002000000ac1414000000000000000000"], 0x54}}, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x9247c26880bf2e1c}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r11, 0x2, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x100}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffff9}]}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x44}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xe1}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x6}, 0x40) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x70bd2b, 0x0, {0x0, 0x0, 0x0, r9, 0x24862}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="400000001400000125bd7000fbdbdf2503801cc8", @ANYRES32=r9, @ANYBLOB="08000200ac141418080008001800000008000200e0000001080004007f0000010000080000020000"], 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x0) [ 1289.217365][T30792] hfsplus: unable to parse mount options [ 1289.324643][T30792] hfsplus: unable to parse mount options [ 1289.356774][T30760] BTRFS error (device loop1): open_ctree failed 05:30:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0268000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:43 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x36, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1289.509426][T30804] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1289.571276][T30804] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_SET_VERSION(r5, 0xc0106407, &(0x7f0000000100)={0x80000001, 0x8, 0x10001, 0x7}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) accept$packet(r8, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x4a0900, 0x0) getsockname$packet(r9, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r10, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r10, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x4044) [ 1289.652938][T30816] hfsplus: unable to parse mount options [ 1289.666282][T30804] BTRFS error (device loop1): open_ctree failed [ 1289.698048][T30820] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:30:44 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x5600000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1289.813577][T30829] __nla_validate_parse: 2 callbacks suppressed [ 1289.813612][T30829] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1289.930927][T30816] hfsplus: unable to parse mount options [ 1289.948390][T30831] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:44 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x37, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xd) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0xd3525a6bf67df64f, 0x4) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRESHEX=r0, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb8911f8051404bde5bf296e3c566a10d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981fb4038b4a8985e21f4934609bb75d0146227aaa6e7d0f58ee8ae5cc46672ed0446849e50925e0149ec66138cb1947666bd4f87bbd989e06d6be751", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000800"/20, @ANYRES32=r3, @ANYBLOB="634817a3e6cf1400"], 0x28}}, 0x0) 05:30:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000006004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1290.345194][T30820] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1290.416230][T30853] hfsplus: unable to parse mount options 05:30:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYPTR=&(0x7f0000000380)=ANY=[@ANYRESDEC=r3], @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="6303482f04cda14802000000000008000a0014000000765b5c240b4539e445f632aec001f8ffffffffffffffc68c234bf3346ed96a6362b97e46f4db48719d9bc6f28e13c6773be2b0998202c47ea72b67580b5078cff802fd26a7287c3a6caa82570a3a52e2639afc34db5d7e153ea34740f53a8bf852d4856291033998d42864d1659907c56431b70d68f6bdebde68957df6cbcaa0f75a724371327f758c3355a69200c340a2e82222a1a9399b9e124be0732dc4fd0a6875da08eb80627daca6b82133ca052c13f204fde04546bea5f562704c66c56af64560c706a893e77360aec3"], 0x28}}, 0x0) r4 = dup3(r2, r1, 0x80000) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r4, 0xc0045520, &(0x7f0000000240)=0x5) [ 1290.626158][T30820] BTRFS error (device loop1): open_ctree failed 05:30:45 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x38, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1290.676735][T30862] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:45 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed026c000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1290.744320][T30862] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1290.787868][T30877] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1290.828543][T30883] hfsplus: unable to parse mount options [ 1290.866107][T30862] BTRFS error (device loop1): open_ctree failed [ 1290.875844][T30877] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x6a}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280006001000250800"/20, @ANYRES32=r3, @ANYBLOB="634802000000000008000a0014000000"], 0x28}}, 0x0) 05:30:45 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x5800000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1291.008054][T30883] hfsplus: unable to parse mount options [ 1291.014998][T30889] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1291.113834][T30905] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:45 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x39, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1291.156690][T30889] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000007004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/qat_adf_ctl\x00', 0x80, 0x0) ioctl$TIOCGPKT(r3, 0x80045438, &(0x7f0000000500)) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r12, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r7, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xe0, r8, 0x800, 0x70bd28, 0x25dfdbfe, {}, [{{0x8, 0x1, r4}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r12}, {0x44, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}]}}]}, 0xe0}, 0x1, 0x0, 0x0, 0x4000000}, 0x2004c0d4) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1291.427669][T30917] hfsplus: unable to parse mount options [ 1291.436347][T30889] BTRFS error (device loop1): open_ctree failed [ 1291.443307][T30920] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1291.544509][T30920] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1291.637590][T30933] QAT: Invalid ioctl 05:30:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:46 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3a, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0274000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1291.706525][T30920] BTRFS error (device loop1): open_ctree failed [ 1291.764440][T30937] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1291.827599][T30944] hfsplus: unable to parse mount options [ 1291.849000][T30920] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1291.957922][T30944] hfsplus: unable to parse mount options [ 1291.973336][T30920] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1291.988105][T30945] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:46 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3b, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1292.056424][T30920] BTRFS error (device loop1): open_ctree failed [ 1292.090846][T30948] batman_adv: batadv0: Adding interface: veth2117 [ 1292.098398][T30950] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1292.107422][T30948] batman_adv: batadv0: The MTU of interface veth2117 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1292.179366][T30948] batman_adv: batadv0: Interface activated: veth2117 [ 1292.200600][T30950] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000009004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1292.237331][T30913] selinux_nlmsg_perm: 4565 callbacks suppressed [ 1292.237347][T30913] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30913 comm=syz-executor.0 [ 1292.242895][T30933] QAT: Invalid ioctl [ 1292.243996][T30913] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30913 comm=syz-executor.0 [ 1292.305533][T30913] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30913 comm=syz-executor.0 [ 1292.325043][T30913] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30913 comm=syz-executor.0 [ 1292.339495][T30945] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1292.352559][T30913] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30913 comm=syz-executor.0 [ 1292.365747][T30913] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30913 comm=syz-executor.0 [ 1292.376591][T30933] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1292.379143][T30913] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30913 comm=syz-executor.0 [ 1292.404437][T30913] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30913 comm=syz-executor.0 [ 1292.429531][T30913] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30913 comm=syz-executor.0 [ 1292.446082][T30950] BTRFS error (device loop1): open_ctree failed [ 1292.461026][T30968] hfsplus: unable to parse mount options [ 1292.467850][T30972] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1292.471059][T30913] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30913 comm=syz-executor.0 05:30:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) r2 = syz_open_dev$vivid(&(0x7f0000000340)='/\x06\x00v-\xfa\xf4\x93q\x99\x04\t', 0x3, 0x2) ioctl$VIDIOC_ENUMINPUT(r2, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) fcntl$setown(r1, 0x8, r3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) r6 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r6, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r6, 0x0, 0x29, &(0x7f0000000140)={@multicast2, @loopback, 0x1}, 0x10) umount2(&(0x7f00000003c0)='./file0\x00', 0x8) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r6, 0x84, 0xc, &(0x7f0000000300), &(0x7f0000000380)=0x4) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x800, 0x0) ioctl$VHOST_SET_VRING_ERR(r8, 0x4008af22, &(0x7f0000000280)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x3c2, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="3400000010002500000300000000000000000000167aa22bf494192b53fc6ff2d4c11b5033800bb0fff154c252f20221411a6027b72610c8979e8ff8300aa1d3a22a20b2fd0d23aef4142c8c99f42b", @ANYRES32=r7, @ANYBLOB="634802004002007d9d6070001400830064656873696d30000000003d782998000000"], 0x3286b7e8843776b0}, 0x1, 0x0, 0x0, 0x4040802}, 0x0) 05:30:47 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x5900000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1292.612615][T30972] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1292.654123][T30987] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1292.677182][T30968] hfsplus: unable to parse mount options 05:30:47 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed027a000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1292.756169][T30972] BTRFS error (device loop1): open_ctree failed 05:30:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3c, 'cp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1292.966459][T30972] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:47 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @multicast2, @remote}, 0xc) r3 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r3, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) ioctl$FIGETBSZ(r3, 0x2, &(0x7f00000003c0)) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/create\x00', 0x2, 0x0) r4 = socket$netlink(0x10, 0x3, 0xdbbd6255bf635be) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r9 = socket$inet6(0xa, 0x80000, 0x0) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$TIOCGSID(r10, 0x5429, &(0x7f00000004c0)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000540)={{0x9, 0x5, 0x4, 0x3, 'syz1\x00', 0x20}, 0x1, 0x10000000, 0xfffffffa, r11, 0x5, 0x5e1d0d1a, 'syz0\x00', &(0x7f0000000500)=['/*em0!lo\x00', '\x00', '/selinux/create\x00', '\x00', 'md5sum+&\x00'], 0x24, [], [0xd17, 0x1, 0x5, 0x200]}) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001065aebca680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'U-', 0x10000}, 0x28, 0x2) r12 = socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(r12, 0x801c581f, &(0x7f0000000280)={0x8, 0x1, 0x1, 0x5, 0x5}) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1293.044903][T31015] hfsplus: unable to parse mount options [ 1293.074225][T30972] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:47 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed029f000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1293.206728][T30972] BTRFS error (device loop1): open_ctree failed [ 1293.217477][T31015] hfsplus: unable to parse mount options 05:30:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/sequencer\x00', 0x1, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000001ac0)=0xffffaeae, 0x4) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000507000000000042e6001f00b36499530e3cdb8cac91a490972fc2d14df6c80688cafa793e3faf6ba0c95ff2efd3aa347f42f7daf52bd15639319afb367f2dadffe0fb58f207adeba87f502a8763a05529d742dfe6251365cd904483cbcc66d5134b7c28dad3bcc1f846722c2545b807fb46e091359ffe6108", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100400"/19, @ANYRES32=r3, @ANYBLOB="634802000000000008000a0014000000"], 0x28}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x2, &(0x7f0000000980)="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", 0x1000) r6 = fcntl$dupfd(r5, 0x0, r4) syz_mount_image$nfs4(&(0x7f0000000140)='nfs4\x00', &(0x7f0000000340)='./file0\x00', 0x8, 0x8, &(0x7f0000000880)=[{&(0x7f0000000380)="64372670ca83ee774d28ad22e4c5d229268227c0083f4702cdd1b4f008fc3cb0ee4dde86278c8f8d318e6a", 0x2b, 0x3b1}, {&(0x7f00000003c0)="b5ab9ee6f27c5110c8ca5dd0ee038fc79676b0c735b98835d4716262f92f00fd7bc158c20fcd8acc6fbfeaabff8390d41d63774727d8e8b17eacbbd49896a97c53a6db370cc271f46f03091a34a27b62", 0x50, 0x1}, {&(0x7f0000000440)="c4064bc18fe037a4d2a7948761136c29082650455ca708b5dc3e178ce730ea0221cfd034b20b47f5937f509c337363b56c54d94b966bed89fa56dc5bc9f40086172c16a870edcd1337bcb2c1a9d24ea16da22aa21e9adde863083d4f93334eb39e0254e701aba0d0f4f454fc216a95c9f816e0b420b165e3ca4eddc227b48a6377a1e71149591950020f5596da7dd5e53e39e969d092780d83bee98e32f98c49900010fe2c8d75e0a379af40b4e8c9e797532df3d8680f32f02762d79e47488525a6be30bca5267216e209f42baca93efa3fda53e9a23b3f5b9e06b6809d60", 0xdf, 0x2}, {&(0x7f0000000540)="018abd9a5e34d9fec6ef16f306af35fea230f83e8f71644d1fd86eed71bc891e212503453deb6a7a1083118063baf9126491893e53b8878cf74a3e4b042b87b909d249a2550a5d3760bb1cefb88d60ffb7a31767c319935d1cdcb505361c2e9453b0be3de9831d18766328fe8f68fa2fdf5d1455e0666bef49c95e6f6e6c902e8b5eb8b047c2922475bd9b981f", 0x8d, 0x6}, {&(0x7f0000000600)="22341d1705c1da41f17f8e54fa0d6825f73cb8d29cf73da9fb69b971bd7c4f2b95783ff27f4381b1688efa0fae2035721e87aad874151f6397a84d76d81b8119590e855eef92d79ebc891a19226a31962951413652500dc4d22367e315f1f60459561dd8cf8d03cd6800d61163447ea2a1d388358d6908c4a9ec75111429174d2890c34462a375c68c198183c5f2e6a3dc7664e19f2fa1384b42a28caee9bb79f6052024ef45", 0xa6, 0xffffffffffffffff}, {&(0x7f00000006c0)="0c4a9615c85417c4bafe35b0ee3b1e341c1b1b328e9b0244dbc8988a9dcdc5abe7fa8cf54aabf411887a6d423231e45c0131282957b3452ff5948bed4fa51062d61fe619c3b4ec9b4ac503f74027ee8d6e2db84cbb2bfcb16c84f71f68e36ac60a98", 0x62, 0x4}, {&(0x7f0000000740)="b48d87ea7cdef4644581c131b858b42354526c568784", 0x2ac, 0xfffffffffffffe01}, {&(0x7f0000000780)="ac538729d8f7112872c2b1baf98b1317734b9953ed46cd0fd5167a781b27e7a9b853dc3a7ffdecb90f585106cc99c9f1f5d61b7c813317004c9b33d3f2be0dc7ed3738934e1ee6036831d3cd147f1d6918c3d679eaf1b8a2c68ddc788c2bfaf7a2b9658291b6b619487a7abead66c4d65f6807e7c9ffc4cbc46e22b2c962ea8531d7cc68ef676d01120117b228609fbdb925683ef0c6dccf7b50f430548a1938e178cd883ffebeea776bf142698462fffa2ef6615456e7a23e1d9290683657b0584f8400b43699a129d76ea6bbff2ae64fb5bc84a127a63059957b654f89188e22892e3b9678", 0xe6, 0x1}], 0x0, &(0x7f0000000940)='vmnet1\'%\x00') ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PPPOEIOCDFWD(r6, 0xb101, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$inet6_mreq(r9, 0x29, 0x0, &(0x7f0000001b00)={@mcast1}, 0x14) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000001980)={0x0, 0x800}, &(0x7f00000019c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001a00)={r10, 0x9, 0x3, 0x8}, &(0x7f0000001a40)=0x10) 05:30:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed020000000000000a004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, '\np850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1293.530708][T31036] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1293.611865][T31040] NFS: bad mount option value specified: vmnet1'% [ 1293.660073][T31055] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1293.688994][T31036] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1293.697832][T31051] hfsplus: unable to load nls mapping " [ 1293.697832][T31051] p850" 05:30:48 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x5a00000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1293.709722][T31051] hfsplus: unable to parse mount options [ 1293.770570][T31055] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f0000000240)=""/166) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1293.948817][T31051] hfsplus: unable to load nls mapping " [ 1293.948817][T31051] p850" [ 1293.966661][T31036] BTRFS error (device loop1): open_ctree failed [ 1293.976254][T31051] hfsplus: unable to parse mount options 05:30:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:48 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, '\"p850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1294.016159][T31055] BTRFS error (device loop1): open_ctree failed [ 1294.230139][T31055] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1294.279590][T31085] hfsplus: unable to load nls mapping ""p850" [ 1294.297192][T31085] hfsplus: unable to parse mount options [ 1294.313006][T31082] batman_adv: batadv0: Adding interface: veth2121 [ 1294.334770][T31082] batman_adv: batadv0: The MTU of interface veth2121 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1294.366301][T31082] batman_adv: batadv0: Interface activated: veth2121 05:30:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02a0010000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1294.395785][T31055] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES16, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 05:30:49 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, '#p850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1294.576673][T31055] BTRFS error (device loop1): open_ctree failed [ 1294.583841][T31100] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:30:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed020000000000000b004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1294.743976][T31100] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:49 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x408042, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000002c0)={0x3ff, 0x8000, 0x5, 0x8}, 0x8) getpeername$tipc(r0, &(0x7f0000000380)=@id, &(0x7f00000003c0)=0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x8c7b04aa70c3ecc4, 0x0) ioctl$USBDEVFS_GET_CAPABILITIES(r3, 0x8004551a, &(0x7f0000000240)) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) fanotify_init(0x8, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$bt_l2cap_L2CAP_CONNINFO(r8, 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000340)=0x6) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800f5ff1000250800000000000000001f000010d50f9ac2478acc03aa034f10560100bd92", @ANYRES32=r5, @ANYBLOB="634802000000000008000a0014000000"], 0x28}}, 0x0) 05:30:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1294.827649][T31118] hfsplus: unable to load nls mapping "#p850" [ 1294.856697][T31118] hfsplus: unable to parse mount options 05:30:49 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x5c00000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1294.946322][T31100] BTRFS error (device loop1): open_ctree failed [ 1294.959816][T31127] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1294.976121][T31132] __nla_validate_parse: 3 callbacks suppressed [ 1294.976131][T31132] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1295.024865][T31118] hfsplus: unable to load nls mapping "#p850" [ 1295.037786][T31118] hfsplus: unable to parse mount options 05:30:49 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, '%p850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1295.116415][T31127] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200030000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1295.251977][T31141] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1295.266984][T31127] BTRFS error (device loop1): open_ctree failed [ 1295.382606][T31156] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1295.392492][T31150] hfsplus: unable to load nls mapping "%p850" [ 1295.405799][T31150] hfsplus: unable to parse mount options [ 1295.520230][T31156] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed020000000000000f004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1295.570674][T31150] hfsplus: unable to load nls mapping "%p850" 05:30:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="190000001000250800"/20, @ANYRES32=r3, @ANYBLOB="634802000000000008000a0014000000"], 0x28}}, 0x0) 05:30:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1295.618409][T31150] hfsplus: unable to parse mount options 05:30:50 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, '*p850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1295.686065][T31156] BTRFS error (device loop1): open_ctree failed [ 1295.720682][T31176] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1295.927626][T31183] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200050000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sysfs$3(0x3) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1296.033300][T31193] hfsplus: unable to load nls mapping "*p850" [ 1296.045258][T31193] hfsplus: unable to parse mount options 05:30:50 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x5e00000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1296.088479][T31183] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1296.176249][T31183] BTRFS error (device loop1): open_ctree failed [ 1296.193841][T31193] hfsplus: unable to load nls mapping "*p850" [ 1296.212393][T31193] hfsplus: unable to parse mount options [ 1296.237857][T31214] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1296.269287][T31206] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:30:50 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, '+p850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1296.355626][T31221] batman_adv: batadv0: Adding interface: veth2129 [ 1296.364645][T31221] batman_adv: batadv0: The MTU of interface veth2129 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1296.401059][T31221] batman_adv: batadv0: Interface activated: veth2129 [ 1296.420389][T31221] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700000000000000009d000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1296.596386][T31183] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1296.671524][T31230] hfsplus: unable to load nls mapping "+p850" [ 1296.683140][T31230] hfsplus: unable to parse mount options [ 1296.697328][T31240] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1296.777161][T31183] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1296.831107][T31248] batman_adv: batadv0: Adding interface: veth2131 [ 1296.840751][T31248] batman_adv: batadv0: The MTU of interface veth2131 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1296.866546][T31248] batman_adv: batadv0: Interface activated: veth2131 [ 1296.896249][T31240] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000bc0)='/dev/swradio#\x00', 0x1, 0x2) r3 = socket(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c7465720200000000000000000000000000000400000000000000000000040000005c59ef4f"], &(0x7f0000000000)=0x2c) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000c00)=@assoc_id=0x0, &(0x7f0000000c40)=0x4) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000c80)={r4, 0xc00}, &(0x7f0000000cc0)=0x8) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r7, 0x4008ae93, &(0x7f0000000000)=0x2) syz_open_dev$mouse(&(0x7f00000006c0)='/dev/input/mouse#\x00', 0x8, 0x28000) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x62160554]}) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r7, 0x4400ae8f, &(0x7f0000000780)={"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"}) ioctl$KVM_RUN(r7, 0xae80, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x20002, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r10 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r10, 0x0, r9) r11 = accept(r10, 0x0, &(0x7f0000000240)) r12 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r11, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x46040000}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)={0x68, r12, 0x900, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0xff, @media='udp\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x2000050}, 0x4) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r13, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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", @ANYRES32=r13, @ANYBLOB="634802000000000008000a0014000000"], 0x28}}, 0x0) [ 1297.136245][T31183] BTRFS error (device loop1): open_ctree failed 05:30:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000010004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200060000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:51 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, ',p850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1297.267784][T31263] hfsplus: unable to parse mount options 05:30:51 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x6000000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1297.377535][T31258] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1297.402411][T31263] hfsplus: unable to parse mount options [ 1297.407225][T31266] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1297.430100][T31265] selinux_nlmsg_perm: 5056 callbacks suppressed [ 1297.430114][T31265] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9 sclass=netlink_route_socket pig=31265 comm=syz-executor.2 05:30:52 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, '-p850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1297.557968][T31266] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1297.657437][T31286] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31286 comm=syz-executor.0 [ 1297.671244][T31278] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1297.737394][T31286] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31286 comm=syz-executor.0 [ 1297.753070][T31278] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1297.779772][T31265] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1297.793883][T31293] hfsplus: unable to load nls mapping "-p850" [ 1297.799610][T31286] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31286 comm=syz-executor.0 [ 1297.804828][T31293] hfsplus: unable to parse mount options [ 1297.825269][T31297] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9 sclass=netlink_route_socket pig=31297 comm=syz-executor.2 [ 1297.867549][T31286] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31286 comm=syz-executor.0 [ 1297.876199][T31266] BTRFS error (device loop1): open_ctree failed [ 1297.914113][T31286] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31286 comm=syz-executor.0 05:30:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x101, 0x101000) ioctl$PPPIOCGL2TPSTATS(r4, 0x80487436, &(0x7f0000000240)="41a613238818cd2d4fbfef961ed435f5313d536378415085702cd463ad0462f68c13f5693a82902ce52c1172efd1e09aaf5bb8c34db9cecbf2f5ab2963820670bea207d3702eee182cbaa36b10db95580a3dd8c481a6111602d809183dbcb9c43c95b75252e7a84157efe4f5aead82769c2cd59f3d6d54ea2808a84244a71c56e5a7c5fe0555d3359c159b3618e7da21e6687a23014a6c366787e644d5e5f0477693020fb9079b59f98785dedfeb217c0c05125be4622570037f4accb87c42a96fe7e3335cba1e865da50692038d5c715fa4eaccedfa72ac6fe3082722fc30d3fca5e7b5b2ed973153c31a8c0fbd16c5") sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1297.960832][T31286] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31286 comm=syz-executor.0 [ 1297.976168][T31278] BTRFS error (device loop1): open_ctree failed [ 1297.993126][T31286] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31286 comm=syz-executor.0 05:30:52 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, '.p850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1298.034956][T31286] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31286 comm=syz-executor.0 [ 1298.074125][T31266] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1298.133938][T31309] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200070000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1298.284198][T31314] hfsplus: unable to load nls mapping ".p850" [ 1298.291838][T31278] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1298.304693][T31314] hfsplus: unable to parse mount options [ 1298.385651][T31318] batman_adv: batadv0: Adding interface: veth2135 [ 1298.412485][T31278] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1298.429358][T31318] batman_adv: batadv0: The MTU of interface veth2135 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1298.457104][T31318] batman_adv: batadv0: Interface activated: veth2135 05:30:53 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x6400000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1298.647118][T31278] BTRFS error (device loop1): open_ctree failed [ 1298.707359][T31337] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:30:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000014004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:53 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, '0p850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x10000, 0x0) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000240)=0x2) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1298.853941][T31337] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1298.925163][T31352] hfsplus: unable to load nls mapping "0p850" [ 1298.933411][T31352] hfsplus: unable to parse mount options [ 1298.988399][T31360] batman_adv: batadv0: Adding interface: veth2139 [ 1298.996377][T31360] batman_adv: batadv0: The MTU of interface veth2139 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1299.026100][T31360] batman_adv: batadv0: Interface activated: veth2139 [ 1299.086362][T31337] BTRFS error (device loop1): open_ctree failed 05:30:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1299.131159][T31364] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1299.169675][T31352] hfsplus: unable to load nls mapping "0p850" 05:30:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4a004) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1299.178717][T31352] hfsplus: unable to parse mount options 05:30:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200090000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1299.265273][T31364] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:53 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'Xp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1299.546303][T31364] BTRFS error (device loop1): open_ctree failed 05:30:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000025004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1299.681933][T31392] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:30:54 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x6500000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1299.825297][T31398] hfsplus: unable to load nls mapping "Xp850" [ 1299.836294][T31398] hfsplus: unable to parse mount options 05:30:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r5 = socket$inet(0x2, 0x2, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x2, 0x400000) ioctl$EVIOCSKEYCODE(r6, 0x40084504, &(0x7f0000000440)=[0x8378, 0x3]) setsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r5, 0x0, 0x29, &(0x7f0000000140)={@multicast2, @loopback, 0x1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f00000004c0)=""/4096, &(0x7f00000003c0)=0x1000) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r4) rt_sigpending(&(0x7f0000000480), 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000000340)={0x3, 0x0, [{0x5000, 0x22, &(0x7f0000000140)=""/34}, {0x10000, 0x76, &(0x7f0000000240)=""/118}, {0x5000, 0x7e, &(0x7f00000002c0)=""/126}]}) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000014c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) r9 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r9, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) r10 = dup(r9) ioctl$UI_SET_SWBIT(r10, 0x4004556d, 0x5) r11 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r11, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) dup2(0xffffffffffffffff, r11) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000015c0)=ANY=[@ANYBLOB="2800000010997e3de000381b2fc99853c250446fe696235f0edbc9ef79ec3310ada921511cc43f338a38e9afa58d70ccb45c627acf38df0b71a0efc5fb188ed0dcc886b161a3f25b8801242f6b2ed69bdbe9261749f26a", @ANYRES32=r3, @ANYBLOB="634802000000000008000a0014000000"], 0x28}}, 0x0) [ 1299.967960][T31406] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1300.027980][T31398] hfsplus: unable to load nls mapping "Xp850" [ 1300.038248][T31398] hfsplus: unable to parse mount options 05:30:54 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'dp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1300.075713][T31406] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1300.093842][T31422] IPVS: length: 4096 != 8 05:30:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1300.227519][T31406] BTRFS error (device loop1): open_ctree failed 05:30:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1300.466244][T31406] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0xa, 0x2, 0x73) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) bind(r2, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @local}, 0x80) r3 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$selinux_create(r6, &(0x7f0000000240)=@access={'system_u:object_r:passwd_exec_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x1ff}, 0x5d) r7 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$VIDIOC_G_FMT(r7, 0xc0d05604, &(0x7f00000002c0)={0xa, @sdr={0x3432564e, 0x1}}) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r8, @ANYBLOB="63481900e530ed145e7618950900f4dd7ad04ebf26c4c7d495d19517c380f705a929b8a6c97371252f34b4168d3451a1bbaa917ab808dbe047b61240e0dc60b2bcaf56c7e3303fe033ec76c04471f76643b578451d31008f8dd7"], 0x28}}, 0x0) [ 1300.546105][T31439] hfsplus: unable to load nls mapping "dp850" [ 1300.562364][T31439] hfsplus: unable to parse mount options [ 1300.581803][T31406] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1300.766162][T31406] BTRFS error (device loop1): open_ctree failed [ 1300.822240][T31439] hfsplus: unable to load nls mapping "dp850" 05:30:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed020000000000003c004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1300.863663][T31461] __nla_validate_parse: 3 callbacks suppressed [ 1300.863673][T31461] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1300.879659][T31439] hfsplus: unable to parse mount options 05:30:55 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'ip850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1300.966756][T31473] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:55 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x6600000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:30:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000b0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1301.056489][T31476] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000140)) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 05:30:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1301.326216][T31486] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1301.379330][T31495] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1301.432350][T31494] hfsplus: unable to load nls mapping "ip850" [ 1301.441166][T31494] hfsplus: unable to parse mount options [ 1301.478591][T31486] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1301.596491][T31486] BTRFS error (device loop1): open_ctree failed [ 1301.610545][T31494] hfsplus: unable to load nls mapping "ip850" [ 1301.627308][T31494] hfsplus: unable to parse mount options [ 1301.634365][T31504] batman_adv: batadv0: Adding interface: veth2145 [ 1301.647294][T31498] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1301.657667][T31504] batman_adv: batadv0: The MTU of interface veth2145 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 05:30:56 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'lp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1301.728815][T31504] batman_adv: batadv0: Interface activated: veth2145 [ 1301.780173][T31504] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000063004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x1) fanotify_init(0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) setsockopt$inet_sctp_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0xffffff15) rt_sigaction(0x19, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x8000, 0x0, 0x4}, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = gettid() tkill(r3, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000300)={{0x8001, 0x0, 0x0, 0x0, r2, 0x80, 0x7}, 0x9, 0x0, 0xe4, 0x0, 0x0, 0x0, 0x6}) shmctl$SHM_STAT(0x0, 0xd, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000280)=ANY=[@ANYRES32=0x0], 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_PRIMARY_RESELECT={0x8}]}}}]}, 0x3c}}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, 0x0) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x2000, 0x0) ioctl$RTC_WIE_OFF(r5, 0x7010) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 05:30:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0220100000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1302.085230][T31529] hfsplus: unable to load nls mapping "lp850" [ 1302.121911][T31529] hfsplus: unable to parse mount options [ 1302.129288][T31537] netlink: 'syz-executor.2': attribute type 12 has an invalid length. 05:30:56 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x6800000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:30:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1302.224682][T31541] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1302.312668][T31529] hfsplus: unable to load nls mapping "lp850" [ 1302.331974][T31541] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1302.354737][T31529] hfsplus: unable to parse mount options [ 1302.495789][T31550] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:57 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'op850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1302.546264][T31541] BTRFS error (device loop1): open_ctree failed [ 1302.619430][T31563] selinux_nlmsg_perm: 4352 callbacks suppressed [ 1302.619447][T31563] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31563 comm=syz-executor.0 [ 1302.676221][T31563] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31563 comm=syz-executor.0 [ 1302.693760][T31563] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31563 comm=syz-executor.0 [ 1302.694957][T31550] netlink: 'syz-executor.2': attribute type 12 has an invalid length. [ 1302.715536][T31563] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31563 comm=syz-executor.0 [ 1302.715653][T31563] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31563 comm=syz-executor.0 [ 1302.743020][T31563] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31563 comm=syz-executor.0 [ 1302.768739][T31563] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31563 comm=syz-executor.0 [ 1302.782275][T31563] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31563 comm=syz-executor.0 [ 1302.795608][T31563] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31563 comm=syz-executor.0 [ 1302.811667][T31563] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31563 comm=syz-executor.0 [ 1302.817289][T31551] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:30:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000065034d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1303.004484][T31551] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000507000000000000000000000000d29d917369bf04cddf3e9134477ba111af982df2d4c8df9502706774bb455f8dfdc61eb0926d222ae2c1e2df4f5b245653743fcc469f2933771e3268edf91fcb", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1303.070100][T31579] hfsplus: unable to load nls mapping "op850" [ 1303.098613][T31579] hfsplus: unable to parse mount options 05:30:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000070034d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1303.158075][T31551] BTRFS error (device loop1): open_ctree failed [ 1303.187666][T31597] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200200000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1303.253740][T31579] hfsplus: unable to load nls mapping "op850" [ 1303.270140][T31579] hfsplus: unable to parse mount options 05:30:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1303.313409][T31606] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:57 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x6900000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:30:57 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'pp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x70bd28, 0x0, {0x0, 0x0, 0x0, r3, 0x64861}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1303.597472][T31609] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1303.636952][T31629] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:30:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1303.691225][T31609] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1303.756514][T31627] hfsplus: unable to load nls mapping "pp850" [ 1303.762856][T31627] hfsplus: unable to parse mount options [ 1303.875459][T31637] batman_adv: batadv0: Adding interface: veth2149 [ 1303.887926][T31627] hfsplus: unable to load nls mapping "pp850" [ 1303.902544][T31627] hfsplus: unable to parse mount options [ 1303.916558][T31609] BTRFS error (device loop1): open_ctree failed [ 1303.933350][T31637] batman_adv: batadv0: The MTU of interface veth2149 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1303.966034][T31637] batman_adv: batadv0: Interface activated: veth2149 [ 1303.973572][T31631] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:30:58 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'sp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:30:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 05:30:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0210200000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000000ff4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1304.339523][T31658] hfsplus: unable to load nls mapping "sp850" [ 1304.345738][T31658] hfsplus: unable to parse mount options 05:30:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB='H\x00\x00\x000\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="28000000100025080000000000000000000000002ac4fb4faa241c23f3e5e653510eb0520576e33e613699e5df98f270ab30c686f537e3209010c6bca71fcea5d60f56b36c54449b05bb106ec4fb8167a9025b55a1e78b21814843a6782911d53d87d988031ec0ca73002367ce8a8b4abba751c23db5f19620070000000000000017adbefc27b772b72606282cc268708847940c85be7cd526c2e1d333cf1652e5191d10632389575eddbd05ca76586329277f53ad7f60b7cd2e4e21031ba8ea4342573a3553a5502e7d8be8015e0efe33ae65343dd315bea225be679a6aec38d5bcb8f90f458bc8da83d4b7271c9acb5cc12e0dc5b0419a3803564ac204e25bf4ff8788b12ea6d3c18bf370e3611ca42776318dbefc6a3bb4b1b66136c523a11c3e7e09473798e5256f8a58372829b2090b8616ac79460ea86347a2fe1a6718ba10f233a49e67017fb35ef2f10a", @ANYRES32=r3, @ANYBLOB="634802000000000008000a0014000000"], 0x28}}, 0x0) [ 1304.447542][T31673] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:59 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x6a00000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1304.522993][T31658] hfsplus: unable to load nls mapping "sp850" [ 1304.531613][T31658] hfsplus: unable to parse mount options [ 1304.586323][T31689] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1304.627022][T31673] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r4, 0x8919, &(0x7f00000003c0)={'gretap0\x00', {0x2, 0x4e22, @remote}}) r6 = fcntl$dupfd(r5, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$bt_BT_SNDMTU(r6, 0x112, 0xc, &(0x7f0000000140)=0x9fc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$KVM_ENABLE_CAP_CPU(r6, 0x4068aea3, &(0x7f0000000340)={0x7b, 0x0, [0x5, 0x1, 0x7, 0x9]}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c56a2ee376bf7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00791508f0ffffff"], 0x48}}, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) sendto(r8, &(0x7f0000000280)="266d381e4311753da829f53a06c34ee0a8d9ff88e22c4f91072143a0f0d003cbf1d02e2b061a", 0x26, 0x4004000, &(0x7f00000002c0)=@xdp={0x2c, 0x2e1247e153a5ea1a, r7, 0x18}, 0x80) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800000000803f1c984288", @ANYRES32=r7, @ANYBLOB="634802000000000008000a0014000000"], 0x28}}, 0x0) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@empty}}, &(0x7f00000006c0)=0xe8) syz_mount_image$reiserfs(&(0x7f00000004c0)='reiserfs\x00', &(0x7f0000000500)='./file0\x00', 0x1, 0x1, &(0x7f0000000580)=[{&(0x7f0000000540), 0x0, 0x9}], 0x800, &(0x7f0000000700)={[{@nolargeio='nolargeio'}], [{@euid_lt={'euid<', r10}}, {@seclabel='seclabel'}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<', r11}}, {@appraise_type='appraise_type=imasig'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fsname={'fsname', 0x3d, 'gretap0\x00'}}, {@appraise='appraise'}]}) [ 1304.736141][T31673] BTRFS error (device loop1): open_ctree failed 05:30:59 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'up850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1304.776958][T31675] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1304.896278][T31675] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001024d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:30:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1305.107891][T31713] hfsplus: unable to load nls mapping "up850" [ 1305.114112][T31713] hfsplus: unable to parse mount options [ 1305.126416][T31675] BTRFS error (device loop1): open_ctree failed 05:30:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200230000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1305.268205][T31713] hfsplus: unable to load nls mapping "up850" [ 1305.274370][T31713] hfsplus: unable to parse mount options [ 1305.296800][T31728] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:30:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000004d40)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000004e00)={&(0x7f0000004d00)={0x10, 0x0, 0x0, 0x800020}, 0xc, &(0x7f0000004dc0)={&(0x7f0000004d80)={0x1c, r5, 0x10, 0x70bd29, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2359dae0e9c254cd}, 0xa080) r6 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SIOCX25GCALLUSERDATA(r6, 0x89e4, &(0x7f0000000240)={0x11, "e3c00d8536f75dce8df9e614016884c3de6f1013519c8482311a42627e570a78baceca486556b0917fee6bbc97c49791fef60c658d32e2f5e1504307ddf8e9503b0cd0373080d8753011d7f766ef728e1a37456f90095f175aab286f66071eb1380b6b13fcce01f92c1ea232a7d8811137739c613fc55525c33d9a82caa2407d"}) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x1) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r8 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r8, 0xc050561a, &(0x7f0000000040)={0xffffffe1, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af", 0x1, 0x5af}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x182, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="00000041b2000000280000000000010076657468006103c491d8120dd56eb49638e2c9f234ba5524f1c8a97edc6a40d600000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9007b4409f6e370", @ANYRES32=0x0, @ANYRES16], 0x5}, 0x1, 0x0, 0x0, 0x20000840}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRES32=r7, @ANYBLOB="634802000000000008000a0014000000"], 0x28}}, 0x0) [ 1305.320098][T31728] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:30:59 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'xp850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1305.476341][T31728] BTRFS error (device loop1): open_ctree failed [ 1305.556859][ T26] audit: type=1400 audit(1572154260.056:128): avc: denied { write } for pid=31739 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_scsitransport_socket permissive=1 05:31:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f0000000180)=0x4) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000100)={r5, 0x1a}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000300)={r5, 0x4}, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x8, 0xffff, 0x200, 0x7000, 0x4bc, 0x0, 0x80, {r5, @in={{0x2, 0x4e24, @multicast1}}, 0x6, 0x3, 0x4, 0x7, 0xc0}}, &(0x7f00000000c0)=0xb0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000500)={r6, 0x96, "5a3c114105a9ecd548b4d4c039898b3b1ac26e65a805e7b753366806d0a9fe5ce401861e443382b257ab4d4ca7b9ba3e0652be9b31b374143f387c8dee3d8541ba291e36e8b6a19df5b4fea8b007c822b535acccfa793624a2dce38bedcd589ac9b268dbede031f22aa21cdcb1d6257a72c6f5335fe780a82948449b820d3ceae7c100609ae39637a005adf616503fec72ec5a989625"}, &(0x7f00000005c0)=0x9e) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r11 = socket$inet6(0xa, 0x2, 0x0) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) setsockopt$inet6_opts(r12, 0x29, 0x3b, &(0x7f0000000600)=@hopopts={0x2, 0x4, [], [@jumbo={0xc2, 0x4, 0xc4d}, @calipso={0x7, 0x18, {0xfffffff7, 0x4, 0x1, 0x6, [0x8, 0x3]}}]}, 0x28) ioctl$BLKROGET(r9, 0x125e, &(0x7f0000000280)) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050900000000000000000000000034b483f45178d4c9ba1287c6243ddf75cff896cb35d29532203d4c22387554ca00bc8a73400f2585f50fc9c635fe00a6efe0dad651e80bedd15ae2ce3771d920560ec6774c8f7f69038befe63ca0a7aef3907fe02861c7c4b0fe6c0f73bf6ae1d74bd312bcb4bb76ee37e77adf695c5a6b2a69d98f1b5106a486d78a28187b90d1bd51b5ea3fab2c6775ebde346613e6a6424dd915dcd2ac50f404eb0beaf10812c480e655b2714c481f", @ANYRES32=r13, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r13, 0x24863}, [@IFLA_WEIGHT={0x8, 0xf, 0x7}]}, 0x28}}, 0x0) [ 1305.665479][T31746] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:31:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 1305.728293][T31728] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:31:00 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x6c00000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1305.769433][T31728] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1305.789501][T31746] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1305.805392][T31751] hfsplus: unable to load nls mapping "xp850" [ 1305.813230][T31751] hfsplus: unable to parse mount options [ 1305.902499][T31758] __nla_validate_parse: 3 callbacks suppressed [ 1305.902509][T31758] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1305.926181][T31746] BTRFS error (device loop1): open_ctree failed [ 1305.929011][T31768] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1306.006266][T31728] BTRFS error (device loop1): open_ctree failed 05:31:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x28800, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$UI_SET_SWBIT(r9, 0x4004556d, 0x1) ioctl$IMHOLD_L1(r9, 0x80044948, &(0x7f0000000280)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r6) r10 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r10, 0x0, 0x48c, &(0x7f00000003c0)={0x0, 'vxcan1\x00', 0x4}, 0x18) 05:31:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001034d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1306.134999][T31751] hfsplus: unable to load nls mapping "xp850" [ 1306.154727][T31751] hfsplus: unable to parse mount options [ 1306.197636][T31746] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:31:00 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'c\n850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:31:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) readlinkat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)=""/7, 0x7) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) r4 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r4, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f0000000280)="0c23e78dd20c146354ea51186fdf09328ad56b768ee732565dd4f51af018a55c8cdbc582cc88baa5b29fa4f3569803d6ba132808bea6000bffd61fa4518d8a6b125d96969c8ce297bf5bd8cc5f589fffb9a56db00c734a17c33683c0f00dbf1542417595c1560a126cc6402b827f4522a7113f10f5c53ac8194f8790bb1024fc7ad6cf1fbd02d5bb1a32bae5a2e0658822035bf87552201e07fd2a0379961da2634677bec4f6f23633cfb2489b37e5aad6bd356bb8fa03d2ce4e9999898b9b1c3cfacb1302f5de19a5ef7ecaf4a65199010fc0f25c067af9d7339065ec3aa92076dbe753d2fee57f7ca970b19c8cecc481ed36fc370e43511a9dad22648811e4") sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@ipv6_getanyicast={0x14, 0x3e, 0x100, 0x71bd29, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}}, 0x0) 05:31:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:31:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02003f0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1306.627680][T31800] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1306.646535][T31790] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1306.754522][T31790] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1306.810866][T31809] hfsplus: unable to load nls mapping "c [ 1306.810866][T31809] 850" [ 1306.825356][T31809] hfsplus: unable to parse mount options 05:31:01 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x7400000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1306.861502][T31820] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:31:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 1306.926423][T31790] BTRFS error (device loop1): open_ctree failed [ 1306.958544][T31817] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:31:01 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'c\"850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:31:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) exit_group(0x3) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000140)={0x0, 0x40000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_FREE_BUFS(r4, 0x4010641a, &(0x7f0000000280)={0x3, &(0x7f0000000240)=[0x2, 0x80, 0x38]}) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRESHEX=r0], @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x333, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0xf9f3fd5dce6119f0, 0x2000000, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x0, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1307.035810][T31790] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1307.063594][T31817] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1307.156846][T31790] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1307.196451][T31817] BTRFS error (device loop1): open_ctree failed 05:31:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x7) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@can_newroute={0x1c, 0x18, 0x300, 0x70bd28, 0x25dfdbfc, {0x1d, 0x1, 0xb}, [@CGW_MOD_UID={0x8, 0xe, r6}]}, 0x1c}}, 0x4408) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x12c, r4, 0x2, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x420}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x41}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x66}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x81}]}, @TIPC_NLA_LINK={0xb4, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xab}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc6e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x4000000}, 0x8051) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1307.276470][T31790] BTRFS error (device loop1): open_ctree failed 05:31:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001044d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1307.368182][T31817] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:31:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) [ 1307.469239][T31841] hfsplus: unable to load nls mapping "c"850" [ 1307.476667][T31841] hfsplus: unable to parse mount options 05:31:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x1d, 0x0, &(0x7f0000000180)) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r4, 0x0, 0x29, &(0x7f0000000140)={@multicast2, @loopback, 0x1}, 0xfffffffffffffd61) getsockopt$inet_udp_int(r4, 0x11, 0x65, &(0x7f0000000380), &(0x7f00000003c0)=0x4) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r6, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) r7 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r7, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRESHEX=r5, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRESOCT, @ANYRESDEC, @ANYRES64=r6, @ANYPTR, @ANYPTR64, @ANYRESOCT=r7]], @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1307.626235][T31828] selinux_nlmsg_perm: 5012 callbacks suppressed [ 1307.626249][T31828] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31828 comm=syz-executor.0 [ 1307.724977][T31841] hfsplus: unable to load nls mapping "c"850" [ 1307.735129][T31841] hfsplus: unable to parse mount options [ 1307.741784][T31859] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:31:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200400000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:02 executing program 2: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f00000004c0)='udp:syz0\x00', 0xffffffffffffffff}, 0x30) prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r5, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) r6 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r7, &(0x7f0000000100)={0x0, 0x5d, &(0x7f00000001c0)={&(0x7f0000000400)={0x54, r8, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @multicast1}}, {0x14, 0x2, @in={0x2, 0x0, @dev}}}}]}]}, 0x54}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2401000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xec, r8, 0x2, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x722b}]}, @TIPC_NLA_MEDIA={0xcc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4f4f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x49}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf320}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x583}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xeaa7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0xec}, 0x1, 0x0, 0x0, 0xc000}, 0x4000004) close(r6) [ 1307.779208][T31828] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31828 comm=syz-executor.0 [ 1307.814581][T31828] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31828 comm=syz-executor.0 05:31:02 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'c#850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1307.861133][T31828] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31828 comm=syz-executor.0 [ 1307.879021][T31828] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31828 comm=syz-executor.0 [ 1307.903604][T31828] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31828 comm=syz-executor.0 [ 1307.918824][T31828] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31828 comm=syz-executor.0 [ 1307.936560][T31828] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31828 comm=syz-executor.0 [ 1307.953562][T31876] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31876 comm=syz-executor.0 [ 1307.967506][T31876] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31876 comm=syz-executor.0 [ 1308.006534][T31859] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:31:02 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x79c76aa400000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:31:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000002c0)={'veth0_to_team\x00', 0xfe3}) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1308.164309][T31859] BTRFS error (device loop1): open_ctree failed [ 1308.252830][T31887] hfsplus: unable to load nls mapping "c#850" [ 1308.276748][T31890] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1308.320875][T31887] hfsplus: unable to parse mount options 05:31:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) [ 1308.390570][T31905] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:31:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001054d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1308.436725][T31890] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1308.459869][T31887] hfsplus: unable to load nls mapping "c#850" [ 1308.476581][T31887] hfsplus: unable to parse mount options 05:31:03 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'c%850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1308.606238][T31909] batman_adv: batadv0: Adding interface: veth2157 [ 1308.626322][T31909] batman_adv: batadv0: The MTU of interface veth2157 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1308.658024][T31909] batman_adv: batadv0: Interface activated: veth2157 05:31:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffef4, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="00000000000000002800120069c82263766574680000000c2620e6457fc6a0000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VT_GETMODE(r6, 0x5601, &(0x7f0000000140)) [ 1308.806307][T31890] BTRFS error (device loop1): open_ctree failed [ 1308.919621][T31934] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1308.930018][T31920] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:31:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x385, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) [ 1309.006359][T31920] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1309.035822][T31926] hfsplus: unable to load nls mapping "c%850" 05:31:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200410000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1309.063867][T31926] hfsplus: unable to parse mount options [ 1309.117294][T31920] BTRFS error (device loop1): open_ctree failed 05:31:03 executing program 2: r0 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000380)={0x90, 0x0, &(0x7f00000004c0)=[@increfs, @increfs_done={0x40106308, 0x3}, @dead_binder_done, @dead_binder_done, @transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000300)={@fd={0x66642a85, 0x0, r0}, @ptr={0x70742a85, 0x1, &(0x7f0000000240)=""/191, 0xbf, 0x1, 0x21}, @fda={0x66646185, 0x6, 0x0, 0x10}}, &(0x7f0000000140)={0x0, 0x18, 0x40}}}, @dead_binder_done, @dead_binder_done], 0xaf, 0x0, &(0x7f0000000580)="249c077a94273e8884b37f7592651d9b9065ad0f3549780de358522925b2ebbde6095855fe9b824d90cb15f316ba04c1cb25527d9cc7a2544fa7fd710f5e7911a4ffa392daa23434c2b079ea1468d99e7866996416dd8d721adf3b6278edaa14657e6fcb0dea27de75a4464a83753c97dc52f8a1a888b9835599f33b46bc95b982ab3d9c3bb8b234bf6b91bb866d4c4e1b69ab59f5a39320e848c340462d48b2fecc6b372a70714c7632030cd7728c"}) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1309.194873][T31926] hfsplus: unable to load nls mapping "c%850" [ 1309.208810][T31926] hfsplus: unable to parse mount options 05:31:03 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'c*850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1309.319304][T31961] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1309.378991][T31948] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1309.417335][T31962] batman_adv: batadv0: Adding interface: veth2159 05:31:03 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x7a00000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1309.424311][T31962] batman_adv: batadv0: The MTU of interface veth2159 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1309.548431][T31920] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:31:04 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1309.597817][T31962] batman_adv: batadv0: Interface activated: veth2159 [ 1309.624787][T31920] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1309.639669][T31948] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1309.702054][T31972] hfsplus: unable to load nls mapping "c*850" [ 1309.715032][T31972] hfsplus: unable to parse mount options [ 1309.727593][T31961] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1309.746298][T31948] BTRFS error (device loop1): open_ctree failed 05:31:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="48000000100905070007000007319f3f0e47a3ad1d725026e7423500000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1309.857509][T31920] BTRFS error (device loop1): open_ctree failed 05:31:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001064d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1309.952887][T31972] hfsplus: unable to load nls mapping "c*850" [ 1309.964472][T31948] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1309.996691][T31972] hfsplus: unable to parse mount options 05:31:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x12, 0x0, 0x0) 05:31:04 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x100840, 0x0) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000240)) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r5, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) r6 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r6, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) r7 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r7, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xffffff4a, &(0x7f0000000bc0)={&(0x7f0000000c80)=ANY=[@ANYPTR64=&(0x7f0000000c00)=ANY=[@ANYRESOCT=r2], @ANYRES32=r6, @ANYRES16=r7, @ANYRESOCT, @ANYRES64, @ANYRESHEX=0x0, @ANYRESOCT, @ANYRES32=r4, @ANYPTR64=&(0x7f0000000c40)=ANY=[]], 0x48}}, 0x20009084) r8 = msgget$private(0x0, 0x0) msgsnd(r8, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgsnd(r8, 0x0, 0x0, 0x0) msgrcv(r8, &(0x7f0000000040)={0x0, ""/152}, 0xa0, 0x0, 0x0) msgctl$IPC_RMID(r8, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r4, @ANYBLOB="6348020000000000faf7db28214fea5f382d980800dee1370a0014000000"], 0x28}}, 0x0) socketpair(0x4, 0x800, 0x4, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r9, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0xe8e5c9735315ab3e}, 0xc, &(0x7f0000000340)={&(0x7f00000004c0)={0x164, r10, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [{{{{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x4, 0x3}}, {{{{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x4, 0x2}}, {{{{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0x4, 0x12a2}}, {{{{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x4, 0x2}}, {{{{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x4, 0x2}}, {{{{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x4, 0x3}}, {{{{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0x4, 0x1}}]}, 0x164}, 0x1, 0x0, 0x0, 0x4000}, 0x2) 05:31:04 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'c+850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1310.193533][T31948] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:31:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000140)=""/200) 05:31:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001074d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1310.300805][T32003] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1310.411708][T32012] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 1310.416669][T31948] BTRFS error (device loop1): open_ctree failed [ 1310.464257][T32003] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1310.489488][T32018] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:31:05 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x8100000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1310.557599][T32018] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1310.586502][T32021] hfsplus: unable to load nls mapping "c+850" 05:31:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x7, 0x40) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r5, &(0x7f0000000340)='./file0\x00', r7, r8, 0x1000) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f0000000240)={{0x81, 0x5, 0x20, 0xff, 0x7, 0x7f}, 0x1000, 0x5, 0xe, 0x2, 0x9, "58afc40d302a8d33d0be2ba99044d91fbf08a96a2765513fb7bf4af14cd14bacac92ad1da23100951d4653be4ec02a48ba3fc5e6ee0bdc63f5b163890365513ad7f16c0bf5ac44b32231654c9d5f60863ae294484e3d20944d714e236abaaff782116d85af0cb509e566f1162b55e666628f09acada353a387f492428b40c28d"}) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r10 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_dccp_int(r10, 0x21, 0x9, &(0x7f0000000300)=0x3, 0x4) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r11, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 05:31:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200480000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:05 executing program 4: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000010000001809"], 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) vmsplice(r1, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x10008000, 0x0, 0x0) [ 1310.616507][T32021] hfsplus: unable to parse mount options [ 1310.656268][T32018] BTRFS error (device loop1): open_ctree failed [ 1310.832430][T32021] hfsplus: unable to load nls mapping "c+850" [ 1310.841122][T32018] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1310.876850][T32021] hfsplus: unable to parse mount options 05:31:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) write$binfmt_misc(r3, &(0x7f0000000340)={'\x00', "3fecbe9b20a1d72e515f53003445b9faccfe8fc2ecb760c839d1e56ccf8abdbaeaa9f0c5da445b13644163276cbf84ea500252b596d8ce601adc1252ae12662de2062b09cb570debf638751fa8433f45de71ab9f218cf8ac42e1ba44fb47db28a15d0c409dbc2f678c0dc168e8633c0dbf1dcfd06326622bf372c45f12cb2f449410f6904b98461b9d7bf4aaa5bdc4beebbf1ee7f7"}, 0x99) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f0000000400)=""/156) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981abf41bb3b480812141871986cad031e7904d39cad8064aadd810f8993fe6a50d0e98e722fc37bbaa86c4cac572027b5a62936e9a822bc05bc7d5a601dd321f1649a52ca574dc456171a60fa687079694254ab1680453f7a7c1be18b4cfe0ac582560a08afa4ffb7a79c847d7", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000580)=0x14) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x110, &(0x7f0000000680)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, r9}}, {@fscache='fscache'}, {@cache_mmap='cache=mmap'}], [{@appraise='appraise'}]}}) 05:31:05 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'c,850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1311.011461][T32018] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:31:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/context\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) [ 1311.114921][T32054] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1311.176241][T32018] BTRFS error (device loop1): open_ctree failed 05:31:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02004c0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001084d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1311.368229][T32062] hfsplus: unable to load nls mapping "c" [ 1311.392840][T32062] hfsplus: unable to parse mount options [ 1311.422398][T32057] batman_adv: batadv0: Adding interface: veth2161 05:31:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local, @multicast2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) [ 1311.447401][T32057] batman_adv: batadv0: The MTU of interface veth2161 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1311.522618][T32057] batman_adv: batadv0: Interface activated: veth2161 [ 1311.536331][T32077] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1311.580921][T32062] hfsplus: unable to load nls mapping "c" [ 1311.580997][T32054] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1311.600187][T32078] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1311.625375][T32062] hfsplus: unable to parse mount options [ 1311.638788][T32077] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:31:06 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x9effffff00000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1311.688889][T32078] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:31:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'c-850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:31:06 executing program 4: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000300)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x210) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) 05:31:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = inotify_init1(0x363bbd486bd129f0) ioctl$SIOCX25SCUDMATCHLEN(0xffffffffffffffff, 0x89e7, &(0x7f0000000140)={0x19}) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1311.829016][T32077] BTRFS error (device loop1): open_ctree failed [ 1311.886313][T32078] BTRFS error (device loop1): open_ctree failed [ 1311.942472][T32105] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1311.942840][T32077] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1311.993899][T32102] hfsplus: unable to load nls mapping "c-850" [ 1312.000453][T32102] hfsplus: unable to parse mount options [ 1312.137260][T32114] batman_adv: batadv0: Adding interface: veth2163 05:31:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'c.850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1312.166093][T32114] batman_adv: batadv0: The MTU of interface veth2163 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1312.197388][T32078] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1312.209118][T32114] batman_adv: batadv0: Interface activated: veth2163 [ 1312.223217][T32078] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1312.231437][T32077] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1312.257252][T32114] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:31:06 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000bfc65915ce02ea9637cd64d25f14f20000100021", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1312.326586][T32078] BTRFS error (device loop1): open_ctree failed 05:31:06 executing program 2: ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000240)={0x6eb1, 0x3, 0x0, [{0x7, 0x7, 0x132, 0x0, 0x5, 0x7, 0x1}, {0x3, 0x8, 0x38000000000000, 0x20, 0x2, 0xf8, 0x5}, {0x8000, 0xfffffffffffffffc, 0x1f, 0x9, 0x1, 0x1f, 0x3}]}) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 05:31:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001094d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1312.383686][T32124] hfsplus: unable to load nls mapping "c.850" [ 1312.414064][T32124] hfsplus: unable to parse mount options [ 1312.486354][T32077] BTRFS error (device loop1): open_ctree failed 05:31:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200600000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1312.567517][T32134] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1312.639036][T32097] selinux_nlmsg_perm: 3992 callbacks suppressed [ 1312.639051][T32097] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32097 comm=syz-executor.0 [ 1312.661304][T32124] hfsplus: unable to load nls mapping "c.850" [ 1312.663436][T32138] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1312.680322][T32097] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32097 comm=syz-executor.0 [ 1312.699016][T32138] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1312.732018][T32130] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5465 sclass=netlink_route_socket pig=32130 comm=syz-executor.4 [ 1312.735240][T32124] hfsplus: unable to parse mount options [ 1312.755613][T32097] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32097 comm=syz-executor.0 [ 1312.769181][T32138] BTRFS error (device loop1): open_ctree failed [ 1312.803110][T32109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32109 comm=syz-executor.0 [ 1312.833288][T32141] batman_adv: batadv0: Adding interface: veth2165 [ 1312.904340][T32141] batman_adv: batadv0: The MTU of interface veth2165 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 05:31:07 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'c0850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1312.946402][T32109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32109 comm=syz-executor.0 [ 1312.960293][T32141] batman_adv: batadv0: Interface activated: veth2165 [ 1312.980560][T32109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32109 comm=syz-executor.0 [ 1313.038496][T32109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32109 comm=syz-executor.0 [ 1313.075051][T32134] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1313.089045][T32109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32109 comm=syz-executor.0 [ 1313.120154][T32138] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1313.181568][T32109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32109 comm=syz-executor.0 [ 1313.211405][T32138] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1313.352119][T32163] hfsplus: unable to load nls mapping "c0850" [ 1313.358822][T32138] BTRFS error (device loop1): open_ctree failed [ 1313.366827][T32153] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1313.395108][T32163] hfsplus: unable to parse mount options 05:31:07 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0xcc0f000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:31:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000010a4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:08 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000bfc65915ce02ea9637cd64d25f14f20000100021", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:31:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200680000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1313.669094][T32163] hfsplus: unable to load nls mapping "c0850" [ 1313.695576][T32163] hfsplus: unable to parse mount options 05:31:08 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cX850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1313.987634][T32182] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1314.044691][T32182] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1314.126317][T32182] BTRFS error (device loop1): open_ctree failed [ 1314.129192][T32193] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1314.162076][T32189] hfsplus: unable to load nls mapping "cX850" [ 1314.178078][T32189] hfsplus: unable to parse mount options 05:31:08 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'c\\850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:31:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000010b4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:09 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0xe000000000000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:31:09 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000bfc65915ce02ea9637cd64d25f14f20000100021", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1314.776321][T32206] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1314.881572][T32206] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1314.920762][T32215] hfsplus: unable to load nls mapping "c\850" 05:31:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02006c0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='cpu\xe1cct.ksage_user\x00', 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x10, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088ca1fff", 0x0}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r7, 0xc0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f0000000600)={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000580)='memory.events\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001f80)={0x0, r6, 0x0, 0x5, &(0x7f0000001f40)='syz0\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000240)='GPL:({keyring\x00', r8}, 0x30) r10 = gettid() ptrace$setopts(0x4206, r10, 0x0, 0x0) tkill(r10, 0x3c) ptrace$cont(0x18, r10, 0x0, 0x0) ptrace$setregs(0xd, r10, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r10, 0x0, 0x0) r11 = gettid() ptrace$setopts(0x4206, r11, 0x0, 0x0) tkill(r11, 0x3c) ptrace$cont(0x18, r11, 0x0, 0x0) ptrace$setregs(0xd, r11, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r11, 0x0, 0x0) r12 = gettid() ptrace$setopts(0x4206, r12, 0x0, 0x0) tkill(r12, 0x3c) ptrace$cont(0x18, r12, 0x0, 0x0) ptrace$setregs(0xd, r12, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r12, 0x0, 0x0) r13 = getuid() r14 = getgid() r15 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r15, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) r16 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video0\x00', 0x2, 0x0) r17 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) r18 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r18, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) r19 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r19, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) r20 = gettid() ptrace$setopts(0x4206, r20, 0x0, 0x0) tkill(r20, 0x3c) ptrace$cont(0x18, r20, 0x0, 0x0) ptrace$setregs(0xd, r20, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r20, 0x0, 0x0) r21 = getpgrp(r20) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r23 = inotify_init1(0x1000) sendmsg$netlink(r1, &(0x7f00000008c0)={&(0x7f0000000140)=@proc={0x10, 0x0, 0x25dfdbff, 0x20}, 0xc, &(0x7f00000002c0)=[{&(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32=r9, @ANYBLOB="08001800", @ANYRES32=r10, @ANYBLOB="000008000700e0000002146c53d936294f4b24bae39c9d050330aeb67800ff0200000000000000000000000000018300d00163000c004b000900000300500000358e7203aaa5707abf8e5dff154d5bcfa54c8eebfe107cc210d82f0aa60dc197e79c9a46faeaaac3fbc8a4468b28a67c931d12d0105c84c388f53e79e210f49296177cf2b532838966613dfa786e40744b35e379f03b8afa7976198d33db295792a1508527dedc28e42591b4c86ccea8e279e6c647be8c29d9a816a8ec380000", @ANYRES32=r11, @ANYBLOB='\b\x00%\x00', @ANYRES32=r1, @ANYBLOB="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"], 0x320}], 0x1, &(0x7f0000000800)=[@cred={{0x1c, 0x1, 0x2, {r12, r13, r14}}}, @rights={{0x30, 0x1, 0x1, [r15, r16, r1, r17, r2, r18, r19, r1]}}, @cred={{0x1c, 0x1, 0x2, {r21, r22, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r23]}}], 0x88, 0x2def825249e26bed}, 0x8000088) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000060700", @ANYRES32=r24, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001b002508000000002000000000000000", @ANYRES32=r24, @ANYBLOB="634802000000000008000a0014000000"], 0x28}}, 0x0) [ 1314.937122][T32215] hfsplus: unable to parse mount options [ 1315.020189][T32206] BTRFS error (device loop1): open_ctree failed 05:31:09 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000bfc65915ce02ea9637cd64d25f14f20000100021", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1315.173902][T32206] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1315.186230][T32215] hfsplus: unable to load nls mapping "c\850" [ 1315.192329][T32215] hfsplus: unable to parse mount options 05:31:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCVHANGUP(r5, 0x5437, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x171500, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r6, 0xc08c5335, &(0x7f0000001180)={0x0, 0x2, 0x7, 'queue1\x00', 0x5}) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$netlink_NETLINK_RX_RING(r10, 0x10e, 0x6, &(0x7f0000000280)={0x1, 0x8000, 0x1, 0x100}, 0x10) chroot(&(0x7f00000002c0)='./file0\x00') sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r12 = socket$inet6(0xa, 0x2, 0x0) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$TIOCSRS485(r13, 0x542f, &(0x7f0000000300)={0x3, 0x9, 0x1}) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000004c0)=@filter={'filter\x00', 0xe, 0x4, 0xc60, 0x170, 0x170, 0x0, 0x0, 0x170, 0xbc8, 0xbc8, 0xbc8, 0xbc8, 0xbc8, 0x4, &(0x7f0000000080), {[{{@ip={@broadcast, @loopback, 0x1fffffe, 0xffffff00, 'bond_slave_1\x00', 'irlan0\x00', {0xff}, {0xff}, 0x2e, 0x1, 0x40}, 0x0, 0x110, 0x170, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x7f, 0x7f}}, @common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0x88b8, 0x1a}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xdd, [0x6, 0x2, 0x8, 0x3ff, 0x7ff], 0x1, 0x6}, {0x1ff, [0x9, 0x3, 0x3ff, 0x9, 0x8, 0x5], 0x1, 0x40}}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0x0, 0xff, 'ip6gre0\x00', 'gre0\x00', {0xff}, {0xff}, 0xff, 0x2, 0x8}, 0x0, 0x8a0, 0x910, 0x0, {}, [@common=@unspec=@u32={0x7e0, 'u32\x00', 0x0, {[{[{0x0, 0xd39bdd10a6dc4ec8}, {0x7, 0x3}, {0x3, 0x2}, {0x4, 0x3}, {0x50aca8d7, 0x1}, {0x1, 0x1}, {0x70c}, {0x5, 0x3}, {0x3, 0x2}, {0x675c2adf}, {0x10001}], [{0x4}, {0x3}, {0x9, 0x8}, {0x76d, 0xffff}, {0x4, 0xffffffff}, {0x1000, 0x1f3}, {0x94, 0x2}, {0x1, 0x9}, {0x7, 0x1}, {0x7}, {0x2, 0x5}], 0x0, 0xb}, {[{0x1, 0x3}, {0x6b81}, {0x1, 0xb9c966549092f845}, {0xca, 0x2}, {0x5, 0x2}, {0x8, 0x1}, {0x1, 0x1}, {0x401, 0x3}, {0x5, 0x1}, {0x5, 0x3}, {0x7fffffff, 0x1}], [{0x0, 0xffffff4b}, {0x2, 0x1}, {0x7f, 0xffffff80}, {0x8, 0x3}, {0xff8, 0x7}, {0x472e, 0xfffffffe}, {0x0, 0xfffffffa}, {0x3, 0x3}, {0x9, 0x8}, {0x9, 0x9}, {0x7, 0x80000000}], 0x2, 0x9}, {[{0x7fffffff}, {0x5, 0x6}, {0x3, 0x3}, {0x8}, {0x7fffffff, 0x2}, {0x1}, {0x4, 0x1d7249658927a49e}, {0x1e, 0x2}, {0x6, 0x2}, {0x1f, 0x1}, {0x5, 0x3}], [{0x5, 0x5548}, {0x9, 0xfffffffd}, {0x7b, 0x3ff}, {0x400, 0x7}, {0xf0}, {0x3000000, 0x80}, {0x9, 0x1}, {0x81, 0x85c}, {0x7f, 0x1f}, {0xde4, 0x3}, {0x7fffffff, 0x1}], 0x2}, {[{0x1, 0x1}, {0x1, 0x1}, {0x0, 0x3a772ebcc93bfafb}, {0xffffffff, 0x1}, {0x7d, 0x2}, {0xd190, 0x1}, {0x3, 0x3}, {0x40, 0xefa0c3418448e55c}, {0x285, 0x2}, {0x7, 0x2}, {0x2e1c, 0x4}], [{0xd2f, 0x8001}, {0x4, 0x1a10}, {0x1, 0xff}, {0xffffffff, 0x20}, {0x0, 0x4}, {0x7fff}, {0x248, 0x2279}, {0x6, 0x200}, {0x2}, {0x1ff, 0x7f}, {0x1, 0x2}], 0x9, 0x2}, {[{0x8001, 0x3}, {0x2}, {0x7, 0x2}, {0x0, 0x1}, {0xed6, 0x1}, {0x80000000, 0x2}, {0x7, 0x2}, {0x403, 0x3}, {0xfffffff8, 0x3}, {0x80000001}, {0xfffffffd, 0x3}], [{0xb3, 0x5}, {0x3ff, 0x74}, {0x0, 0x8000}, {0x1, 0x6}, {0x0, 0x2}, {0x10000, 0x9}, {0x20, 0x20}, {0xe7, 0x401}, {0x0, 0x200}, {0x7, 0x7}, {0x0, 0x5}], 0x7, 0xb}, {[{0x7, 0x1}, {0x21b, 0x2}, {0x20, 0x2}, {0x0, 0x2}, {0xcdf}, {0x5, 0x3}, {0x7fff, 0x1}, {0x6, 0x2}, {0x7, 0x1}, {0xca, 0x1}, {0x6, 0x1}], [{0x5}, {0x1, 0x3}, {0x80000000, 0x8}, {0x3e1, 0x3}, {0x7, 0x1f}, {0x7, 0x7fff}, {0xfffffffb, 0x80000000}, {0x7bf6, 0x6}, {0x1ff, 0xffff}, {0x8001, 0xaa6}, {0x212, 0x4}], 0x4, 0xa}, {[{0x38e2384e, 0x2}, {0x80, 0x2}, {0x8000}, {0xc3}, {0x77}, {0x101}, {0x5, 0x52cdd7dc3415eb64}, {0x20, 0x2d2929c6a908f7d9}, {0x5, 0x1}, {0x0, 0x2}, {0xffff, 0x3}], [{0x7, 0x1d9}, {0x7, 0x8}, {0x80, 0x800}, {0x4, 0x80000001}, {0xff, 0x7}, {0x4, 0x7fff}, {0x6, 0x9}, {0x1, 0x10001}, {0x10001, 0x3f27}, {0x2, 0x1}, {0x9, 0xfffffeff}], 0x8}, {[{0x8, 0x3}, {0x8f0, 0x2}, {0x1ff}, {0x6, 0x3}, {0x3}, {0x0, 0x3}, {0x759, 0x2}, {0x8, 0x1}, {0x3, 0x3}, {0x0, 0x3}, {0x0, 0x1}], [{0x0, 0x101}, {0x80000000, 0x6}, {0x1ff, 0x342851ef}, {0x7fff, 0xd03}, {0x3, 0x2}, {0x80}, {0x1ff, 0x4}, {0x10000, 0x20}, {0x5, 0x6}, {0x4, 0x2}, {0xb8, 0x6}], 0x7, 0x3}, {[{0x4}, {0x4, 0xde3e678b49cc9969}, {0x3f, 0x4}, {0x3b2}, {0x7f80000, 0x1}, {0x5}, {0x3, 0x1}, {0x4, 0x1}, {0xfffff227, 0x3}, {0xd35, 0x1}, {0x3, 0x1}], [{0x5, 0x2}, {0x2, 0xffffff20}, {0x2, 0x401}, {0x0, 0x2}, {0x99, 0x2}, {0x0, 0x7fffffff}, {0xfffffff7, 0xfffffff8}, {0x81, 0x5}, {0x5, 0x8}, {0x3, 0x1}, {0x3, 0xe5}], 0x6, 0xb}, {[{0x7, 0x3}, {0x3e8baec4, 0x2}, {0x2be, 0x2}, {0xfffffff7, 0x1}, {0x6}, {0x200, 0x1}, {0x1}, {0x4, 0x1}, {0x7, 0x2}, {0x401}, {0x7fffffff, 0xa58ae292c6530844}], [{0x0, 0x4}, {0x8, 0xd2a}, {0x7, 0x5}, {0xd661, 0x4}, {0x3, 0x1}, {0x2, 0x1}, {0xd1e, 0x7}, {0x7, 0x7fffffff}, {0x5, 0x1}, {0x400, 0x9}, {0x40, 0x1}], 0x0, 0xa}, {[{0x10000, 0x3}, {0x3d3c, 0x1}, {0x0, 0x3}, {0x7f, 0x2}, {0xfffffffe, 0x3}, {0x0, 0x2}, {0x2, 0x9cd1f014ae318c0a}, {0x80, 0x2}, {0x81, 0x2}, {0xfff, 0x1}, {0x7, 0x1}], [{0x1, 0x2cd2}, {0xee0, 0x6}, {0x59, 0x10001}, {0x3, 0x8}, {0x401, 0x1}, {0x7fffffff, 0x7}, {0x5, 0x40}, {0x100, 0xffffffe0}, {0x9, 0x4}, {0x20, 0x8000}, {0xffffff80, 0x4}], 0xa, 0x1}], 0x6, 0x1}}, @common=@unspec=@cgroup0={0x28, 'cgroup\x00', 0x0, {0x401, 0x1}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x7fffffff, 0x7, 0x0, 0x0, 0x0, "985d9e52250c0e9959cec5b0648c5dc1f043ef9d00c4410ead9eb46e2d5140fa1a7a69855db48b7989df04683e4654369e520bcddbc5d3fa3aac3e2dbb8c6223"}}}, {{@ip={@multicast2, @remote, 0xff, 0xffffffff, 'nr0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x0, 0x2, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@inet=@iprange={0x68, 'iprange\x00', 0x1, {@ipv4=@loopback, @ipv6=@loopback, @ipv6=@local, @ipv4=@multicast2, 0x12}}, @common=@socket0={0x20, 'socket\x00'}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0xcc0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r15 = socket$inet6(0xa, 0x2, 0x0) r16 = fcntl$dupfd(r15, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) setsockopt$RDS_CANCEL_SENT_TO(r16, 0x114, 0x1, &(0x7f0000000340)={0x2, 0x4e22, @broadcast}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x24863, 0xfe9c8a9cb40b9ac7}, [@IFLA_PROTO_DOWN={0x8, 0xa}]}, 0x28}}, 0x0) [ 1315.256814][T32206] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1315.349340][T32243] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:31:09 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cc850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1315.476292][T32206] BTRFS error (device loop1): open_ctree failed [ 1315.536823][T32237] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:31:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001104d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1315.634475][T32237] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1315.669951][T32244] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1315.681161][T32251] hfsplus: unable to load nls mapping "cc850" [ 1315.712084][T32251] hfsplus: unable to parse mount options 05:31:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r4, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') ioctl$VIDIOC_G_AUDOUT(r4, 0x80345631, &(0x7f0000000700)) sendmsg$TIPC_CMD_GET_LINKS(r5, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, r6, 0x10, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0xff}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x4040058) r7 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r7, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000680)={0x1, 0x2, 0x1000, 0xf8, &(0x7f0000000480)="0c47382277285a0e1521fe36f0262fc67e0ba21219cf22fb183d7880f4a56e747415c018c5bbacfc45b344b8a5154340f9f0034837e5a22e11a4e60e029f9f98d9f64451e1a89a3793a747438a9f80152ef57ab5ac56a013d09df03692cabc44db1144987f7f56673e8a5f2a471c1ecd74acfe00067d847d001361299cde8c26c3ba2a34306d85841a97fff004daeedc0873efd1a897bedeb3b7eacb801b68887b2db97165bba2e0b1c2d40545f266bf1152b028bb102390f680badb37c1c100847c4b14b050b632392bdab913d6e4590a1140e21fc2ab0ccd419127edd79bc96b2e8179902746cca3813bb2f3e15a55f07591e488d7f693", 0xea, 0x0, &(0x7f0000000580)="6655359cdaeed6a073b22840ed02c6e1341bcfd1ba773ee92e493dffbbb668c7c53fd4e9c791c55bb6bb11487494e2ad02d8f2a43188361de18b0d2007332413b66b3d13e2eac2bc2039b21ccbfe2d7b789208f851bf549309c6fb351b86f269d367f0d6f4667689afb7480841bbedfb897e3e64a2c8711fd2d7fe8238f389d7b0fdb6601f4a261effd5b028da8b82a53b1774fb8dd8ca4807ed1f82ef759ccf1d5d2bc77f51035f7b1d4d18dac8d376d342b0513bc6bdea3670f6a76425531021997ddb76ef5be4e46f70a5a94cec4461db67b6231661eb7dee93c53340c09a7aa8e84c5710c145cd98"}) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000507000700efff0177ceffff00000000000029b2ef9c2e3b13a72a5ae47f490e61d087d38d6c098086d5c0f8ee44d61515ac11fdf1d3f721a677bcb103c81df047aba873d6c052c8ed4c5b91f245ab4aaf36238a1dedc65e8eb6c48546eba4d93c721bae56073cc58d1662a630ae91d248611cba8ef24b52025993c2da878d6b5d30f2f0b3519b9612b7b120cadd1f172ac2192bd782258df7095723409a0bdaaebb59b2aca2f0f685", @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800ba2584e8d228", @ANYRES32=r8, @ANYBLOB="634802000000000008000a0014000000"], 0x28}}, 0x0) 05:31:10 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0xf0ffffff00000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:31:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001484d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:10 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cd850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1316.117139][T32237] BTRFS error (device loop1): open_ctree failed [ 1316.124086][T32272] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:31:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x101000, 0x0) write$binfmt_aout(r4, &(0x7f0000000440)={{0x108, 0x0, 0x3f, 0x8e, 0x328, 0x401, 0xc2, 0x1b}, "97b654000888a27fda44217f336eef2fedb2d8b8888ae58d83fac8ec38417dc641f75a0f4e6f56e577de397e7190a8dab60dd4841c1c2ab087561697bddf59bcde41f574cbb90bd1bd61e978b909089efef52c4d0a566ab5c65ee5ee857e573db84b5022ee5cea62f4eea5bcae16e13f688d79de40961beb7318dfcb3fb19e5596c454caff93ed6456000cfbcfbc540cb42273b702cb34b0aad3446c4855efa8d1e2b2ee23abfe5612a3b1a53fc40ae9321f06f8dccef6de1d4f58c55bdca89b9782a0475e57c5e0e7bc7acd90cbfca79675b13dc8e81eec75701950812ece2ecd2e8cf878d546d9071087b4f654a2feaf3c11b425c74813dc", [[], []]}, 0x319) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYRESHEX=r2, @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 05:31:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200740000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1316.218988][T32272] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1316.326151][T32272] BTRFS error (device loop1): open_ctree failed [ 1316.334918][T32283] hfsplus: unable to load nls mapping "cd850" [ 1316.351080][T32283] hfsplus: unable to parse mount options 05:31:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="434802000000000043825bbf44b4c74fd8032c0c0028001400"], 0x28}}, 0x0) [ 1316.554852][T32295] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:31:11 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'ci850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1316.649800][T32272] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1316.688737][T32295] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1316.710906][T32306] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1316.743537][T32272] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1316.807112][T32295] BTRFS error (device loop1): open_ctree failed [ 1316.822005][T32309] hfsplus: unable to load nls mapping "ci850" [ 1316.834384][T32309] hfsplus: unable to parse mount options [ 1316.846104][T32272] BTRFS error (device loop1): open_ctree failed [ 1316.903317][T32312] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1316.960709][T32312] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1317.106940][T32309] hfsplus: unable to load nls mapping "ci850" [ 1317.130768][T32309] hfsplus: unable to parse mount options [ 1318.693489][T32365] IPVS: ftp: loaded support on port[0] = 21 [ 1318.907294][T32365] chnl_net:caif_netlink_parms(): no params data found [ 1319.014078][T32365] bridge0: port 1(bridge_slave_0) entered blocking state [ 1319.021512][T32365] bridge0: port 1(bridge_slave_0) entered disabled state [ 1319.040736][T32365] device bridge_slave_0 entered promiscuous mode [ 1319.055468][T32365] bridge0: port 2(bridge_slave_1) entered blocking state [ 1319.072617][T32365] bridge0: port 2(bridge_slave_1) entered disabled state [ 1319.090864][T32365] device bridge_slave_1 entered promiscuous mode [ 1319.144515][T32365] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1319.169900][T32365] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1319.222059][T32365] team0: Port device team_slave_0 added [ 1319.232650][T32365] team0: Port device team_slave_1 added [ 1319.338867][T32365] device hsr_slave_0 entered promiscuous mode [ 1319.387558][T32365] device hsr_slave_1 entered promiscuous mode [ 1319.456220][T32365] debugfs: Directory 'hsr0' with parent '/' already present! [ 1319.479621][T32365] bridge0: port 2(bridge_slave_1) entered blocking state [ 1319.486761][T32365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1319.494127][T32365] bridge0: port 1(bridge_slave_0) entered blocking state [ 1319.501254][T32365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1319.605442][T32365] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1319.635704][T27057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1319.658208][T27057] bridge0: port 1(bridge_slave_0) entered disabled state [ 1319.688280][T27057] bridge0: port 2(bridge_slave_1) entered disabled state [ 1319.708155][T27057] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1319.724093][T32365] 8021q: adding VLAN 0 to HW filter on device team0 [ 1319.740057][T27752] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1319.749400][T27752] bridge0: port 1(bridge_slave_0) entered blocking state [ 1319.756708][T27752] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1319.777370][T32199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1319.785829][T32199] bridge0: port 2(bridge_slave_1) entered blocking state [ 1319.792961][T32199] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1319.841613][T16408] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1319.855885][T16408] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1319.886266][T31990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1319.906782][T31990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1319.922527][T31990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1319.937308][T31990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1319.966481][T32365] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1319.992325][T32365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1320.018294][T16408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1320.031042][T16408] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1320.104882][T32365] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1320.462779][T32405] selinux_nlmsg_perm: 3427 callbacks suppressed [ 1320.462984][T32405] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5465 sclass=netlink_route_socket pig=32405 comm=syz-executor.4 05:31:15 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000bfc65915ce02ea9637cd64d25f14f20000100021", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:31:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000014c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02007a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:15 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0xffffffff00000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:31:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 05:31:15 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cl850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1320.611260][T32414] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1320.618743][T32418] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1320.676779][T32414] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1320.701520][T32419] hfsplus: unable to load nls mapping "cl850" [ 1320.715614][T32419] hfsplus: unable to parse mount options [ 1320.746200][T32414] BTRFS error (device loop1): open_ctree failed [ 1320.812107][T32430] batman_adv: batadv0: Adding interface: veth2171 [ 1320.822445][T32419] hfsplus: unable to load nls mapping "cl850" [ 1320.829946][T32419] hfsplus: unable to parse mount options [ 1320.838445][T32430] batman_adv: batadv0: The MTU of interface veth2171 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 05:31:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02009f0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1320.910940][T32430] batman_adv: batadv0: Interface activated: veth2171 05:31:15 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'co850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1320.966135][T32414] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1321.086352][T32414] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1321.236118][T32414] BTRFS error (device loop1): open_ctree failed [ 1321.255204][T32447] hfsplus: unable to load nls mapping "co850" [ 1321.266101][T32450] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1321.273317][T32447] hfsplus: unable to parse mount options [ 1321.373964][T32447] hfsplus: unable to load nls mapping "co850" [ 1321.385924][T32447] hfsplus: unable to parse mount options 05:31:15 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cs850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:31:16 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000bfc65915ce02ea9637cd64d25f14f20000100021", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1321.551367][T32450] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1321.565928][T32416] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32416 comm=syz-executor.0 05:31:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001604d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1321.626180][T32416] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32416 comm=syz-executor.0 [ 1321.635757][T32430] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1321.665496][T32416] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32416 comm=syz-executor.0 [ 1321.679590][T32464] hfsplus: unable to load nls mapping "cs850" [ 1321.689438][T32464] hfsplus: unable to parse mount options [ 1321.706394][T32416] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32416 comm=syz-executor.0 [ 1321.726257][T32450] BTRFS error (device loop1): open_ctree failed [ 1321.744013][T32416] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32416 comm=syz-executor.0 [ 1321.786231][T32416] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32416 comm=syz-executor.0 05:31:16 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000bfc65915ce02ea9637cd64d25f14f20000100021", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1321.908580][T32416] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32416 comm=syz-executor.0 [ 1321.910462][T32464] hfsplus: unable to load nls mapping "cs850" [ 1321.950400][T32464] hfsplus: unable to parse mount options [ 1321.976306][T32416] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32416 comm=syz-executor.0 [ 1321.998051][T32476] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1322.009712][T32416] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32416 comm=syz-executor.0 05:31:16 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cu850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:31:16 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0xffffffffa0008000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1322.106505][T32476] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1322.206661][T32476] BTRFS error (device loop1): open_ctree failed [ 1322.393771][T32484] hfsplus: unable to load nls mapping "cu850" [ 1322.406732][T32484] hfsplus: unable to parse mount options [ 1322.516750][T32484] hfsplus: unable to load nls mapping "cu850" [ 1322.526195][T32484] hfsplus: unable to parse mount options 05:31:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02c0ed0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:17 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cx850'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1322.637915][T32476] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1322.818668][T32476] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1322.966053][T32476] BTRFS error (device loop1): open_ctree failed [ 1323.014773][T32507] hfsplus: unable to load nls mapping "cx850" [ 1323.029949][T32507] hfsplus: unable to parse mount options [ 1323.042646][T32503] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1323.108309][T32503] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1323.175718][T32507] hfsplus: unable to load nls mapping "cx850" [ 1323.212891][T32507] hfsplus: unable to parse mount options [ 1323.298292][T32503] BTRFS error (device loop1): open_ctree failed [ 1324.807820][ T7] device bridge_slave_1 left promiscuous mode [ 1324.814066][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1324.879874][ T7] device bridge_slave_0 left promiscuous mode [ 1324.896286][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1328.729431][ T7] device hsr_slave_0 left promiscuous mode [ 1328.776167][ T7] device hsr_slave_1 left promiscuous mode [ 1328.839600][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1328.855531][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1328.882585][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1328.940826][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1329.073470][ T7] bond0 (unregistering): Released all slaves [ 1331.497893][T32552] IPVS: ftp: loaded support on port[0] = 21 05:31:26 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="0000f979e21ccc6e"], 0x48}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=@ipv6_getroute={0x44, 0x1a, 0xf9075b92faa14040, 0x70bd2d, 0x25dfdbfc, {0xa, 0x1ae, 0x14, 0x1, 0x107, 0x0, 0xfe, 0x9, 0x400}, [@RTA_ENCAP={0x4}, @RTA_ENCAP_TYPE={0x8, 0x15, 0x2}, @RTA_PREF={0x8, 0x14, 0x2}, @RTA_GATEWAY={0x14, 0x5, @local}]}, 0x44}}, 0x0) 05:31:26 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp\b50'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:31:26 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0xffffffffa0010000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:31:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001684d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200ff0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1331.674124][T32685] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1331.774035][T32697] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1331.783689][T32683] hfsplus: unable to load nls mapping "cp50" [ 1331.792343][T32683] hfsplus: unable to parse mount options [ 1331.838832][T32685] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1331.906254][T32685] BTRFS error (device loop1): open_ctree failed [ 1331.919767][T32683] hfsplus: unable to load nls mapping "cp50" [ 1331.926210][T32689] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1331.937861][T32683] hfsplus: unable to parse mount options 05:31:26 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp\n50'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1332.011621][T32697] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1332.056375][T32552] chnl_net:caif_netlink_parms(): no params data found 05:31:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0xfedb, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1332.177963][T32552] bridge0: port 1(bridge_slave_0) entered blocking state [ 1332.185188][T32552] bridge0: port 1(bridge_slave_0) entered disabled state [ 1332.208122][T32685] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1332.253095][T32552] device bridge_slave_0 entered promiscuous mode [ 1332.291093][T32712] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1332.308552][T32685] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1332.382031][T32552] bridge0: port 2(bridge_slave_1) entered blocking state [ 1332.391372][T32552] bridge0: port 2(bridge_slave_1) entered disabled state [ 1332.402670][T32552] device bridge_slave_1 entered promiscuous mode [ 1332.414952][T32719] batman_adv: batadv0: Adding interface: veth2175 [ 1332.422366][T32719] batman_adv: batadv0: The MTU of interface veth2175 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1332.448863][T32716] hfsplus: unable to load nls mapping "cp [ 1332.448863][T32716] 50" [ 1332.456068][T32685] BTRFS error (device loop1): open_ctree failed [ 1332.457185][T32719] batman_adv: batadv0: Interface activated: veth2175 [ 1332.470522][T32716] hfsplus: unable to parse mount options [ 1332.533975][T32712] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1332.574359][T32552] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1332.618188][T32552] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1332.707966][T32716] hfsplus: unable to load nls mapping "cp [ 1332.707966][T32716] 50" [ 1332.737239][T32716] hfsplus: unable to parse mount options [ 1332.768626][T32552] team0: Port device team_slave_0 added [ 1332.778171][T32552] team0: Port device team_slave_1 added [ 1332.850651][T32552] device hsr_slave_0 entered promiscuous mode [ 1332.897487][T32552] device hsr_slave_1 entered promiscuous mode [ 1332.956450][T32552] debugfs: Directory 'hsr0' with parent '/' already present! [ 1332.988871][T32552] bridge0: port 2(bridge_slave_1) entered blocking state [ 1332.996010][T32552] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1333.003559][T32552] bridge0: port 1(bridge_slave_0) entered blocking state [ 1333.010702][T32552] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1333.049471][T31990] bridge0: port 1(bridge_slave_0) entered disabled state [ 1333.063091][T31990] bridge0: port 2(bridge_slave_1) entered disabled state [ 1333.157325][T32552] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1333.173586][T16408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1333.200051][T16408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1333.217769][T32552] 8021q: adding VLAN 0 to HW filter on device team0 [ 1333.258419][T16408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1333.273264][T16408] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1333.293617][T16408] bridge0: port 1(bridge_slave_0) entered blocking state [ 1333.300746][T16408] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1333.348308][T29622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1333.375410][T29622] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1333.390963][T29622] bridge0: port 2(bridge_slave_1) entered blocking state [ 1333.398093][T29622] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1333.418859][T29622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1333.451985][T29622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1333.467768][T29622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1333.492569][T29622] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1333.504626][T29622] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1333.513541][T29622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1333.528265][T29622] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1333.556898][T27057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1333.566383][T27057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1333.578285][T27057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1333.588992][T27057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1333.600062][T32552] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1333.644503][T32552] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1334.074265][T32755] selinux_nlmsg_perm: 6 callbacks suppressed [ 1334.074295][T32755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5465 sclass=netlink_route_socket pig=32755 comm=syz-executor.4 05:31:28 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0xfffffffffffff000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:31:28 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000bfc65915ce02ea9637cd64d25f14f20000100021", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:31:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed020fff0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000016c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:28 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp\"50'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:31:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180), r8, 0x0, 0x3, 0x400000}}, 0x20) r9 = dup3(r2, 0xffffffffffffffff, 0x100000) write$RDMA_USER_CM_CMD_MIGRATE_ID(r6, &(0x7f0000000240)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r8, r9}}, 0x18) [ 1334.230481][ T300] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1334.254483][T32767] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1334.276601][ T300] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1334.283943][ T302] hfsplus: unable to load nls mapping "cp"50" [ 1334.296657][ T302] hfsplus: unable to parse mount options [ 1334.366712][ T300] BTRFS error (device loop1): open_ctree failed [ 1334.393937][ T302] hfsplus: unable to load nls mapping "cp"50" [ 1334.408509][ T302] hfsplus: unable to parse mount options 05:31:29 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp,50'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1334.656705][ T324] hfsplus: unable to load nls mapping "cp" [ 1334.665271][ T324] hfsplus: unable to parse mount options [ 1334.770174][ T324] hfsplus: unable to load nls mapping "cp" [ 1334.777696][ T324] hfsplus: unable to parse mount options 05:31:29 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp=50'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1334.946896][ T314] batman_adv: batadv0: Adding interface: veth2177 [ 1334.960038][ T305] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1334.970524][ T314] batman_adv: batadv0: The MTU of interface veth2177 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 05:31:29 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000bfc65915ce02ea9637cd64d25f14f20000100021", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1335.000189][ T314] batman_adv: batadv0: Interface activated: veth2177 05:31:29 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f00000000c0)=0x8, 0x4) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="380000001000a5328300"/20, @ANYRES32=r8, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r8], 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:31:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001744d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000400000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1335.179132][ T338] hfsplus: unable to load nls mapping "cp=50" 05:31:29 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f0000000140)) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000029c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000280)={0x3000, 0x1000}) [ 1335.229626][ T338] hfsplus: unable to parse mount options 05:31:29 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000bfc65915ce02ea9637cd64d25f14f20000100021", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1335.411518][ T338] hfsplus: unable to load nls mapping "cp=50" [ 1335.445931][ T362] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1335.451019][ T338] hfsplus: unable to parse mount options [ 1335.478371][ T359] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:31:30 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp\\50'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1335.551469][ T362] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1335.646149][ T359] BTRFS error (device loop1): open_ctree failed [ 1335.716565][ T362] BTRFS error (device loop1): open_ctree failed [ 1335.860724][ T375] hfsplus: unable to load nls mapping "cp\50" [ 1335.876504][ T375] hfsplus: unable to parse mount options 05:31:30 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp8\a0'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1336.146616][ T347] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=347 comm=syz-executor.0 [ 1336.160660][ T365] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1336.181777][ T362] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1336.232405][ T347] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=347 comm=syz-executor.0 [ 1336.241771][ T387] hfsplus: unable to load nls mapping "cp80" [ 1336.262682][ T387] hfsplus: unable to parse mount options [ 1336.285465][ T347] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=347 comm=syz-executor.0 [ 1336.319427][ T347] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=347 comm=syz-executor.0 [ 1336.325191][ T368] batman_adv: batadv0: Adding interface: veth2179 [ 1336.354761][ T368] batman_adv: batadv0: The MTU of interface veth2179 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1336.357072][ T347] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=347 comm=syz-executor.0 [ 1336.428458][ T368] batman_adv: batadv0: Interface activated: veth2179 [ 1336.460903][ T347] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=347 comm=syz-executor.0 05:31:31 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp8\"0'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1336.479434][ T391] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1336.519506][ T347] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=347 comm=syz-executor.0 [ 1336.580611][ T347] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=347 comm=syz-executor.0 [ 1336.617302][ T347] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=347 comm=syz-executor.0 05:31:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000017a4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000a00000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000000000050700000000ff47a8cd0c1fd45f", @ANYRES32=r2, @ANYRES16=r2, @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x2228dc470d6cf4ed) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 05:31:31 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x10, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x4, 0x2, [@vti_common_policy]}}}]}, 0x30}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x20, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1336.691347][ T407] hfsplus: unable to load nls mapping "cp8"0" [ 1336.712504][ T407] hfsplus: unable to parse mount options [ 1336.868064][ T413] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1336.929271][ T407] hfsplus: unable to load nls mapping "cp8"0" [ 1336.949154][ T407] hfsplus: unable to parse mount options [ 1336.967733][ T413] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:31:31 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp8#0'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1337.096165][ T413] BTRFS error (device loop1): open_ctree failed 05:31:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200004000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r9) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r13, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r13, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000100}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=@newpolicy={0xcc, 0x13, 0x10, 0x70bd27, 0x25dfdbfe, {{@in6=@rand_addr="15c54a91f1d3fa8888dc382a9d65ff87", @in6=@remote, 0x4e24, 0x0, 0x4e20, 0x0, 0xa, 0x94aaa1c855f792c6, 0x80, 0x2c, r7, r9}, {0x3, 0x5, 0x6, 0x7, 0x7, 0x2, 0xffffffffffff123d, 0x8}, {0x800, 0x8000, 0x7fffffff, 0x7}, 0x0, 0x6e6bbc, 0x0, 0x0, 0x1, 0x1}, [@offload={0xc, 0x1c, {r13, 0x2}}, @ipv4_hthresh={0x8, 0x3, {0x1b, 0x5}}]}, 0xcc}, 0x1, 0x0, 0x0, 0x1}, 0x2) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="7f3a44634898040006000000161b04d3000a001400010027b9a9317e5d0f37beac100693ce758c928c7d11abb8"], 0x28}}, 0x0) [ 1337.297060][ T413] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1337.406098][ T413] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1337.513155][ T449] hfsplus: unable to load nls mapping "cp8#0" [ 1337.526159][ T413] BTRFS error (device loop1): open_ctree failed [ 1337.532643][ T449] hfsplus: unable to parse mount options 05:31:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02000000000000010081010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1337.560333][ T462] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1337.586186][ T451] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1337.664762][ T454] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1337.745816][ T449] hfsplus: unable to load nls mapping "cp8#0" [ 1337.756750][ T449] hfsplus: unable to parse mount options [ 1337.817425][ T472] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1337.914790][ T472] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1338.006046][ T472] BTRFS error (device loop1): open_ctree failed [ 1338.198789][ T472] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1338.221484][ T483] IPVS: ftp: loaded support on port[0] = 21 [ 1338.284001][ T472] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1338.386284][ T472] BTRFS error (device loop1): open_ctree failed [ 1339.437633][ T483] chnl_net:caif_netlink_parms(): no params data found [ 1339.479636][ T7] device bridge_slave_1 left promiscuous mode [ 1339.485869][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1339.537974][ T7] device bridge_slave_0 left promiscuous mode [ 1339.544217][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1343.906543][ T7] device hsr_slave_0 left promiscuous mode [ 1343.986497][ T7] device hsr_slave_1 left promiscuous mode [ 1344.057355][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1344.089584][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1344.104734][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1344.196636][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1344.377282][ T7] bond0 (unregistering): Released all slaves [ 1344.540432][ T483] bridge0: port 1(bridge_slave_0) entered blocking state [ 1344.557538][ T483] bridge0: port 1(bridge_slave_0) entered disabled state [ 1344.577587][ T483] device bridge_slave_0 entered promiscuous mode [ 1344.597719][ T483] bridge0: port 2(bridge_slave_1) entered blocking state [ 1344.604869][ T483] bridge0: port 2(bridge_slave_1) entered disabled state [ 1344.628288][ T483] device bridge_slave_1 entered promiscuous mode [ 1344.678805][ T483] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1344.737327][ T483] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1344.829258][ T483] team0: Port device team_slave_0 added [ 1344.859795][ T483] team0: Port device team_slave_1 added [ 1344.971042][ T483] device hsr_slave_0 entered promiscuous mode [ 1345.017295][ T483] device hsr_slave_1 entered promiscuous mode [ 1345.076158][ T483] debugfs: Directory 'hsr0' with parent '/' already present! [ 1345.139315][ T483] bridge0: port 2(bridge_slave_1) entered blocking state [ 1345.146440][ T483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1345.153894][ T483] bridge0: port 1(bridge_slave_0) entered blocking state [ 1345.161006][ T483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1345.359061][ T483] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1345.416376][T29622] bridge0: port 1(bridge_slave_0) entered disabled state [ 1345.427054][T29622] bridge0: port 2(bridge_slave_1) entered disabled state [ 1345.449127][T29622] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1345.470305][T29622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1345.479795][T29622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1345.502035][ T483] 8021q: adding VLAN 0 to HW filter on device team0 [ 1345.557560][T29622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1345.577239][T29622] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1345.597509][T29622] bridge0: port 1(bridge_slave_0) entered blocking state [ 1345.604602][T29622] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1345.657498][T32742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1345.667689][T32742] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1345.688936][T32742] bridge0: port 2(bridge_slave_1) entered blocking state [ 1345.696049][T32742] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1345.718397][T32742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1345.739937][T32742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1345.769565][T29622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1345.789096][T29622] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1345.807339][T29622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1345.837699][T29622] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1345.886230][ T9522] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1345.894749][ T9522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1345.917658][ T9522] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1345.927061][ T9522] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1345.936399][ T9522] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1345.947663][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1345.990889][ T483] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1346.426569][ T642] selinux_nlmsg_perm: 1012 callbacks suppressed [ 1346.426601][ T642] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5465 sclass=netlink_route_socket pig=642 comm=syz-executor.4 05:31:41 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000bfc65915ce02ea9637cd64d25f14f20000100021", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) 05:31:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp8+0'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:31:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200004100000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x200, 0x0) syz_mount_image$nfs4(&(0x7f0000000280)='nfs4\x00', &(0x7f00000002c0)='./file0\x00', 0xae8e, 0x1, &(0x7f0000000380)=[{&(0x7f0000000300)="129fb88ffa9a65b479c9b611667f4e982dc18114df7e8a6a16968f28c5e3da0314c943cfafcbe1fd3697cebef8f8ee5fdc12ceaf423078b19a738ee4f126e8ceab53e5b00f5d7cb039e4a9b57450fa756a21f1af3a9a5d2d3916b7f96ebf621fc5", 0x61, 0x6}], 0x10, &(0x7f00000003c0)='/proc/capi/capi20\x00') bind$tipc(r4, &(0x7f0000000240)=@name={0x1e, 0x2, 0x0, {{0x427e3d7d51392299, 0x1}, 0x2}}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 05:31:41 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="38000000000000000000000000feffc9e3964395a6a4e175a4d700000093202008521021a140a0ae52366c0922bfc31a56daf402e7dd2e15", @ANYRES32=r8, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r8], 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0xfffffffffffffefe}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:31:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed020000000000000100ff010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1346.562074][ T648] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1346.604913][ T663] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1346.608044][ T660] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1346.616914][ T665] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=665 comm=syz-executor.0 [ 1346.666108][ T656] hfsplus: unable to load nls mapping "cp8+0" [ 1346.697298][ T656] hfsplus: unable to parse mount options [ 1346.720420][ T648] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1346.774946][ T660] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1346.886782][ T648] BTRFS error (device loop1): open_ctree failed [ 1346.900448][ T656] hfsplus: unable to load nls mapping "cp8+0" [ 1346.919036][ T656] hfsplus: unable to parse mount options [ 1346.946097][ T660] BTRFS error (device loop1): open_ctree failed 05:31:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp8,0'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1347.270619][ T684] hfsplus: unable to load nls mapping "cp8" [ 1347.278063][ T684] hfsplus: unable to parse mount options [ 1347.374886][ T684] hfsplus: unable to load nls mapping "cp8" [ 1347.382293][ T684] hfsplus: unable to parse mount options [ 1347.390403][ T660] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1347.401122][ T690] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=690 comm=syz-executor.0 05:31:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp8-0'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1347.556982][ T660] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1347.577650][ T670] batman_adv: batadv0: Adding interface: veth2185 [ 1347.584117][ T670] batman_adv: batadv0: The MTU of interface veth2185 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1347.610882][ T670] batman_adv: batadv0: Interface activated: veth2185 [ 1347.631287][ T652] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=652 comm=syz-executor.0 [ 1347.653047][ T660] BTRFS error (device loop1): open_ctree failed [ 1347.660870][ T666] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:31:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed02a0008000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:42 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000bfc65915ce02ea9637cd64d25f14f20000100021", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) [ 1347.697172][ T691] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=691 comm=syz-executor.0 [ 1347.697397][ T652] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=652 comm=syz-executor.0 05:31:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d020000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1347.784274][ T691] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=691 comm=syz-executor.0 [ 1347.816028][ T704] hfsplus: unable to load nls mapping "cp8-0" [ 1347.822206][ T704] hfsplus: unable to parse mount options [ 1347.867942][ T691] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=691 comm=syz-executor.0 [ 1347.892994][ T652] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=652 comm=syz-executor.0 [ 1347.921317][ T710] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1347.943574][ T691] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=691 comm=syz-executor.0 05:31:42 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000bfc65915ce02ea9637cd64d25f14f20000100021", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) [ 1347.988679][ T720] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1348.009655][ T716] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1348.022431][ T704] hfsplus: unable to load nls mapping "cp8-0" [ 1348.057114][ T704] hfsplus: unable to parse mount options [ 1348.091084][ T710] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1348.112145][ T716] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:31:42 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r9 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r9, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) ioctl$VIDIOC_S_AUDIO(r9, 0x40345622, &(0x7f00000000c0)={0xc0000000, "36931f74e8137240987266b65a697c4cba570bee5fc3b4e778f5dd063e5d0328", 0x0, 0x1}) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:31:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp800'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1348.254542][ T725] batman_adv: batadv0: Adding interface: veth2187 [ 1348.286374][ T710] BTRFS error (device loop1): open_ctree failed [ 1348.297224][ T725] batman_adv: batadv0: The MTU of interface veth2187 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1348.366453][ T716] BTRFS error (device loop1): open_ctree failed [ 1348.388204][ T725] batman_adv: batadv0: Interface activated: veth2187 [ 1348.413256][ T710] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1348.524699][ T734] hfsplus: unable to load nls mapping "cp800" [ 1348.545276][ T734] hfsplus: unable to parse mount options [ 1348.562970][ T716] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1348.575331][ T710] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1348.592368][ T716] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:31:43 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000017c0)={0x2, [0x0, 0x0]}, &(0x7f0000001800)=0xc) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000001840)={r2, @in6={{0xa, 0x4e21, 0x1, @rand_addr="e3d8a3df09d9efc4b7ea8d8e961da73d", 0x7fff}}}, 0x84) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x2) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x1000f4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, @perf_bp={&(0x7f0000000300), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) fcntl$setstatus(r6, 0x4, 0xb51d22260b0da1d0) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0xffffffffffffff44, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[]}, 0x1, 0x0, 0x0, 0x8011}, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) r8 = semget$private(0x0, 0x3, 0x0) semctl$GETPID(r8, 0x0, 0xb, &(0x7f00000007c0)=""/4096) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x4b2febcacf8bf4a0, &(0x7f00000000c0), &(0x7f0000000780)=0x10) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x116, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[]}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000380)={"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"}) [ 1348.722271][ T734] hfsplus: unable to load nls mapping "cp800" [ 1348.734203][ T734] hfsplus: unable to parse mount options [ 1348.746123][ T710] BTRFS error (device loop1): open_ctree failed 05:31:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000001000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1348.836042][ T716] BTRFS error (device loop1): open_ctree failed 05:31:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d030000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:43 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp8=0'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1349.213875][ T761] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1349.273893][ T760] hfsplus: unable to load nls mapping "cp8=0" [ 1349.287367][ T760] hfsplus: unable to parse mount options [ 1349.318757][ T765] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:31:43 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r6, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r6, 0x0, 0x29, &(0x7f0000000140)={@multicast2, @loopback, 0x1}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e24, 0xe1, @empty, 0x2}}}, &(0x7f0000000140)=0x84) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x73, &(0x7f00000002c0)={r7, 0x6, 0x8, 0x5ff, 0xffffffffffffff8b}, &(0x7f0000000300)=0x18) r8 = fcntl$dupfd(r2, 0x0, r1) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)={0x8f6, 0x93}, 0xc) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r11}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r13 = socket$inet6(0xa, 0x2, 0x0) r14 = fcntl$dupfd(r13, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000440), 0x2, 0x5}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1349.434730][ T760] hfsplus: unable to load nls mapping "cp8=0" [ 1349.472589][ T761] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1349.512518][ T760] hfsplus: unable to parse mount options [ 1349.553486][ T765] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:31:44 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp8\\0'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1349.636110][ T761] BTRFS error (device loop1): open_ctree failed [ 1349.666763][ T765] BTRFS error (device loop1): open_ctree failed [ 1349.858767][ T765] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1349.888339][ T765] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:31:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x400000, 0x0) write$char_usb(r2, &(0x7f0000000380)="883418c9388f03f89e0e3072cb483b9b0d7f5c20004f78a6b7579382328167ae1dd6e9a4164e62af9063638ae715cc69191459e04b010fb217830d01e82c75177eee744b597cdd0a347b3381d7cb570acb892ddc0fa1614d842ddf3786699a2168992c569b11e31a1228ddf68ad07b450711d0f0187d7e82accb5282497dc7338a977e53102369c0eac3b0ea4f68abacaf05514c0fd9e307e87f75a0851fcbc4d08fd6de044aa127f34bead0e6327d01b9580e1662ef4aee0b70ef4ce3948c782c940d2fc57d5740d989b7cac93257e3e9aa61135ad9b9545974bfdd08816be36691f420571039575af020cc4fcffff01695", 0xf2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="000000090048d1000000e4e0ffff000000000000f7264c8cd2182dcca8a47bbb0c7245d4ae62987d87e79dd1d5a34ea86adff1ef4b834ff88626ea4dcbc2afc6a732de57570398b37bb0f4a01223c6cc9b783858bbaa03843daae05085bb3b9b815fe0de658df017ef217721bb112605b2c12d2d405efad04636c016f134ea010e5e6e8476804618505bcafbf5d16c523bc10791ad", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1349.950313][ T797] hfsplus: unable to load nls mapping "cp8\0" [ 1349.966435][ T765] BTRFS error (device loop1): open_ctree failed [ 1349.987151][ T797] hfsplus: unable to parse mount options [ 1350.119000][ T797] hfsplus: unable to load nls mapping "cp8\0" [ 1350.125112][ T797] hfsplus: unable to parse mount options 05:31:44 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp85\n'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:31:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d050000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1350.366223][ T817] hfsplus: unable to load nls mapping "cp85 [ 1350.366223][ T817] " [ 1350.377972][ T817] hfsplus: unable to parse mount options [ 1350.448693][ T822] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1350.474883][ T817] hfsplus: unable to load nls mapping "cp85 [ 1350.474883][ T817] " [ 1350.496755][ T817] hfsplus: unable to parse mount options [ 1350.552575][ T822] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1350.646636][ T822] BTRFS error (device loop1): open_ctree failed [ 1350.737384][ T822] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1350.787791][ T822] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1350.856044][ T822] BTRFS error (device loop1): open_ctree failed [ 1351.101134][ T841] IPVS: ftp: loaded support on port[0] = 21 [ 1352.554291][ T841] chnl_net:caif_netlink_parms(): no params data found [ 1352.610842][ T7] device bridge_slave_1 left promiscuous mode [ 1352.619888][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1352.682794][ T7] device bridge_slave_0 left promiscuous mode [ 1352.696454][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1357.936756][ T7] device hsr_slave_0 left promiscuous mode [ 1357.976406][ T7] device hsr_slave_1 left promiscuous mode [ 1358.055653][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1358.102513][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1358.119473][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1358.195118][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1358.375395][ T7] bond0 (unregistering): Released all slaves [ 1358.589069][ T841] bridge0: port 1(bridge_slave_0) entered blocking state [ 1358.606976][ T841] bridge0: port 1(bridge_slave_0) entered disabled state [ 1358.626956][ T841] device bridge_slave_0 entered promiscuous mode [ 1358.640816][ T841] bridge0: port 2(bridge_slave_1) entered blocking state [ 1358.656601][ T841] bridge0: port 2(bridge_slave_1) entered disabled state [ 1358.681909][ T841] device bridge_slave_1 entered promiscuous mode [ 1358.807905][ T841] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1358.840158][ T841] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1358.916963][ T841] team0: Port device team_slave_0 added [ 1358.937728][ T841] team0: Port device team_slave_1 added [ 1359.058327][ T841] device hsr_slave_0 entered promiscuous mode [ 1359.123133][ T841] device hsr_slave_1 entered promiscuous mode [ 1359.156089][ T841] debugfs: Directory 'hsr0' with parent '/' already present! [ 1359.211242][ T841] bridge0: port 2(bridge_slave_1) entered blocking state [ 1359.218368][ T841] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1359.226052][ T841] bridge0: port 1(bridge_slave_0) entered blocking state [ 1359.233118][ T841] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1359.361760][ T841] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1359.399470][ T9522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1359.409065][ T9522] bridge0: port 1(bridge_slave_0) entered disabled state [ 1359.417720][ T9522] bridge0: port 2(bridge_slave_1) entered disabled state [ 1359.440702][ T9522] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1359.473872][ T841] 8021q: adding VLAN 0 to HW filter on device team0 [ 1359.504313][ T9522] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1359.527103][ T9522] bridge0: port 1(bridge_slave_0) entered blocking state [ 1359.534219][ T9522] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1359.567797][T32742] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1359.577269][T32742] bridge0: port 2(bridge_slave_1) entered blocking state [ 1359.584335][T32742] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1359.617953][T31990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1359.629784][T31990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1359.639739][T31990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1359.649597][T31990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1359.659468][T31990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1359.678479][T32742] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1359.687290][T32742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1359.707186][T32742] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1359.716593][T32742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1359.737265][T32742] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1359.760697][ T841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1359.814961][ T841] 8021q: adding VLAN 0 to HW filter on device batadv0 05:31:54 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r1, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) ioctl$FICLONE(r1, 0x40049409, r2) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:31:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000002000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x53) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 05:31:54 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp85\"'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:31:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d060000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:54 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000440)={0x0, &(0x7f0000000140), &(0x7f0000000340), &(0x7f0000000380)=0x0, 0x36, 0x0, &(0x7f00000003c0)=""/71, 0x47, &(0x7f0000000640)=""/135}, 0x40) rt_sigqueueinfo(r5, 0x3b, &(0x7f0000000700)={0x41, 0x3ff, 0x80}) r6 = fcntl$dupfd(r4, 0x0, r3) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) r9 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x488080, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000780)={0x8001, 0x0, 0x0, 0x7}) ioctl$DRM_IOCTL_AGP_ALLOC(r9, 0xc0206434, &(0x7f00000007c0)={0x5, r10, 0x0, 0x2}) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="38000000100005070000000000000000000000001c469f4c38ae155ae7f02cf8407778fa7c9b63dc3d28ab4356d3f3a12eac05921b77ceaf860de48e333d7d1b9caa7f3e88b49ce793d1fd5289c89a34781aacbff398f038b9b0996e588666482db2e7ac46af7a714b40d0cd4fb5000400000800000012de78480c87331e6327fcc3921b7a871acba1585fd6dde8e145936b4c68355ebd0421d2ea4129f7d9f3c72d0bd62339be350b75535c51738cda4565d5a88937b0802816a2dd0def2d8d9235c786f3e6075a080053e3738163371a73f3900d32cc0e48390173fdc300254224979e30b225e11cc7a8c889b6c79b5ae07476adb6b504cb6e259f545a379dbf249f67b57b7351c23b167a80068737f5384c1eab70022c9900000000", @ANYRES32=r11, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r11], 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) r12 = socket$bt_cmtp(0x1f, 0x3, 0x5) accept4(r12, &(0x7f00000002c0)=@alg, &(0x7f00000000c0)=0x80, 0x0) [ 1360.150063][ T976] selinux_nlmsg_perm: 791 callbacks suppressed [ 1360.150150][ T976] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5465 sclass=netlink_route_socket pig=976 comm=syz-executor.4 [ 1360.272076][ T986] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1360.309268][ T987] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1360.334059][ T980] hfsplus: unable to load nls mapping "cp85"" [ 1360.370113][ T980] hfsplus: unable to parse mount options [ 1360.377819][ T984] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1360.395823][ T987] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1360.472628][ T984] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1360.514938][ T980] hfsplus: unable to load nls mapping "cp85"" [ 1360.523596][ T980] hfsplus: unable to parse mount options 05:31:55 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp85#'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:31:55 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r1, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) ioctl$FICLONE(r1, 0x40049409, r2) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1360.607398][ T1001] batman_adv: batadv0: Adding interface: veth2189 [ 1360.646519][ T987] BTRFS error (device loop1): open_ctree failed [ 1360.657726][ T1001] batman_adv: batadv0: The MTU of interface veth2189 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1360.687182][ T984] BTRFS error (device loop1): open_ctree failed [ 1360.695251][ T1001] batman_adv: batadv0: Interface activated: veth2189 05:31:55 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f00000000c0)) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32, @ANYBLOB="634802000000000008020a0014000000d85c395d0a6de2105c35a6e2f19ca9628d3096055da04b25bb9bb554e9067c72dd734b61fd8e8df1ef1df18551afebaa7a350452a453c4e3fc3f6773dcf4e81f57d6157d49685e030165c381b318c8f08bb7ee5a456156e30d6bc455fe854c1f2452d299ef4844c70a56054553da1eab75d6236d2829dfb5b0faf16c42399659e1186725048c3148c64dda77e62970427fb3bb7bd1311b742f86df2ba9f6c17e179dd618d86b6e615f8a938bb6bc0620ee18300eceba717c9521e9e7703a97420879af3c30f3e8a18074992bbad957ffffff7f08fb32911541054a253ca352fae6c8564c2e922c3927feafd420e567b9b9188e0dc6acc77db07ec67e0915f7f7d30f32fba432d4e7561c4fd43527c9fa23d85f87"], 0x3}}, 0x0) [ 1360.705625][ T997] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 05:31:55 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r11 = socket$inet6(0xa, 0x2, 0x0) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$GIO_CMAP(r12, 0x4b70, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$KVM_SET_MP_STATE(r9, 0x4004ae99, &(0x7f00000000c0)=0x2) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r0, 0x28, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={r14, 0x6, 0x30}, 0xc) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3800000010200507000000b5cca429000000000094e91483d9fbc8332359caf3af42980f824a2e1b9c01958214f6a4f577d8bb4625e1ac9bbc3c5bf8", @ANYRES32=r15, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r15], 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r15}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1360.866316][ T987] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1360.927336][ T1008] hfsplus: unable to load nls mapping "cp85#" [ 1360.933475][ T1008] hfsplus: unable to parse mount options [ 1360.944054][ T984] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1360.969410][ T987] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1361.008492][ T984] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1361.167040][ T1008] hfsplus: unable to load nls mapping "cp85#" [ 1361.176735][ T1008] hfsplus: unable to parse mount options [ 1361.195602][ T1033] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8208 sclass=netlink_route_socket pig=1033 comm=syz-executor.0 05:31:55 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp85%'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1361.226188][ T987] BTRFS error (device loop1): open_ctree failed [ 1361.316283][ T984] BTRFS error (device loop1): open_ctree failed [ 1361.422825][ T1038] hfsplus: unable to load nls mapping "cp85%" [ 1361.431716][ T1038] hfsplus: unable to parse mount options 05:31:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d070000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:56 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r1, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) ioctl$FICLONE(r1, 0x40049409, r2) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:31:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000003000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1361.476239][ T1020] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1361.493914][ T1026] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1026 comm=syz-executor.0 [ 1361.513307][ T1024] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1361.553930][ T1026] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1026 comm=syz-executor.0 [ 1361.590265][ T1026] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1026 comm=syz-executor.0 05:31:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 05:31:56 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp85+'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1361.657624][ T1043] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1361.673378][ T1026] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1026 comm=syz-executor.0 [ 1361.688222][ T1026] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1026 comm=syz-executor.0 [ 1361.703506][ T1026] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1026 comm=syz-executor.0 [ 1361.731878][ T1026] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1026 comm=syz-executor.0 [ 1361.791358][ T1043] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1361.831353][ T1056] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1361.841165][ T1026] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1026 comm=syz-executor.0 05:31:56 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000bfc65915ce02ea9637cd64d25f14f20000100021", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1361.911169][ T1058] hfsplus: unable to load nls mapping "cp85+" [ 1361.924470][ T1058] hfsplus: unable to parse mount options [ 1361.947197][ T1043] BTRFS error (device loop1): open_ctree failed [ 1361.997181][ T1047] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1362.060976][ T1064] batman_adv: batadv0: Adding interface: veth2191 [ 1362.096666][ T1064] batman_adv: batadv0: The MTU of interface veth2191 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1362.126406][ T1064] batman_adv: batadv0: Interface activated: veth2191 [ 1362.216697][ T1058] hfsplus: unable to load nls mapping "cp85+" [ 1362.225156][ T1058] hfsplus: unable to parse mount options 05:31:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000004000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:56 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) recvmsg$kcm(r11, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)=""/94, 0x5e}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x2, &(0x7f0000001380)=""/211, 0xd3}, 0x40000040) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r8, @ANYBLOB="000000000000f10f18b0120008000000007469000c00020000000000", @ANYRES32=r8], 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1362.297270][ T1043] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:31:56 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp85,'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:31:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r4, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) r5 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r5, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000480)=@assoc_value={0x0, 0x4}, &(0x7f0000000840)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r8, 0x84, 0x75, &(0x7f00000008c0)={r9, 0x76}, 0x8) r10 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r10, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES32=r2, @ANYRESHEX], 0x2}}, 0x4000080) io_setup(0x40002100000008, &(0x7f0000000100)=0x0) io_submit(r11, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000000000000, 0x0, 0x8, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x377140be6b5ef4c7}]) io_getevents(r11, 0x8, 0x4, &(0x7f0000000240)=[{}, {}, {}, {}], &(0x7f0000000140)={0x77359400}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r13 = socket$inet6(0xa, 0x2, 0x0) r14 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r14, 0x0, 0x487, &(0x7f0000000400)={{0x16, @multicast2, 0x4e23, 0x2, 'wlc\x00', 0x10, 0x2, 0x7a}, {@rand_addr=0xdfbb, 0x4e24, 0x1, 0x401, 0x8000, 0x4000}}, 0x44) r15 = fcntl$dupfd(r13, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) sendmsg$nl_route(r15, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x6000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)=@ipv4_newrule={0x54, 0x20, 0x200, 0x70bd2d, 0x25dfdbfe, {0x2, 0x80, 0x20, 0xd2, 0x3, 0x0, 0x0, 0x5}, [@FRA_GENERIC_POLICY=@FRA_SPORT_RANGE={0x8, 0x17, {0x4e20, 0x4e20}}, @FRA_SRC={0x8, 0x2, @multicast1}, @FRA_DST={0x8, 0x1, @multicast2}, @FRA_GENERIC_POLICY=@FRA_OIFNAME={0x14, 0x11, 'ipddp0\x00'}, @FRA_DST={0x8, 0x1, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x1) r16 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x20, 0x0) r17 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm-monitor\x00', 0x100400, 0x0) ioctl$VHOST_GET_VRING_BASE(r17, 0xc008af12, &(0x7f0000000500)) r18 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r16, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0x154, r18, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x84, 0x1, [@TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth1_to_bridge\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb38c}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x154}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1362.479519][ T1043] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1362.493038][ T1089] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1362.586112][ T1043] BTRFS error (device loop1): open_ctree failed 05:31:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d090000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1362.656667][ T1091] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:31:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) accept$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000400)=0x14) sendmsg$xdp(r8, &(0x7f0000000880)={&(0x7f0000000440)={0x2c, 0x1, r9, 0x27}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000480)="2cff272f37bc625656a7e02d4ca01732f2ed30554bee473d5eb00ffeb22144ec5f5a56e2376be8ae5271e7b9265a54bad4521d3070a3924852b1d998d01fd5af312750fca3fdfebe7dc4af7956e44cd9d35df661e64d97845b2e706844e16a86ead835d8164902ec7a00e52eaf0bf230dd0e1df535d39f5ac26e612d3886f726fde9a5d002c7df28ec5940ea8ac7c2c32a323c04c23d78260b8ca4b17c489e8d66b94e281e5d15037902e36349ba89daa674783d7459be771d80bf572ea937af999f511f56cdfbd67921c5624857117120ac2ce7ef0f0bc32bd9d96cff3ad610", 0xe0}, {&(0x7f0000000580)="158b0517240d0162bfbe2c9e6e9b52082b05cfa03f7d85a6577a9b733ca44bd0749a86ffc69a3d1fe34a3fbf2747d59f774157eb736569cd967354ec40eb4ce1d6544b5aaed7590906a700078b1d72f2f741d7e1db20980bbd3ffb08846e3c94426f981ea0604234769aed0f9729b5534c63aa1764d449d08df4c58e778aaf3f01f70c683a9730d5678ffb88f55369e0313bf3655c01cb0436cc43646d5a0390388e618fb933ead2b937ee6d722cb5260ef8342e083dd664d9dcb6666154020a5700ea454b1c7f16d070d3c751e20000feb0e6ae77bf7801dbb210714f10be32705098", 0xe3}, {&(0x7f0000000680)="ebdfe97078d436cd8be0cfcb2aeb43f22859b1f3bafb747cc8627a8b1870cd4406e8b7cb72f14d2442a9d387a842184a31833ec9e2a3e9994bfa4c67e3adec751a158ba4de173f91f9784fd848db6d05aad83c22a808f6893576b63df2b8ec9742ef71a4d9b835f7e25e40accb998f1b27d46aeb2ed1dabcdf49749a5a4e61a3ca3de811e2d6a06258493f73f096264427425ec851cd3c9650e58b08c5006d0bb5761c2e0cf78065ba058bf03e4ac6eba62f8789d4e8e750a94c179d23a1b7cee8842a9020", 0xc5}, {&(0x7f0000000780)="773401dc21a9e16b0c82a3d90c9d9f9a7db1ca0cf7f3accdec4fbbbd298f3abe4b64f1a4986ea0798de85ab1da59b22a18d81747b3d32977a5a7b1e7a5404f5e2eb46744f0f3dc1f26191870689ed220735ce297ab52d89c3213e478b57d25a6b9cc24b8043f7b5ae9b764ff6a005806736bc7309cacbc1a2d94ccf853bc495e11896fa6265acb6c35724335dc8eb0dfe319ce1dd31e548fcb0c2093331929a2b61d65c548b5e3c571afeeab7be914e5dbf8ea46c4f0a6917de792968a9c6c", 0xbf}], 0x4, 0x0, 0x0, 0x85c0d6440af693ce}, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r12 = socket$inet6(0xa, 0x2, 0x0) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$SG_GET_SG_TABLESIZE(r13, 0x227f, &(0x7f0000000140)) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="4800000005000000000000000000800000000000", @ANYRES32=r10, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a558b0fe47fddd1cd3a8e6a5d9b89f6e549db6a8e3d1b42066f82e8515a7956d7e447875c941c8fee334fc8f4b70109ec8867cb9e746fe733e398970c7e1fd342a24ead797eb75950ec62e647b961e1825a508af81b0318049b62df"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="28000000100025d1423f1dfa75b04600000000003cd726c86913595ef882c1662e47be1a456dd7be2df06e0c2d7942700197276802", @ANYRES32=r10, @ANYBLOB="634802000000000008000a0014000000"], 0x28}}, 0x0) [ 1362.778357][ T1096] hfsplus: unable to load nls mapping "cp85" [ 1362.784584][ T1096] hfsplus: unable to parse mount options [ 1362.926242][ T1106] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1362.962901][ T1105] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1363.018213][ T1096] hfsplus: unable to load nls mapping "cp85" [ 1363.030661][ T1106] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1363.035637][ T1096] hfsplus: unable to parse mount options 05:31:57 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp85-'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:31:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000005000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1363.186177][ T1106] BTRFS error (device loop1): open_ctree failed 05:31:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000140)={0x0, 0xffff}, 0x8) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd19b2a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="28000000100025080000000000000000000000009c1a92cee5806cd8a15b853f2defa5a0bf82ac6231d59a8aab26633c13e49b9d517dbc663400ed6f65055f9e49deeec55fc5aa85f95f98c195729c4a59c6353efd7de8bf5d4c5bcf72", @ANYRES32=r6, @ANYBLOB="634802000000000008000a0014000000"], 0x28}}, 0x0) [ 1363.292586][ T1123] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 05:31:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d0a0000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:31:58 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000380)=ANY=[@ANYBLOB="3400006c7bdbdb1311ebef0000000039dc90b949717bdac45804c7534e71b3bf5e3a909a57842293c65be8230090cf4d700966abd72ad86b40275c7065f007e6f489f5c58a85662134f0f19b21f28257903c3938a1a23c097b130ecbf7bc046a3cb9451f71a126452b8603f555176c80d2ab0095527600", @ANYRES32=r8, @ANYBLOB="0000000000000000140003006a85dd3a9029edbb3a00000000bc0000"], 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1363.459576][ T1130] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1363.478910][ T1127] hfsplus: unable to load nls mapping "cp85-" [ 1363.502999][ T1127] hfsplus: unable to parse mount options [ 1363.646957][ T1127] hfsplus: unable to load nls mapping "cp85-" [ 1363.664573][ T1127] hfsplus: unable to parse mount options [ 1363.720486][ T1150] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1363.816137][ T1150] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1363.966223][ T1150] BTRFS error (device loop1): open_ctree failed [ 1364.367290][ T1138] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1364.434305][ T1150] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1364.478789][ T1140] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1364.539291][ T1150] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1364.686398][ T1150] BTRFS error (device loop1): open_ctree failed [ 1365.897487][ T1190] IPVS: ftp: loaded support on port[0] = 21 [ 1366.121643][ T7] device bridge_slave_1 left promiscuous mode [ 1366.129101][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1366.189076][ T7] device bridge_slave_0 left promiscuous mode [ 1366.195304][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1369.286472][ T7] device hsr_slave_0 left promiscuous mode [ 1369.326153][ T7] device hsr_slave_1 left promiscuous mode [ 1369.395422][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1369.412629][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1369.432058][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1369.512169][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1369.651432][ T7] bond0 (unregistering): Released all slaves [ 1369.769687][ T1190] chnl_net:caif_netlink_parms(): no params data found [ 1369.822116][ T1190] bridge0: port 1(bridge_slave_0) entered blocking state [ 1369.830138][ T1190] bridge0: port 1(bridge_slave_0) entered disabled state [ 1369.852411][ T1190] device bridge_slave_0 entered promiscuous mode [ 1369.861746][ T1190] bridge0: port 2(bridge_slave_1) entered blocking state [ 1369.869644][ T1190] bridge0: port 2(bridge_slave_1) entered disabled state [ 1369.879098][ T1190] device bridge_slave_1 entered promiscuous mode [ 1369.923895][ T1190] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1369.938078][ T1190] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1370.080027][ T1190] team0: Port device team_slave_0 added [ 1370.119337][ T1190] team0: Port device team_slave_1 added [ 1370.242896][ T1190] device hsr_slave_0 entered promiscuous mode [ 1370.299230][ T1190] device hsr_slave_1 entered promiscuous mode [ 1370.336054][ T1190] debugfs: Directory 'hsr0' with parent '/' already present! [ 1370.382764][ T1190] bridge0: port 2(bridge_slave_1) entered blocking state [ 1370.389904][ T1190] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1370.397292][ T1190] bridge0: port 1(bridge_slave_0) entered blocking state [ 1370.404360][ T1190] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1370.545484][ T1190] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1370.588068][T32199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1370.598085][T32199] bridge0: port 1(bridge_slave_0) entered disabled state [ 1370.606690][T32199] bridge0: port 2(bridge_slave_1) entered disabled state [ 1370.628547][T32199] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1370.660699][ T1190] 8021q: adding VLAN 0 to HW filter on device team0 [ 1370.683632][T32199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1370.706853][T32199] bridge0: port 1(bridge_slave_0) entered blocking state [ 1370.713943][T32199] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1370.747905][T32199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1370.756946][T32199] bridge0: port 2(bridge_slave_1) entered blocking state [ 1370.764005][T32199] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1370.790953][T32387] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1370.802377][T32387] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1370.822698][T32387] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1370.831652][T32387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1370.841066][T32387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1370.850730][T32387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1370.867751][T32387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1370.890011][ T1190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1370.946135][ T1190] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1371.325293][ T1198] selinux_nlmsg_perm: 2472 callbacks suppressed [ 1371.325339][ T1198] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5465 sclass=netlink_route_socket pig=1198 comm=syz-executor.4 05:32:05 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000bfc65915ce02ea9637cd64d25f14f20000100021", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:32:05 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r8, @ANYBLOB="00000000000000001800120008000100767469000c0002000800017700", @ANYRES32=r8], 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=ANY=[@ANYBLOB="34000000130005e15d2448c881fc7c4900000000", @ANYRES32=r8, @ANYBLOB="0000000000000000140003006a85dd3a9029edbb3a00000000bc0000"], 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x3, 0x3, 0x6, 'queue1\x00', 0x4}) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) socket$inet6_tcp(0xa, 0x1, 0x0) 05:32:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000006000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:32:05 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp85='}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) 05:32:05 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r3) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f0000000180)=0x4) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000100)={r7, 0x1a}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000300)={r7, 0x4}, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000240)={r7, @in={{0x2, 0x4e20, @broadcast}}}, 0x84) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="48007c9a00001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) 05:32:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d0b0000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1371.483732][ T1205] hfsplus: unable to load nls mapping "cp85=" [ 1371.495298][ T1204] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1371.537363][ T1200] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1200 comm=syz-executor.2 [ 1371.553715][ T1205] hfsplus: unable to parse mount options [ 1371.626065][ T1204] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:32:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x6) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20900000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)={0x390, r7, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0xc0, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6b}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x15e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}]}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x144, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x200, 0x6, @ipv4={[], [], @loopback}, 0x31b4}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x80000000, @dev={0xfe, 0x80, [], 0x11}, 0x2}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'vxcan1\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x80000001, @empty, 0x80}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x4, @dev={0xfe, 0x80, [], 0x1c}, 0xfffffffc}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e24, @rand_addr=0x80000001}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21}}, {0x14, 0x2, @in={0x2, 0x4e24, @loopback}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x96}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @remote}}, {0x14, 0x2, @in={0x2, 0x4e20, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8cd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xcbc0}]}]}, @TIPC_NLA_LINK={0x50, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8c1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffa14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa703}]}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x800}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffb}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffe1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6140}]}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3c}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x50}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}]}]}, 0x390}, 0x1, 0x0, 0x0, 0x1}, 0x4) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1371.680266][ T1205] hfsplus: unable to load nls mapping "cp85=" [ 1371.711773][ T1205] hfsplus: unable to parse mount options [ 1371.757180][ T1204] BTRFS error (device loop1): open_ctree failed 05:32:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp85\\'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1371.892838][ T1204] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1371.994705][ T1240] hfsplus: unable to load nls mapping "cp85\" [ 1372.009376][ T1240] hfsplus: unable to parse mount options [ 1372.102392][ T1240] hfsplus: unable to load nls mapping "cp85\" [ 1372.113364][ T1240] hfsplus: unable to parse mount options 05:32:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp85]'}}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1372.324289][ T1204] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1372.333345][ T1214] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1214 comm=syz-executor.0 [ 1372.355436][ T1214] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1214 comm=syz-executor.0 05:32:06 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000bfc65915ce02ea9637cd64d25f14f20000100021", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1372.364449][ T1227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1227 comm=syz-executor.0 [ 1372.389004][ T1255] hfsplus: unable to load nls mapping "cp85]" [ 1372.399330][ T1255] hfsplus: unable to parse mount options [ 1372.428065][ T1214] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1214 comm=syz-executor.0 05:32:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) socket$netlink(0x10, 0x3, 0x12) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 05:32:07 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}, 0x22}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1372.475854][ T1214] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1214 comm=syz-executor.0 [ 1372.489988][ T1227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1227 comm=syz-executor.0 05:32:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000007000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1372.571013][ T1227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1227 comm=syz-executor.0 05:32:07 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000bfc65915ce02ea9637cd64d25f14f20000100021", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1372.626208][ T1204] BTRFS error (device loop1): open_ctree failed [ 1372.642257][ T1265] __nla_validate_parse: 1 callbacks suppressed [ 1372.642303][ T1265] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1372.664939][ T1214] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1214 comm=syz-executor.0 05:32:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d0f0000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:32:07 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r3, 0xc050561a, &(0x7f0000000040)={0xffffffe1, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) r4 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r4, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba904b00ef3af00"}) dup3(r3, r4, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000001000050700000000e9ffffff00000000885752ddee45fc9c22c4596f8e3ac223751738e9a0629b91312c17a9f0e942095895a8569ba5d2ab29cec0fbef2a85b23d48de238bde3915aea2db65fd68f6277761c5a746a374f4bde3da43c5ddc0fcf1318a9a0784976dcba51fba4448bb22d9c123731841a68bda9e2eaa8c58f8cd2fce6cc7f2a50c73a0b99eaab5416c6aca243ce0aff49617f93eff8e96f1e1d04799cfd13d4c6211fc0b33c50b84aa20e4f83d4f20e8bef04f82ce56878ad87a2cfa9f8c320016a308c57576ba808604627bae64e2", @ANYRES32=r10, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r10], 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r10}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1372.845814][ T1262] hfsplus: unable to load nls mapping "cp850"nls=iso8859-3" [ 1372.846916][ T1272] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1372.874541][ T1262] hfsplus: unable to parse mount options [ 1372.876883][ T1267] batman_adv: batadv0: Adding interface: veth2195 [ 1372.975148][ T1267] batman_adv: batadv0: The MTU of interface veth2195 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 05:32:07 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}, 0x3d}, {@nls={'nls', 0x3d, 'iso8859-3'}}]}) [ 1373.070698][ T1281] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1373.101706][ T1272] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1373.135199][ T1267] batman_adv: batadv0: Interface activated: veth2195 [ 1373.156180][ T1281] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1373.246235][ T1272] BTRFS error (device loop1): open_ctree failed [ 1373.286879][ T1281] BTRFS error (device loop1): open_ctree failed [ 1373.300543][ T1295] hfsplus: unable to load nls mapping "cp850=nls=iso8859-3" [ 1373.333311][ T1295] hfsplus: unable to parse mount options [ 1373.384690][ T1272] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1373.569131][ T1295] hfsplus: unable to load nls mapping "cp850=nls=iso8859-3" [ 1373.587046][ T1295] hfsplus: unable to parse mount options [ 1373.608118][ T1281] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:32:08 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'\nls', 0x3d, 'iso8859-3'}}]}) [ 1373.709380][ T1281] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1373.806289][ T1281] BTRFS error (device loop1): open_ctree failed [ 1373.915113][ T1314] hfsplus: unable to parse mount options [ 1373.961032][ T1290] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1373.985114][ T1265] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:32:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x2, 0x2000) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc008ae09, &(0x7f00000002c0)=""/86) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0f06554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd057729810098bb7d8deaaaf29370f665fd", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) r5 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x7, 0x4507c0) ioctl$PPPIOCGFLAGS1(r5, 0x8004745a, &(0x7f0000000240)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r7, 0x0, r6) setsockopt$sock_linger(r6, 0x1, 0xd, &(0x7f0000000340)={0x1, 0xc78}, 0x8) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="280000001000250800d0d3837c3d9bd15a978f11af544fac568e5300000000", @ANYRES32=r4, @ANYBLOB="634802000000000008000a0014000000"], 0x28}}, 0x0) [ 1374.018973][ T1314] hfsplus: unable to parse mount options 05:32:08 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'\"ls', 0x3d, 'iso8859-3'}}]}) 05:32:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000008000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:32:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d100000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1374.224006][ T1327] hfsplus: unable to parse mount options [ 1374.246324][ T1312] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1374.262676][ T1323] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:32:08 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r6}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1374.296955][ T1327] hfsplus: unable to parse mount options [ 1374.324062][ T1324] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 05:32:08 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'%ls', 0x3d, 'iso8859-3'}}]}) [ 1374.497263][ T1334] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1374.521188][ T1342] hfsplus: unable to parse mount options [ 1374.601383][ T1342] hfsplus: unable to parse mount options [ 1374.610856][ T1346] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1374.627290][ T1334] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1374.677170][ T1323] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1374.691697][ T1332] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 05:32:09 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={',ls', 0x3d, 'iso8859-3'}}]}) [ 1374.728971][ T1346] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1374.846071][ T1334] BTRFS error (device loop1): open_ctree failed [ 1374.906495][ T1346] BTRFS error (device loop1): open_ctree failed [ 1374.980670][ T1334] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1375.007488][ T1362] hfsplus: unable to parse mount options [ 1375.119274][ T1362] hfsplus: unable to parse mount options [ 1375.236272][ T1346] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1375.282238][ T1369] IPVS: ftp: loaded support on port[0] = 21 [ 1375.375184][ T1346] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1375.456142][ T1346] BTRFS error (device loop1): open_ctree failed [ 1376.250303][ T1369] chnl_net:caif_netlink_parms(): no params data found [ 1376.408992][ T7] device bridge_slave_1 left promiscuous mode [ 1376.415213][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1376.498333][ T7] device bridge_slave_0 left promiscuous mode [ 1376.504573][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1379.616457][ T7] device hsr_slave_0 left promiscuous mode [ 1379.656125][ T7] device hsr_slave_1 left promiscuous mode [ 1379.728299][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1379.743901][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1379.764007][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1379.826411][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1379.928097][ T7] bond0 (unregistering): Released all slaves [ 1380.102648][ T1369] bridge0: port 1(bridge_slave_0) entered blocking state [ 1380.111722][ T1369] bridge0: port 1(bridge_slave_0) entered disabled state [ 1380.121448][ T1369] device bridge_slave_0 entered promiscuous mode [ 1380.130996][ T1369] bridge0: port 2(bridge_slave_1) entered blocking state [ 1380.138692][ T1369] bridge0: port 2(bridge_slave_1) entered disabled state [ 1380.148788][ T1369] device bridge_slave_1 entered promiscuous mode [ 1380.184000][ T1369] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1380.198015][ T1369] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1380.288529][ T1369] team0: Port device team_slave_0 added [ 1380.308473][ T1369] team0: Port device team_slave_1 added [ 1380.422289][ T1369] device hsr_slave_0 entered promiscuous mode [ 1380.484616][ T1369] device hsr_slave_1 entered promiscuous mode [ 1380.516100][ T1369] debugfs: Directory 'hsr0' with parent '/' already present! [ 1380.678621][ T1369] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1380.722549][T32199] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1380.752219][T32199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1380.760816][T32199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1380.781918][ T1369] 8021q: adding VLAN 0 to HW filter on device team0 [ 1380.812796][T31990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1380.827236][T31990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1380.846349][T31990] bridge0: port 1(bridge_slave_0) entered blocking state [ 1380.853428][T31990] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1380.886660][T31990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1380.907274][T31990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1380.928346][T31990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1380.946538][T31990] bridge0: port 2(bridge_slave_1) entered blocking state [ 1380.953601][T31990] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1381.011733][T32742] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1381.027784][T32742] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1381.047582][T32742] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1381.087638][T32387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1381.097009][T32387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1381.107704][ T1369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1381.160691][ T1369] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1381.560081][ T1402] selinux_nlmsg_perm: 228 callbacks suppressed [ 1381.560220][ T1402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5465 sclass=netlink_route_socket pig=1402 comm=syz-executor.4 05:32:16 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000bfc65915ce02ea9637cd64d25f14f20000100021", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:32:16 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'n\ns', 0x3d, 'iso8859-3'}}]}) 05:32:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x29e, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[], 0x5}}, 0x0) r3 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r3, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) r4 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r4, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) r5 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r5, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) r6 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r6, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x1e1, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[]}}, 0x0) sync() r7 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r7, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r7, 0x0, 0x29, &(0x7f0000000140)={@empty, @loopback, 0x1}, 0x10) getsockopt$IP_VS_SO_GET_INFO(r7, 0x0, 0x481, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r8 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x0, 0x810000) setsockopt$inet6_int(r8, 0x29, 0xc8, &(0x7f0000000240)=0x869, 0x4) 05:32:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000009000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:32:16 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) openat$cgroup_ro(r10, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r11}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:32:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d140000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1381.692381][ T1409] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1381.729692][ T1408] hfsplus: unable to parse mount options [ 1381.805880][ T1414] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1414 comm=syz-executor.0 [ 1381.856278][ T1414] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1414 comm=syz-executor.0 [ 1381.878102][ T1408] hfsplus: unable to parse mount options 05:32:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_GET_MSR_INDEX_LIST(r3, 0xc004ae02, &(0x7f0000000140)={0x1, [0x0]}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@ipv4_getrule={0x20, 0x22, 0x100, 0x70bd2c, 0x25dfdbfe, {0x2, 0x14, 0x20, 0xce, 0x0, 0x0, 0x0, 0x7, 0x1}, ["", ""]}, 0x20}}, 0x0) [ 1381.913763][ T1414] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1414 comm=syz-executor.0 05:32:16 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'n\"s', 0x3d, 'iso8859-3'}}]}) [ 1381.980928][ T1414] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1414 comm=syz-executor.0 [ 1381.998451][ T1421] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1382.045628][ T1414] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1414 comm=syz-executor.0 [ 1382.079306][ T1414] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1414 comm=syz-executor.0 [ 1382.112300][ T1421] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1382.150649][ T1414] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1414 comm=syz-executor.0 [ 1382.196700][ T1414] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1414 comm=syz-executor.0 [ 1382.209939][ T1421] BTRFS error (device loop1): open_ctree failed [ 1382.217429][ T1409] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1382.233765][ T1442] hfsplus: unable to parse mount options [ 1382.258841][ T1414] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1414 comm=syz-executor.0 [ 1382.389203][ T1442] hfsplus: unable to parse mount options 05:32:17 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'n#s', 0x3d, 'iso8859-3'}}]}) [ 1382.569823][ T1459] hfsplus: unable to parse mount options [ 1382.644559][ T1459] hfsplus: unable to parse mount options 05:32:17 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'n%s', 0x3d, 'iso8859-3'}}]}) [ 1382.769495][ T1421] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1382.797163][ T1409] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1382.817088][ T1465] hfsplus: unable to parse mount options [ 1382.819204][ T1444] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1382.847424][ T1421] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:32:17 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000bfc65915ce02ea9637cd64d25f14f20000100021", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1382.925634][ T1444] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:32:17 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) setsockopt$sock_void(r4, 0x1, 0x12, 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r6 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r6, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r6, 0x0, 0x29, &(0x7f0000000140)={@multicast2, @loopback, 0x1}, 0x10) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f0000000180)=0x4) r8 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r8, 0x84, 0x18, &(0x7f0000000100)={r9, 0x1a}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r7, 0x84, 0x7b, &(0x7f0000000300)={r9, 0x4}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r6, 0x84, 0x23, &(0x7f00000000c0)={r9, 0xc635}, 0x8) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r12, 0x84, 0x2, &(0x7f0000000380), &(0x7f00000003c0)=0x8) r13 = fcntl$dupfd(r11, 0x0, r10) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r16, @ANYBLOB="0000000000000000180012004bff0100777469000c0002000000060001040000"], 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r16}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1382.986293][ T1409] BTRFS error (device loop1): open_ctree failed 05:32:17 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'n*s', 0x3d, 'iso8859-3'}}]}) 05:32:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x516a00, 0x0) ioctl$VIDIOC_G_EDID(r3, 0xc0285628, &(0x7f0000000280)={0x0, 0x9, 0x5, [], &(0x7f0000000240)=0xae}) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x10001, 0x0) r6 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r6, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r6) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x44}, 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=@deltfilter={0x238, 0x2d, 0x10, 0x70bd27, 0x25dfdbfd, {0x0, 0x0, 0x0, r4, {0x3, 0x1b}, {0x9, 0x6}, {0xffea, 0xffff}}, [@filter_kind_options=@f_basic={{0xc, 0x1, 'basic\x00'}, {0x1f4, 0x2, [@TCA_BASIC_ACT={0x74, 0x3, @m_gact={0x70, 0x15, {{0xc, 0x1, 'gact\x00'}, {0x28, 0x2, [@TCA_GACT_PROB={0xc, 0x3, {0x2, 0x432, 0x3}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x26fe, 0x6}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0x91a}}]}, {0x34, 0x6, "938d98efe7e09e834a9aad1f69cb7d629b0584eca06002bf28ef0a227564487fb03aad0c201ad3789c504ba222"}}}}, @TCA_BASIC_EMATCHES={0x170, 0x2, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x6}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x2}}, @TCA_EMATCH_TREE_LIST={0x24, 0x2, @TCF_EM_U32={0x20, 0x0, {0x0, 0x3, 0x4000, 0x0, {0x9, 0xffffffff, 0x9, 0x46}}}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xb0}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xc0}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x400}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x4}}, @TCA_EMATCH_TREE_LIST={0xf4, 0x2, @TCF_EM_CONTAINER={0xf0, 0x9, {0x0, 0x0, 0x0, 0x0, "7a8074bbe3efe00f497ee4c339ba9806725113ccf9473fad42ad6c20c5b138c9274276b7440e5401e745744384451c0d9727634e517abe2b2650299800b439fbb9e568092bdd144eae60019e5f797c48489f67ecbe6fdc034c0643013510b65e1350a69434b3f63053a5828cfd2e1e3453fa7b921f45b0b403c5ea82687a705c2b2fe33137030094694721e0c0f0cc005df860ccd9ad0deb4df411aba9b183bf9c38cff74af5af03c5811973bcd67e5aa571e3f6e833e0c8ca5c3ccd31856cbe3ac23ea773c59268701eb06755c0377b5445a8c3aa339900bb184052c2"}}}, @TCA_EMATCH_TREE_LIST={0x24, 0x2, @TCF_EM_NBYTE={0x20, 0x5, {0xfc5c, 0x2, 0x8, 0x0, {0x10001, 0x6, 0x0, "b84dc2b8d377"}}}}]}, @TCA_BASIC_POLICE={0xc, 0x4, @TCA_POLICE_AVRATE={0x8, 0x4, 0x4}}]}}, @TCA_RATE={0x8, 0x5, {0x4, 0x6}}, @TCA_CHAIN={0x8, 0xb, 0x1000}]}, 0x238}, 0x1, 0x0, 0x0, 0x800}, 0x80) [ 1383.046506][ T1421] BTRFS error (device loop1): open_ctree failed 05:32:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed020000000a000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:32:17 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) ioctl$FICLONE(r2, 0x40049409, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000bfc65915ce02ea9637cd64d25f14f20000100021", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1383.157001][ T1472] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 05:32:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d250000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1383.271439][ T1475] hfsplus: unable to parse mount options [ 1383.294221][ T1481] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1383.301609][ T1483] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1383.421691][ T1475] hfsplus: unable to parse mount options [ 1383.469957][ T1488] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:32:18 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'n+s', 0x3d, 'iso8859-3'}}]}) [ 1383.524921][ T1488] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1383.641680][ T1492] batman_adv: batadv0: Adding interface: veth2201 [ 1383.668641][ T1488] BTRFS error (device loop1): open_ctree failed [ 1383.675576][ T1481] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1383.697853][ T1501] hfsplus: unable to parse mount options [ 1383.709191][ T1492] batman_adv: batadv0: The MTU of interface veth2201 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1383.813495][ T1492] batman_adv: batadv0: Interface activated: veth2201 05:32:18 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'n,s', 0x3d, 'iso8859-3'}}]}) 05:32:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed020000000b000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1383.997715][ T1512] hfsplus: unable to parse mount options 05:32:18 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'n-s', 0x3d, 'iso8859-3'}}]}) [ 1384.309822][ T1526] hfsplus: unable to parse mount options [ 1384.376769][ T1526] hfsplus: unable to parse mount options 05:32:19 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'n.s', 0x3d, 'iso8859-3'}}]}) [ 1384.564483][ T1543] hfsplus: unable to parse mount options [ 1384.583835][ T1483] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:32:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d3c0000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1384.617689][ T1513] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1384.704692][ T1543] hfsplus: unable to parse mount options 05:32:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r4, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) r5 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r5, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) r6 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r6, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r8 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r8, 0x0, r7) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f0000000300)=[@in6={0xa, 0x4e22, 0x0, @empty, 0x3ff}, @in6={0xa, 0x4e23, 0x1, @empty, 0x7}, @in6={0xa, 0x4e24, 0x0, @loopback, 0x3}, @in6={0xa, 0x4e24, 0x5, @local, 0x4dd5}, @in6={0xa, 0x4e20, 0x59, @mcast1, 0x6}, @in6={0xa, 0x4e23, 0xfffffff7, @empty, 0x10001}, @in={0x2, 0x4e21, @remote}], 0xb8) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYRESOCT=r6, @ANYRES32, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYRES64=r4], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 05:32:19 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'n/s', 0x3d, 'iso8859-3'}}]}) 05:32:19 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r6, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f00000000c0)={0x1, 0x0, 0x3, 0x0, 0x4}) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x24e, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_REMOTE={0x0, 0x5, @loopback}]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) r10 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMINPUT(r10, 0xc050561a, &(0x7f0000000040)={0xffffffe0, "62c1187dac18041f70474fa53ba99e48ef56e5c3c0bc7da7971a2e04b00ef3af"}) ioctl$VIDIOC_DBG_G_REGISTER(r10, 0xc0385650, &(0x7f0000000140)={{0x7, @addr=0x8}, 0x8, 0x100}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:32:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000010000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1384.996561][ T1552] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1385.094036][ T1552] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1385.112064][ T1565] hfsplus: unable to parse mount options [ 1385.146411][ T1552] BTRFS error (device loop1): open_ctree failed [ 1385.158738][ T1568] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1385.236643][ T1552] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1385.277785][ T1568] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1385.313759][ T1552] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1385.406468][ T1568] BTRFS error (device loop1): open_ctree failed [ 1385.476288][ T1552] BTRFS error (device loop1): open_ctree failed [ 1385.541216][ T1568] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1385.630332][ T1568] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1385.836417][ T1568] BTRFS error (device loop1): open_ctree failed [ 1386.005496][ T1600] IPVS: ftp: loaded support on port[0] = 21 [ 1386.659175][ T1600] chnl_net:caif_netlink_parms(): no params data found [ 1386.821883][ T1600] bridge0: port 1(bridge_slave_0) entered blocking state [ 1386.830837][ T1600] bridge0: port 1(bridge_slave_0) entered disabled state [ 1386.840418][ T1600] device bridge_slave_0 entered promiscuous mode [ 1386.849926][ T1600] bridge0: port 2(bridge_slave_1) entered blocking state [ 1386.858367][ T1600] bridge0: port 2(bridge_slave_1) entered disabled state [ 1386.868152][ T1600] device bridge_slave_1 entered promiscuous mode [ 1386.899081][ T1600] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1387.022635][ T1600] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1387.054624][ T1600] team0: Port device team_slave_0 added [ 1387.064988][ T1600] team0: Port device team_slave_1 added [ 1387.161837][ T1600] device hsr_slave_0 entered promiscuous mode [ 1387.207224][ T1600] device hsr_slave_1 entered promiscuous mode [ 1387.296119][ T1600] debugfs: Directory 'hsr0' with parent '/' already present! [ 1387.305859][ T7] device bridge_slave_1 left promiscuous mode [ 1387.312405][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1387.368264][ T7] device bridge_slave_0 left promiscuous mode [ 1387.374516][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1390.446641][ T7] device hsr_slave_0 left promiscuous mode [ 1390.496199][ T7] device hsr_slave_1 left promiscuous mode [ 1390.585075][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1390.603418][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1390.622608][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1390.678251][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1390.799577][ T7] bond0 (unregistering): Released all slaves [ 1391.067509][ T1600] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1391.150135][T27752] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1391.159401][T27752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1391.171963][ T1600] 8021q: adding VLAN 0 to HW filter on device team0 [ 1391.198752][T27752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1391.208492][T27752] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1391.236688][T27752] bridge0: port 1(bridge_slave_0) entered blocking state [ 1391.243765][T27752] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1391.280291][T32387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1391.297201][T32387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1391.316599][T32387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1391.325086][T32387] bridge0: port 2(bridge_slave_1) entered blocking state [ 1391.332194][T32387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1391.357843][T32387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1391.368029][T32387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1391.386914][T32387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1391.396979][T32387] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1391.405889][T32387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1391.418391][T32387] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1391.434864][ T1600] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1391.447271][ T1600] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1391.461906][T32199] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1391.471282][T32199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1391.480874][T32199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1391.507974][T32199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1391.517877][T32199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1391.546278][T32199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1391.571567][ T1600] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1391.944174][ T1616] selinux_nlmsg_perm: 3300 callbacks suppressed [ 1391.944225][ T1616] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5465 sclass=netlink_route_socket pig=1616 comm=syz-executor.4 05:32:26 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) ioctl$FICLONE(r2, 0x40049409, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000bfc65915ce02ea9637cd64d25f14f20000100021", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:32:26 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'n0s', 0x3d, 'iso8859-3'}}]}) 05:32:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d630000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:32:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000020000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:32:26 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x4088c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000000c0)=0x3f, 0x4) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:32:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, 0x0, r3, r4) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, 0x0, r5, r6) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, 0x0, r7, r8) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, 0x0, r9, r10) getgroups(0x6, &(0x7f0000000140)=[0xee01, r4, 0xee01, r6, r8, r10]) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, 0x0, r12, r13) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, 0x0, r15, r16) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, 0x0, r17, r18) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, 0x0, r19, r20) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, 0x0, r22, r23) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0xa, &(0x7f0000000540)=[r11, r13, r14, r16, r18, 0xee01, r20, r21, r23, r24]) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r25, @ANYBLOB="00000000766574680000000018000200fd0054362dddcb892ef805f104bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd0800298100"/89, @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f0000000480)=ANY=[@ANYBLOB="280078c90b4483af6000001000250800000000000000d28b7f6d1f2cb0a10000000000", @ANYRES32=r25, @ANYBLOB="634802000000000008000a0014000000"], 0x28}}, 0x0) [ 1392.068699][ T1623] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1392.117182][ T1624] hfsplus: unable to parse mount options [ 1392.135601][ T1635] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=17419 sclass=netlink_route_socket pig=1635 comm=syz-executor.2 [ 1392.159662][ T1627] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1392.175627][ T1635] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=17419 sclass=netlink_route_socket pig=1635 comm=syz-executor.2 [ 1392.182577][ T1625] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1392.203493][ T1627] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1392.266108][ T1621] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1621 comm=syz-executor.0 [ 1392.289629][ T1624] hfsplus: unable to parse mount options 05:32:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000060abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1392.329636][ T1621] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1621 comm=syz-executor.0 [ 1392.336240][ T1627] BTRFS error (device loop1): open_ctree failed [ 1392.366282][ T1621] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1621 comm=syz-executor.0 05:32:26 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nLs', 0x3d, 'iso8859-3'}}]}) [ 1392.456392][ T1621] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1621 comm=syz-executor.0 [ 1392.515056][ T1621] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1621 comm=syz-executor.0 [ 1392.536172][ T1621] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1621 comm=syz-executor.0 [ 1392.607018][ T1625] BTRFS error (device loop1): open_ctree failed [ 1392.626351][ T1621] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1621 comm=syz-executor.0 [ 1392.645778][ T1650] hfsplus: unable to parse mount options [ 1392.731970][ T1650] hfsplus: unable to parse mount options 05:32:27 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nXs', 0x3d, 'iso8859-3'}}]}) [ 1392.999425][ T1666] hfsplus: unable to parse mount options 05:32:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d650300000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1393.066948][ T1666] hfsplus: unable to parse mount options [ 1393.096450][ T1646] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:32:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200001020000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:32:27 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'n\\s', 0x3d, 'iso8859-3'}}]}) [ 1393.237090][ T1648] batman_adv: batadv0: Adding interface: veth2203 [ 1393.279429][ T1681] hfsplus: unable to parse mount options [ 1393.280346][ T1676] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1393.308575][ T1648] batman_adv: batadv0: The MTU of interface veth2203 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1393.339153][ T1648] batman_adv: batadv0: Interface activated: veth2203 [ 1393.365874][ T1681] hfsplus: unable to parse mount options 05:32:27 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) ioctl$FICLONE(r2, 0x40049409, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000bfc65915ce02ea9637cd64d25f14f20000100021", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1393.374785][ T1684] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 05:32:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0xfffffffffffffdd5, 0x10, 0x825, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}, 0x1, 0x0, 0x0, 0x20025890}, 0x4008044) 05:32:28 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_FREE(r11, 0x40206435, &(0x7f00000000c0)={0x7f, 0x0, 0x0, 0x20}) 05:32:28 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nus', 0x3d, 'iso8859-3'}}]}) [ 1393.510476][ T1676] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1393.519284][ T1684] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1393.595863][ T1696] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1393.656144][ T1676] BTRFS error (device loop1): open_ctree failed [ 1393.726057][ T1684] BTRFS error (device loop1): open_ctree failed 05:32:28 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d5d929f933604bdfc2df8c365dc035e919efa00e7db33a58832d90db1a7acb887f10fd53095e0af1fc173eefade22befe46347a1a39724195410038de008806c0311d2ba267611a902148e9caffd366a197c63cd78372d6116c50d8db6035944b638f22d8344a58a06c38dde87610e0d5f1d80a73c2bc96df3c131df00362fd7a4e827f692119247d73f1f0590ed482d6230b3d521344757af74f574fe9d89e818658c2c66f2404175f35f00ec826c06894bdc326c3f7cc76f83e147cd2bef06c34c61896d900000000"], 0x1}}, 0x0) ioctl$FICLONE(r2, 0x40049409, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000bfc65915ce02ea9637cd64d25f14f20000100021", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1393.787785][ T1704] hfsplus: unable to parse mount options [ 1393.811527][ T1676] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 05:32:28 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nl\n', 0x3d, 'iso8859-3'}}]}) [ 1393.947489][ T1684] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1393.962227][ T1676] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1394.036353][ T1684] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:32:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f0000000180)=0x4) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000000100)={r6, 0x1a}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000300)={r6, 0x4}, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000140)={r6, 0x80, 0x10}, &(0x7f0000000240)=0xc) [ 1394.119207][ T1718] hfsplus: unable to parse mount options [ 1394.198676][ T1722] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1394.216279][ T1676] BTRFS error (device loop1): open_ctree failed [ 1394.233511][ T1718] hfsplus: unable to parse mount options 05:32:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000023000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1394.326131][ T1684] BTRFS error (device loop1): open_ctree failed 05:32:28 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nl\"', 0x3d, 'iso8859-3'}}]}) 05:32:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d700300000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1394.487261][ T1725] batman_adv: batadv0: Adding interface: veth2207 [ 1394.507304][ T1725] batman_adv: batadv0: The MTU of interface veth2207 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1394.577991][ T1725] batman_adv: batadv0: Interface activated: veth2207 [ 1394.596331][ T1728] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1394.613874][ T1734] hfsplus: unable to parse mount options 05:32:29 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x0, 0x21}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_IFNAME={0x14, 0x3, 'j\x85\xdd:\x90)\xed\xbb:\x00\x00\x00\x00\xbc\x00'}]}, 0x34}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 05:32:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB='H\x00\x00\x00\x00w\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1394.783070][ T1734] hfsplus: unable to parse mount options [ 1394.789045][ T1743] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1394.818536][ T1728] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1394.851869][ T1743] BTRFS error (device loop1): unsupported checksum algorithm: 7790 05:32:29 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nl#', 0x3d, 'iso8859-3'}}]}) [ 1394.976217][ T1728] BTRFS error (device loop1): open_ctree failed [ 1395.016183][ T1743] BTRFS error (device loop1): open_ctree failed 05:32:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x24863}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @multicast2}, 0x10) r4 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000240)=0x14, 0x100c00) getsockname(r4, &(0x7f0000000280)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000300)=0x80) [ 1395.113837][ T1728] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1395.154013][ T1764] hfsplus: unable to parse mount options [ 1395.219197][ T1771] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:32:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed020000003f000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1395.328854][ T1764] hfsplus: unable to parse mount options [ 1395.344033][ T1743] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop1 [ 1395.444840][ T1743] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1395.451585][ T1776] batman_adv: batadv0: Adding interface: veth2209 [ 1395.466208][ T1776] batman_adv: batadv0: The MTU of interface veth2209 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 05:32:30 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'cp850'}}, {@nls={'nl%', 0x3d, 'iso8859-3'}}]}) [ 1395.556232][ T1743] BTRFS error (device loop1): open_ctree failed [ 1395.566232][ T1776] batman_adv: batadv0: Interface activated: veth2209 [ 1395.575271][ T1782] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 1395.633826][ T1782] BTRFS error (device loop1): unsupported checksum algorithm: 7790 [ 1395.806066][ T1782] BTRFS error (device loop1): open_ctree failed [ 1395.832464][ T1803] hfsplus: unable to parse mount options [ 1395.964938][ T1803] hfsplus: unable to parse mount options [ 1397.075810][ T1832] IPVS: ftp: loaded support on port[0] = 21 [ 1397.875246][ T1832] chnl_net:caif_netlink_parms(): no params data found [ 1398.164020][ T1832] bridge0: port 1(bridge_slave_0) entered blocking state [ 1398.172733][ T1832] bridge0: port 1(bridge_slave_0) entered disabled state [ 1398.182686][ T1832] device bridge_slave_0 entered promiscuous mode [ 1398.192095][ T1832] bridge0: port 2(bridge_slave_1) entered blocking state [ 1398.199973][ T1832] bridge0: port 2(bridge_slave_1) entered disabled state [ 1398.211317][ T1832] device bridge_slave_1 entered promiscuous mode [ 1398.459790][ T1832] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1398.473410][ T1832] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1398.728372][ T1832] team0: Port device team_slave_0 added [ 1398.737925][ T1832] team0: Port device team_slave_1 added [ 1398.821331][ T1832] device hsr_slave_0 entered promiscuous mode [ 1398.897366][ T1832] device hsr_slave_1 entered promiscuous mode [ 1398.946143][ T1832] debugfs: Directory 'hsr0' with parent '/' already present! [ 1399.240416][ T7] device bridge_slave_1 left promiscuous mode [ 1399.247091][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1399.289959][ T7] device bridge_slave_0 left promiscuous mode [ 1399.296999][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1399.350125][ T7] batman_adv: batadv0: Interface deactivated: veth3 [ 1399.363523][ T7] batman_adv: batadv0: Removing interface: veth3 [ 1399.385811][ T7] batman_adv: batadv0: Interface deactivated: veth5 [ 1399.394110][ T7] batman_adv: batadv0: Removing interface: veth5 [ 1399.405022][ T7] batman_adv: batadv0: Interface deactivated: veth7 [ 1399.413043][ T7] batman_adv: batadv0: Removing interface: veth7 [ 1399.423067][ T7] batman_adv: batadv0: Interface deactivated: veth9 [ 1399.430485][ T7] batman_adv: batadv0: Removing interface: veth9 [ 1399.439902][ T7] batman_adv: batadv0: Interface deactivated: veth11 [ 1399.447410][ T7] batman_adv: batadv0: Removing interface: veth11 [ 1399.457129][ T7] batman_adv: batadv0: Interface deactivated: veth13 [ 1399.464306][ T7] batman_adv: batadv0: Removing interface: veth13 [ 1399.473933][ T7] batman_adv: batadv0: Interface deactivated: veth15 [ 1399.481586][ T7] batman_adv: batadv0: Removing interface: veth15 [ 1399.496530][ T7] batman_adv: batadv0: Interface deactivated: veth17 [ 1399.503891][ T7] batman_adv: batadv0: Removing interface: veth17 [ 1399.514630][ T7] batman_adv: batadv0: Interface deactivated: veth33 [ 1399.522603][ T7] batman_adv: batadv0: Removing interface: veth33 [ 1399.532732][ T7] batman_adv: batadv0: Interface deactivated: veth35 [ 1399.540768][ T7] batman_adv: batadv0: Removing interface: veth35 [ 1399.561566][ T7] batman_adv: batadv0: Interface deactivated: veth37 [ 1399.568895][ T7] batman_adv: batadv0: Removing interface: veth37 [ 1399.578806][ T7] batman_adv: batadv0: Interface deactivated: veth39 [ 1399.586381][ T7] batman_adv: batadv0: Removing interface: veth39 [ 1399.595648][ T7] batman_adv: batadv0: Interface deactivated: veth41 [ 1399.603547][ T7] batman_adv: batadv0: Removing interface: veth41 [ 1399.613304][ T7] batman_adv: batadv0: Interface deactivated: veth43 [ 1399.621634][ T7] batman_adv: batadv0: Removing interface: veth43 [ 1399.632238][ T7] batman_adv: batadv0: Interface deactivated: veth45 [ 1399.640254][ T7] batman_adv: batadv0: Removing interface: veth45 [ 1399.649911][ T7] batman_adv: batadv0: Interface deactivated: veth47 [ 1399.657467][ T7] batman_adv: batadv0: Removing interface: veth47 [ 1399.669484][ T7] batman_adv: batadv0: Removing interface: veth103 [ 1399.678822][ T7] batman_adv: batadv0: Removing interface: veth105 [ 1399.688554][ T7] batman_adv: batadv0: Removing interface: veth107 [ 1399.698259][ T7] batman_adv: batadv0: Interface deactivated: veth125 [ 1399.705719][ T7] batman_adv: batadv0: Removing interface: veth125 [ 1399.715615][ T7] batman_adv: batadv0: Interface deactivated: veth129 [ 1399.723240][ T7] batman_adv: batadv0: Removing interface: veth129 [ 1399.733163][ T7] batman_adv: batadv0: Interface deactivated: veth131 [ 1399.741065][ T7] batman_adv: batadv0: Removing interface: veth131 [ 1399.750975][ T7] batman_adv: batadv0: Interface deactivated: veth133 [ 1399.758535][ T7] batman_adv: batadv0: Removing interface: veth133 [ 1399.768063][ T7] batman_adv: batadv0: Interface deactivated: veth135 [ 1399.775631][ T7] batman_adv: batadv0: Removing interface: veth135 [ 1399.785509][ T7] batman_adv: batadv0: Interface deactivated: veth137 [ 1399.792867][ T7] batman_adv: batadv0: Removing interface: veth137 [ 1399.802677][ T7] batman_adv: batadv0: Interface deactivated: veth139 [ 1399.810696][ T7] batman_adv: batadv0: Removing interface: veth139 [ 1399.820560][ T7] batman_adv: batadv0: Interface deactivated: veth141 [ 1399.839332][ T7] batman_adv: batadv0: Removing interface: veth141 [ 1399.849458][ T7] batman_adv: batadv0: Interface deactivated: veth143 [ 1399.856944][ T7] batman_adv: batadv0: Removing interface: veth143 [ 1399.866479][ T7] batman_adv: batadv0: Interface deactivated: veth145 [ 1399.873598][ T7] batman_adv: batadv0: Removing interface: veth145 [ 1399.883633][ T7] batman_adv: batadv0: Interface deactivated: veth147 [ 1399.891178][ T7] batman_adv: batadv0: Removing interface: veth147 [ 1399.908051][ T7] batman_adv: batadv0: Interface deactivated: veth149 [ 1399.915224][ T7] batman_adv: batadv0: Removing interface: veth149 [ 1399.925899][ T7] batman_adv: batadv0: Interface deactivated: veth151 [ 1399.933432][ T7] batman_adv: batadv0: Removing interface: veth151 [ 1399.942882][ T7] batman_adv: batadv0: Interface deactivated: veth153 [ 1399.950227][ T7] batman_adv: batadv0: Removing interface: veth153 [ 1399.959639][ T7] batman_adv: batadv0: Interface deactivated: veth155 [ 1399.968115][ T7] batman_adv: batadv0: Removing interface: veth155 [ 1399.979169][ T7] batman_adv: batadv0: Interface deactivated: veth157 [ 1399.986296][ T7] batman_adv: batadv0: Removing interface: veth157 [ 1399.997165][ T7] batman_adv: batadv0: Interface deactivated: veth159 [ 1400.004283][ T7] batman_adv: batadv0: Removing interface: veth159 [ 1400.013836][ T7] batman_adv: batadv0: Interface deactivated: veth161 [ 1400.021842][ T7] batman_adv: batadv0: Removing interface: veth161 [ 1400.031679][ T7] batman_adv: batadv0: Interface deactivated: veth163 [ 1400.039136][ T7] batman_adv: batadv0: Removing interface: veth163 [ 1400.048622][ T7] batman_adv: batadv0: Interface deactivated: veth165 [ 1400.055691][ T7] batman_adv: batadv0: Removing interface: veth165 [ 1400.066845][ T7] batman_adv: batadv0: Interface deactivated: veth167 [ 1400.074033][ T7] batman_adv: batadv0: Removing interface: veth167 [ 1400.086169][ T7] batman_adv: batadv0: Interface deactivated: veth169 [ 1400.093377][ T7] batman_adv: batadv0: Removing interface: veth169 [ 1400.103152][ T7] batman_adv: batadv0: Interface deactivated: veth171 [ 1400.110424][ T7] batman_adv: batadv0: Removing interface: veth171 [ 1400.119687][ T7] batman_adv: batadv0: Interface deactivated: veth173 [ 1400.127863][ T7] batman_adv: batadv0: Removing interface: veth173 [ 1400.137091][ T7] batman_adv: batadv0: Interface deactivated: veth201 [ 1400.144198][ T7] batman_adv: batadv0: Removing interface: veth201 [ 1400.153668][ T7] batman_adv: batadv0: Interface deactivated: veth203 [ 1400.163142][ T7] batman_adv: batadv0: Removing interface: veth203 [ 1400.172733][ T7] batman_adv: batadv0: Interface deactivated: veth205 [ 1400.179967][ T7] batman_adv: batadv0: Removing interface: veth205 [ 1400.189265][ T7] batman_adv: batadv0: Interface deactivated: veth207 [ 1400.196465][ T7] batman_adv: batadv0: Removing interface: veth207 [ 1400.205696][ T7] batman_adv: batadv0: Interface deactivated: veth209 [ 1400.213130][ T7] batman_adv: batadv0: Removing interface: veth209 [ 1400.222682][ T7] batman_adv: batadv0: Interface deactivated: veth211 [ 1400.230162][ T7] batman_adv: batadv0: Removing interface: veth211 [ 1400.240845][ T7] batman_adv: batadv0: Interface deactivated: veth213 [ 1400.248306][ T7] batman_adv: batadv0: Removing interface: veth213 [ 1400.258940][ T7] batman_adv: batadv0: Interface deactivated: veth215 [ 1400.266402][ T7] batman_adv: batadv0: Removing interface: veth215 [ 1400.277372][ T7] batman_adv: batadv0: Interface deactivated: veth217 [ 1400.284683][ T7] batman_adv: batadv0: Removing interface: veth217 [ 1400.294445][ T7] batman_adv: batadv0: Interface deactivated: veth219 [ 1400.301739][ T7] batman_adv: batadv0: Removing interface: veth219 [ 1400.311511][ T7] batman_adv: batadv0: Interface deactivated: veth221 [ 1400.320715][ T7] batman_adv: batadv0: Removing interface: veth221 [ 1400.331615][ T7] batman_adv: batadv0: Interface deactivated: veth223 [ 1400.339215][ T7] batman_adv: batadv0: Removing interface: veth223 [ 1400.349126][ T7] batman_adv: batadv0: Interface deactivated: veth225 [ 1400.356890][ T7] batman_adv: batadv0: Removing interface: veth225 [ 1400.366872][ T7] batman_adv: batadv0: Interface deactivated: veth227 [ 1400.374291][ T7] batman_adv: batadv0: Removing interface: veth227 [ 1400.384130][ T7] batman_adv: batadv0: Interface deactivated: veth229 [ 1400.392721][ T7] batman_adv: batadv0: Removing interface: veth229 [ 1400.404096][ T7] batman_adv: batadv0: Interface deactivated: veth231 [ 1400.411682][ T7] batman_adv: batadv0: Removing interface: veth231 [ 1400.421328][ T7] batman_adv: batadv0: Interface deactivated: veth233 [ 1400.429092][ T7] batman_adv: batadv0: Removing interface: veth233 [ 1400.438938][ T7] batman_adv: batadv0: Interface deactivated: veth235 [ 1400.446771][ T7] batman_adv: batadv0: Removing interface: veth235 [ 1400.456657][ T7] batman_adv: batadv0: Interface deactivated: veth237 [ 1400.463826][ T7] batman_adv: batadv0: Removing interface: veth237 [ 1400.472503][ T7] batman_adv: batadv0: Interface deactivated: veth239 [ 1400.480214][ T7] batman_adv: batadv0: Removing interface: veth239 [ 1400.491113][ T7] batman_adv: batadv0: Interface deactivated: veth241 [ 1400.498387][ T7] batman_adv: batadv0: Removing interface: veth241 [ 1400.507906][ T7] batman_adv: batadv0: Interface deactivated: veth243 [ 1400.515103][ T7] batman_adv: batadv0: Removing interface: veth243 [ 1400.525394][ T7] batman_adv: batadv0: Interface deactivated: veth245 [ 1400.532638][ T7] batman_adv: batadv0: Removing interface: veth245 [ 1400.541845][ T7] batman_adv: batadv0: Interface deactivated: veth247 [ 1400.549031][ T7] batman_adv: batadv0: Removing interface: veth247 [ 1400.562376][ T7] batman_adv: batadv0: Interface deactivated: veth249 [ 1400.569824][ T7] batman_adv: batadv0: Removing interface: veth249 [ 1400.580052][ T7] batman_adv: batadv0: Interface deactivated: veth251 [ 1400.587755][ T7] batman_adv: batadv0: Removing interface: veth251 [ 1400.597667][ T7] batman_adv: batadv0: Interface deactivated: veth253 [ 1400.604960][ T7] batman_adv: batadv0: Removing interface: veth253 [ 1400.615353][ T7] batman_adv: batadv0: Interface deactivated: veth255 [ 1400.623183][ T7] batman_adv: batadv0: Removing interface: veth255 [ 1400.633350][ T7] batman_adv: batadv0: Interface deactivated: veth257 [ 1400.641961][ T7] batman_adv: batadv0: Removing interface: veth257 [ 1400.653126][ T7] batman_adv: batadv0: Interface deactivated: veth259 [ 1400.661397][ T7] batman_adv: batadv0: Removing interface: veth259 [ 1400.671658][ T7] batman_adv: batadv0: Interface deactivated: veth261 [ 1400.679429][ T7] batman_adv: batadv0: Removing interface: veth261 [ 1400.689706][ T7] batman_adv: batadv0: Interface deactivated: veth263 [ 1400.697482][ T7] batman_adv: batadv0: Removing interface: veth263 [ 1400.707857][ T7] batman_adv: batadv0: Interface deactivated: veth265 [ 1400.715195][ T7] batman_adv: batadv0: Removing interface: veth265 [ 1400.726175][ T7] batman_adv: batadv0: Interface deactivated: veth267 [ 1400.733442][ T7] batman_adv: batadv0: Removing interface: veth267 [ 1400.743490][ T7] batman_adv: batadv0: Interface deactivated: veth269 [ 1400.750889][ T7] batman_adv: batadv0: Removing interface: veth269 [ 1400.760677][ T7] batman_adv: batadv0: Interface deactivated: veth271 [ 1400.768035][ T7] batman_adv: batadv0: Removing interface: veth271 [ 1400.778586][ T7] batman_adv: batadv0: Interface deactivated: veth273 [ 1400.785789][ T7] batman_adv: batadv0: Removing interface: veth273 [ 1400.795380][ T7] batman_adv: batadv0: Interface deactivated: veth275 [ 1400.803766][ T7] batman_adv: batadv0: Removing interface: veth275 [ 1400.813280][ T7] batman_adv: batadv0: Interface deactivated: veth277 [ 1400.820631][ T7] batman_adv: batadv0: Removing interface: veth277 [ 1400.831423][ T7] batman_adv: batadv0: Interface deactivated: veth279 [ 1400.838730][ T7] batman_adv: batadv0: Removing interface: veth279 [ 1400.848298][ T7] batman_adv: batadv0: Interface deactivated: veth281 [ 1400.855427][ T7] batman_adv: batadv0: Removing interface: veth281 [ 1400.865124][ T7] batman_adv: batadv0: Interface deactivated: veth283 [ 1400.872382][ T7] batman_adv: batadv0: Removing interface: veth283 [ 1400.883253][ T7] batman_adv: batadv0: Interface deactivated: veth285 [ 1400.890753][ T7] batman_adv: batadv0: Removing interface: veth285 [ 1400.901424][ T7] batman_adv: batadv0: Interface deactivated: veth287 [ 1400.909771][ T7] batman_adv: batadv0: Removing interface: veth287 [ 1400.927005][ T7] batman_adv: batadv0: Interface deactivated: veth289 [ 1400.934158][ T7] batman_adv: batadv0: Removing interface: veth289 [ 1400.943100][ T7] batman_adv: batadv0: Interface deactivated: veth291 [ 1400.950382][ T7] batman_adv: batadv0: Removing interface: veth291 [ 1400.960895][ T7] batman_adv: batadv0: Interface deactivated: veth293 [ 1400.968150][ T7] batman_adv: batadv0: Removing interface: veth293 [ 1400.977543][ T7] batman_adv: batadv0: Interface deactivated: veth295 [ 1400.984626][ T7] batman_adv: batadv0: Removing interface: veth295 [ 1400.994247][ T7] batman_adv: batadv0: Interface deactivated: veth297 [ 1401.001490][ T7] batman_adv: batadv0: Removing interface: veth297 [ 1401.010981][ T7] batman_adv: batadv0: Interface deactivated: veth299 [ 1401.018193][ T7] batman_adv: batadv0: Removing interface: veth299 [ 1401.027573][ T7] batman_adv: batadv0: Interface deactivated: veth303 [ 1401.034727][ T7] batman_adv: batadv0: Removing interface: veth303 [ 1401.046587][ T7] batman_adv: batadv0: Interface deactivated: veth305 [ 1401.053674][ T7] batman_adv: batadv0: Removing interface: veth305 [ 1401.063352][ T7] batman_adv: batadv0: Interface deactivated: veth307 [ 1401.070733][ T7] batman_adv: batadv0: Removing interface: veth307 [ 1401.080530][ T7] batman_adv: batadv0: Interface deactivated: veth309 [ 1401.088008][ T7] batman_adv: batadv0: Removing interface: veth309 [ 1401.098679][ T7] batman_adv: batadv0: Interface deactivated: veth311 [ 1401.105887][ T7] batman_adv: batadv0: Removing interface: veth311 [ 1401.115543][ T7] batman_adv: batadv0: Interface deactivated: veth313 [ 1401.123399][ T7] batman_adv: batadv0: Removing interface: veth313 [ 1401.133170][ T7] batman_adv: batadv0: Interface deactivated: veth315 [ 1401.140657][ T7] batman_adv: batadv0: Removing interface: veth315 [ 1401.150421][ T7] batman_adv: batadv0: Interface deactivated: veth317 [ 1401.157776][ T7] batman_adv: batadv0: Removing interface: veth317 [ 1401.167131][ T7] batman_adv: batadv0: Interface deactivated: veth319 [ 1401.174314][ T7] batman_adv: batadv0: Removing interface: veth319 [ 1401.184268][ T7] batman_adv: batadv0: Interface deactivated: veth321 [ 1401.191595][ T7] batman_adv: batadv0: Removing interface: veth321 [ 1401.202136][ T7] batman_adv: batadv0: Interface deactivated: veth323 [ 1401.209435][ T7] batman_adv: batadv0: Removing interface: veth323 [ 1401.218882][ T7] batman_adv: batadv0: Interface deactivated: veth325 [ 1401.226174][ T7] batman_adv: batadv0: Removing interface: veth325 [ 1401.235570][ T7] batman_adv: batadv0: Interface deactivated: veth327 [ 1401.242749][ T7] batman_adv: batadv0: Removing interface: veth327 [ 1401.252121][ T7] batman_adv: batadv0: Interface deactivated: veth329 [ 1401.260269][ T7] batman_adv: batadv0: Removing interface: veth329 [ 1401.278391][ T7] batman_adv: batadv0: Interface deactivated: veth331 [ 1401.285598][ T7] batman_adv: batadv0: Removing interface: veth331 [ 1401.295370][ T7] batman_adv: batadv0: Interface deactivated: veth333 [ 1401.303626][ T7] batman_adv: batadv0: Removing interface: veth333 [ 1401.313293][ T7] batman_adv: batadv0: Interface deactivated: veth335 [ 1401.320537][ T7] batman_adv: batadv0: Removing interface: veth335 [ 1401.330118][ T7] batman_adv: batadv0: Interface deactivated: veth337 [ 1401.337447][ T7] batman_adv: batadv0: Removing interface: veth337 [ 1401.346760][ T7] batman_adv: batadv0: Interface deactivated: veth339 [ 1401.353797][ T7] batman_adv: batadv0: Removing interface: veth339 [ 1401.363135][ T7] batman_adv: batadv0: Interface deactivated: veth341 [ 1401.370358][ T7] batman_adv: batadv0: Removing interface: veth341 [ 1401.379953][ T7] batman_adv: batadv0: Interface deactivated: veth343 [ 1401.387271][ T7] batman_adv: batadv0: Removing interface: veth343 [ 1401.396816][ T7] batman_adv: batadv0: Interface deactivated: veth345 [ 1401.403945][ T7] batman_adv: batadv0: Removing interface: veth345 [ 1401.422321][ T7] batman_adv: batadv0: Interface deactivated: veth347 [ 1401.430591][ T7] batman_adv: batadv0: Removing interface: veth347 [ 1401.440501][ T7] batman_adv: batadv0: Interface deactivated: veth349 [ 1401.447826][ T7] batman_adv: batadv0: Removing interface: veth349 [ 1401.457296][ T7] batman_adv: batadv0: Interface deactivated: veth351 [ 1401.464581][ T7] batman_adv: batadv0: Removing interface: veth351 [ 1401.474295][ T7] batman_adv: batadv0: Interface deactivated: veth353 [ 1401.481572][ T7] batman_adv: batadv0: Removing interface: veth353 [ 1401.490885][ T7] batman_adv: batadv0: Interface deactivated: veth355 [ 1401.498073][ T7] batman_adv: batadv0: Removing interface: veth355 [ 1401.507530][ T7] batman_adv: batadv0: Interface deactivated: veth357 [ 1401.514746][ T7] batman_adv: batadv0: Removing interface: veth357 [ 1401.524523][ T7] batman_adv: batadv0: Interface deactivated: veth359 [ 1401.531818][ T7] batman_adv: batadv0: Removing interface: veth359 [ 1401.541431][ T7] batman_adv: batadv0: Interface deactivated: veth361 [ 1401.548753][ T7] batman_adv: batadv0: Removing interface: veth361 [ 1401.559685][ T7] batman_adv: batadv0: Interface deactivated: veth363 [ 1401.567027][ T7] batman_adv: batadv0: Removing interface: veth363 [ 1401.576416][ T7] batman_adv: batadv0: Interface deactivated: veth365 [ 1401.583802][ T7] batman_adv: batadv0: Removing interface: veth365 [ 1401.592913][ T7] batman_adv: batadv0: Interface deactivated: veth367 [ 1401.601740][ T7] batman_adv: batadv0: Removing interface: veth367 [ 1401.614140][ T7] batman_adv: batadv0: Interface deactivated: veth369 [ 1401.621477][ T7] batman_adv: batadv0: Removing interface: veth369 [ 1401.631262][ T7] batman_adv: batadv0: Interface deactivated: veth371 [ 1401.638549][ T7] batman_adv: batadv0: Removing interface: veth371 [ 1401.648070][ T7] batman_adv: batadv0: Interface deactivated: veth373 [ 1401.655604][ T7] batman_adv: batadv0: Removing interface: veth373 [ 1401.665373][ T7] batman_adv: batadv0: Interface deactivated: veth375 [ 1401.672848][ T7] batman_adv: batadv0: Removing interface: veth375 [ 1401.683554][ T7] batman_adv: batadv0: Interface deactivated: veth377 [ 1401.691890][ T7] batman_adv: batadv0: Removing interface: veth377 [ 1401.701715][ T7] batman_adv: batadv0: Interface deactivated: veth379 [ 1401.709376][ T7] batman_adv: batadv0: Removing interface: veth379 [ 1401.719207][ T7] batman_adv: batadv0: Interface deactivated: veth381 [ 1401.726593][ T7] batman_adv: batadv0: Removing interface: veth381 [ 1401.736268][ T7] batman_adv: batadv0: Interface deactivated: veth383 [ 1401.743546][ T7] batman_adv: batadv0: Removing interface: veth383 [ 1401.752971][ T7] batman_adv: batadv0: Interface deactivated: veth385 [ 1401.760288][ T7] batman_adv: batadv0: Removing interface: veth385 [ 1401.770179][ T7] batman_adv: batadv0: Interface deactivated: veth387 [ 1401.777849][ T7] batman_adv: batadv0: Removing interface: veth387 [ 1401.796344][ T7] batman_adv: batadv0: Interface deactivated: veth389 [ 1401.803555][ T7] batman_adv: batadv0: Removing interface: veth389 [ 1401.813376][ T7] batman_adv: batadv0: Interface deactivated: veth391 [ 1401.821884][ T7] batman_adv: batadv0: Removing interface: veth391 [ 1401.831733][ T7] batman_adv: batadv0: Interface deactivated: veth393 [ 1401.839471][ T7] batman_adv: batadv0: Removing interface: veth393 [ 1401.861872][ T7] batman_adv: batadv0: Interface deactivated: veth395 [ 1401.869225][ T7] batman_adv: batadv0: Removing interface: veth395 [ 1401.879405][ T7] batman_adv: batadv0: Interface deactivated: veth397 [ 1401.886860][ T7] batman_adv: batadv0: Removing interface: veth397 [ 1401.896883][ T7] batman_adv: batadv0: Interface deactivated: veth399 [ 1401.904117][ T7] batman_adv: batadv0: Removing interface: veth399 [ 1401.913974][ T7] batman_adv: batadv0: Interface deactivated: veth401 [ 1401.921747][ T7] batman_adv: batadv0: Removing interface: veth401 [ 1401.931615][ T7] batman_adv: batadv0: Interface deactivated: veth403 [ 1401.939171][ T7] batman_adv: batadv0: Removing interface: veth403 [ 1401.949880][ T7] batman_adv: batadv0: Interface deactivated: veth405 [ 1401.957105][ T7] batman_adv: batadv0: Removing interface: veth405 [ 1401.967152][ T7] batman_adv: batadv0: Interface deactivated: veth407 [ 1401.974380][ T7] batman_adv: batadv0: Removing interface: veth407 [ 1401.984319][ T7] batman_adv: batadv0: Interface deactivated: veth409 [ 1401.992037][ T7] batman_adv: batadv0: Removing interface: veth409 [ 1402.001989][ T7] batman_adv: batadv0: Interface deactivated: veth411 [ 1402.016689][ T7] batman_adv: batadv0: Removing interface: veth411 [ 1402.036477][ T7] batman_adv: batadv0: Interface deactivated: veth413 [ 1402.043629][ T7] batman_adv: batadv0: Removing interface: veth413 [ 1402.053292][ T7] batman_adv: batadv0: Interface deactivated: veth415 [ 1402.061624][ T7] batman_adv: batadv0: Removing interface: veth415 [ 1402.072635][ T7] batman_adv: batadv0: Interface deactivated: veth417 [ 1402.080679][ T7] batman_adv: batadv0: Removing interface: veth417 [ 1402.090149][ T7] batman_adv: batadv0: Interface deactivated: veth419 [ 1402.097456][ T7] batman_adv: batadv0: Removing interface: veth419 [ 1402.106853][ T7] batman_adv: batadv0: Interface deactivated: veth421 [ 1402.113962][ T7] batman_adv: batadv0: Removing interface: veth421 [ 1402.123482][ T7] batman_adv: batadv0: Interface deactivated: veth423 [ 1402.130873][ T7] batman_adv: batadv0: Removing interface: veth423 [ 1402.140644][ T7] batman_adv: batadv0: Interface deactivated: veth425 [ 1402.148113][ T7] batman_adv: batadv0: Removing interface: veth425 [ 1402.157070][ T7] batman_adv: batadv0: Interface deactivated: veth427 [ 1402.164334][ T7] batman_adv: batadv0: Removing interface: veth427 [ 1402.174405][ T7] batman_adv: batadv0: Interface deactivated: veth429 [ 1402.181706][ T7] batman_adv: batadv0: Removing interface: veth429 [ 1402.191624][ T7] batman_adv: batadv0: Interface deactivated: veth431 [ 1402.198980][ T7] batman_adv: batadv0: Removing interface: veth431 [ 1402.208606][ T7] batman_adv: batadv0: Interface deactivated: veth433 [ 1402.215759][ T7] batman_adv: batadv0: Removing interface: veth433 [ 1402.225564][ T7] batman_adv: batadv0: Interface deactivated: veth435 [ 1402.232941][ T7] batman_adv: batadv0: Removing interface: veth435 [ 1402.242653][ T7] batman_adv: batadv0: Interface deactivated: veth437 [ 1402.249906][ T7] batman_adv: batadv0: Removing interface: veth437 [ 1402.259407][ T7] batman_adv: batadv0: Interface deactivated: veth439 [ 1402.266783][ T7] batman_adv: batadv0: Removing interface: veth439 [ 1402.276502][ T7] batman_adv: batadv0: Interface deactivated: veth441 [ 1402.283671][ T7] batman_adv: batadv0: Removing interface: veth441 [ 1402.293274][ T7] batman_adv: batadv0: Interface deactivated: veth443 [ 1402.300915][ T7] batman_adv: batadv0: Removing interface: veth443 [ 1402.311318][ T7] batman_adv: batadv0: Interface deactivated: veth445 [ 1402.319629][ T7] batman_adv: batadv0: Removing interface: veth445 [ 1402.329358][ T7] batman_adv: batadv0: Interface deactivated: veth447 [ 1402.336906][ T7] batman_adv: batadv0: Removing interface: veth447 [ 1402.346667][ T7] batman_adv: batadv0: Interface deactivated: veth449 [ 1402.353770][ T7] batman_adv: batadv0: Removing interface: veth449 [ 1402.363486][ T7] batman_adv: batadv0: Interface deactivated: veth451 [ 1402.371034][ T7] batman_adv: batadv0: Removing interface: veth451 [ 1402.380697][ T7] batman_adv: batadv0: Interface deactivated: veth453 [ 1402.388215][ T7] batman_adv: batadv0: Removing interface: veth453 [ 1402.396994][ T7] batman_adv: batadv0: Interface deactivated: veth455 [ 1402.404151][ T7] batman_adv: batadv0: Removing interface: veth455 [ 1402.414959][ T7] batman_adv: batadv0: Interface deactivated: veth457 [ 1402.422535][ T7] batman_adv: batadv0: Removing interface: veth457 [ 1402.433238][ T7] batman_adv: batadv0: Interface deactivated: veth459 [ 1402.440702][ T7] batman_adv: batadv0: Removing interface: veth459 [ 1402.450389][ T7] batman_adv: batadv0: Interface deactivated: veth461 [ 1402.457972][ T7] batman_adv: batadv0: Removing interface: veth461 [ 1402.467826][ T7] batman_adv: batadv0: Interface deactivated: veth463 [ 1402.475701][ T7] batman_adv: batadv0: Removing interface: veth463 [ 1402.486652][ T7] batman_adv: batadv0: Interface deactivated: veth465 [ 1402.493801][ T7] batman_adv: batadv0: Removing interface: veth465 [ 1402.503664][ T7] batman_adv: batadv0: Interface deactivated: veth467 [ 1402.511392][ T7] batman_adv: batadv0: Removing interface: veth467 [ 1402.521339][ T7] batman_adv: batadv0: Interface deactivated: veth469 [ 1402.529281][ T7] batman_adv: batadv0: Removing interface: veth469 [ 1402.539191][ T7] batman_adv: batadv0: Interface deactivated: veth471 [ 1402.546489][ T7] batman_adv: batadv0: Removing interface: veth471 [ 1402.555824][ T7] batman_adv: batadv0: Interface deactivated: veth473 [ 1402.564642][ T7] batman_adv: batadv0: Removing interface: veth473 [ 1402.574751][ T7] batman_adv: batadv0: Interface deactivated: veth475 [ 1402.582492][ T7] batman_adv: batadv0: Removing interface: veth475 [ 1402.592020][ T7] batman_adv: batadv0: Interface deactivated: veth477 [ 1402.599596][ T7] batman_adv: batadv0: Removing interface: veth477 [ 1402.609460][ T7] batman_adv: batadv0: Interface deactivated: veth479 [ 1402.617063][ T7] batman_adv: batadv0: Removing interface: veth479 [ 1402.626919][ T7] batman_adv: batadv0: Interface deactivated: veth481 [ 1402.634058][ T7] batman_adv: batadv0: Removing interface: veth481 [ 1402.648652][ T7] batman_adv: batadv0: Interface deactivated: veth483 [ 1402.655892][ T7] batman_adv: batadv0: Removing interface: veth483 [ 1402.665854][ T7] batman_adv: batadv0: Interface deactivated: veth485 [ 1402.674194][ T7] batman_adv: batadv0: Removing interface: veth485 [ 1402.684212][ T7] batman_adv: batadv0: Interface deactivated: veth487 [ 1402.691518][ T7] batman_adv: batadv0: Removing interface: veth487 [ 1402.701193][ T7] batman_adv: batadv0: Interface deactivated: veth489 [ 1402.708433][ T7] batman_adv: batadv0: Removing interface: veth489 [ 1402.717135][ T7] batman_adv: batadv0: Interface deactivated: veth491 [ 1402.724420][ T7] batman_adv: batadv0: Removing interface: veth491 [ 1402.750868][ T7] batman_adv: batadv0: Interface deactivated: veth493 [ 1402.758211][ T7] batman_adv: batadv0: Removing interface: veth493 [ 1402.767769][ T7] batman_adv: batadv0: Interface deactivated: veth495 [ 1402.776089][ T7] batman_adv: batadv0: Removing interface: veth495 [ 1402.786597][ T7] batman_adv: batadv0: Interface deactivated: veth497 [ 1402.793758][ T7] batman_adv: batadv0: Removing interface: veth497 [ 1402.805740][ T7] batman_adv: batadv0: Interface deactivated: veth499 [ 1402.813740][ T7] batman_adv: batadv0: Removing interface: veth499 [ 1402.823994][ T7] batman_adv: batadv0: Interface deactivated: veth501 [ 1402.831378][ T7] batman_adv: batadv0: Removing interface: veth501 [ 1402.842880][ T7] batman_adv: batadv0: Interface deactivated: veth503 [ 1402.850328][ T7] batman_adv: batadv0: Removing interface: veth503 [ 1402.859905][ T7] batman_adv: batadv0: Interface deactivated: veth505 [ 1402.867537][ T7] batman_adv: batadv0: Removing interface: veth505 [ 1402.878274][ T7] batman_adv: batadv0: Interface deactivated: veth507 [ 1402.885462][ T7] batman_adv: batadv0: Removing interface: veth507 [ 1402.895297][ T7] batman_adv: batadv0: Interface deactivated: veth509 [ 1402.902721][ T7] batman_adv: batadv0: Removing interface: veth509 [ 1402.912217][ T7] batman_adv: batadv0: Interface deactivated: veth511 [ 1402.919562][ T7] batman_adv: batadv0: Removing interface: veth511 [ 1402.929208][ T7] batman_adv: batadv0: Interface deactivated: veth513 [ 1402.936551][ T7] batman_adv: batadv0: Removing interface: veth513 [ 1402.945852][ T7] batman_adv: batadv0: Interface deactivated: veth515 [ 1402.953698][ T7] batman_adv: batadv0: Removing interface: veth515 [ 1402.965882][ T7] batman_adv: batadv0: Interface deactivated: veth517 [ 1402.973377][ T7] batman_adv: batadv0: Removing interface: veth517 [ 1402.983158][ T7] batman_adv: batadv0: Interface deactivated: veth519 [ 1402.991055][ T7] batman_adv: batadv0: Removing interface: veth519 [ 1403.002802][ T7] batman_adv: batadv0: Interface deactivated: veth521 [ 1403.010172][ T7] batman_adv: batadv0: Removing interface: veth521 [ 1403.020513][ T7] batman_adv: batadv0: Interface deactivated: veth523 [ 1403.027860][ T7] batman_adv: batadv0: Removing interface: veth523 [ 1403.039448][ T7] batman_adv: batadv0: Interface deactivated: veth525 [ 1403.046751][ T7] batman_adv: batadv0: Removing interface: veth525 [ 1403.057494][ T7] batman_adv: batadv0: Interface deactivated: veth527 [ 1403.064724][ T7] batman_adv: batadv0: Removing interface: veth527 [ 1403.074644][ T7] batman_adv: batadv0: Interface deactivated: veth529 [ 1403.082306][ T7] batman_adv: batadv0: Removing interface: veth529 [ 1403.091929][ T7] batman_adv: batadv0: Interface deactivated: veth531 [ 1403.099318][ T7] batman_adv: batadv0: Removing interface: veth531 [ 1403.108937][ T7] batman_adv: batadv0: Removing interface: veth533 [ 1403.119814][ T7] batman_adv: batadv0: Interface deactivated: veth535 [ 1403.127041][ T7] batman_adv: batadv0: Removing interface: veth535 [ 1403.136739][ T7] batman_adv: batadv0: Removing interface: veth537 [ 1403.146583][ T7] batman_adv: batadv0: Removing interface: veth539 [ 1403.155814][ T7] batman_adv: batadv0: Removing interface: veth541 [ 1403.165656][ T7] batman_adv: batadv0: Removing interface: veth543 [ 1403.175798][ T7] batman_adv: batadv0: Removing interface: veth545 [ 1403.185678][ T7] batman_adv: batadv0: Interface deactivated: veth547 [ 1403.193403][ T7] batman_adv: batadv0: Removing interface: veth547 [ 1403.203244][ T7] batman_adv: batadv0: Removing interface: veth549 [ 1403.213306][ T7] batman_adv: batadv0: Removing interface: veth551 [ 1403.223124][ T7] batman_adv: batadv0: Removing interface: veth553 [ 1403.234737][ T7] batman_adv: batadv0: Removing interface: veth555 [ 1403.244647][ T7] batman_adv: batadv0: Removing interface: veth557 [ 1403.255132][ T7] batman_adv: batadv0: Removing interface: veth559 [ 1403.265797][ T7] batman_adv: batadv0: Removing interface: veth561 [ 1403.275447][ T7] batman_adv: batadv0: Removing interface: veth563 [ 1403.285057][ T7] batman_adv: batadv0: Removing interface: veth565 [ 1403.294616][ T7] batman_adv: batadv0: Removing interface: veth567 [ 1403.306468][ T7] batman_adv: batadv0: Removing interface: veth569 [ 1403.316438][ T7] batman_adv: batadv0: Removing interface: veth571 [ 1403.326458][ T7] batman_adv: batadv0: Interface deactivated: veth573 [ 1403.333672][ T7] batman_adv: batadv0: Removing interface: veth573 [ 1403.343931][ T7] batman_adv: batadv0: Removing interface: veth575 [ 1403.353968][ T7] batman_adv: batadv0: Removing interface: veth577 [ 1403.364694][ T7] batman_adv: batadv0: Removing interface: veth579 [ 1403.374791][ T7] batman_adv: batadv0: Removing interface: veth581 [ 1403.384558][ T7] batman_adv: batadv0: Removing interface: veth583 [ 1403.394847][ T7] batman_adv: batadv0: Removing interface: veth585 [ 1403.404792][ T7] batman_adv: batadv0: Removing interface: veth587 [ 1403.414500][ T7] batman_adv: batadv0: Interface deactivated: veth589 [ 1403.422129][ T7] batman_adv: batadv0: Removing interface: veth589 [ 1403.432012][ T7] batman_adv: batadv0: Removing interface: veth591 [ 1403.441561][ T7] batman_adv: batadv0: Removing interface: veth593 [ 1403.451073][ T7] batman_adv: batadv0: Removing interface: veth595 [ 1403.460902][ T7] batman_adv: batadv0: Removing interface: veth597 [ 1403.471172][ T7] batman_adv: batadv0: Removing interface: veth599 [ 1403.480813][ T7] batman_adv: batadv0: Removing interface: veth601 [ 1403.490558][ T7] batman_adv: batadv0: Removing interface: veth603 [ 1403.500089][ T7] batman_adv: batadv0: Removing interface: veth605 [ 1403.509452][ T7] batman_adv: batadv0: Removing interface: veth607 [ 1403.519982][ T7] batman_adv: batadv0: Removing interface: veth609 [ 1403.529552][ T7] batman_adv: batadv0: Removing interface: veth611 [ 1403.539181][ T7] batman_adv: batadv0: Removing interface: veth613 [ 1403.549065][ T7] batman_adv: batadv0: Interface deactivated: veth615 [ 1403.556511][ T7] batman_adv: batadv0: Removing interface: veth615 [ 1403.568553][ T7] batman_adv: batadv0: Removing interface: veth617 [ 1403.577953][ T7] batman_adv: batadv0: Removing interface: veth619 [ 1403.587583][ T7] batman_adv: batadv0: Removing interface: veth621 [ 1403.596887][ T7] batman_adv: batadv0: Interface deactivated: veth623 [ 1403.604069][ T7] batman_adv: batadv0: Removing interface: veth623 [ 1403.613515][ T7] batman_adv: batadv0: Interface deactivated: veth625 [ 1403.620737][ T7] batman_adv: batadv0: Removing interface: veth625 [ 1403.630195][ T7] batman_adv: batadv0: Removing interface: veth627 [ 1403.639722][ T7] batman_adv: batadv0: Removing interface: veth629 [ 1403.648767][ T7] batman_adv: batadv0: Removing interface: veth631 [ 1403.658072][ T7] batman_adv: batadv0: Interface deactivated: veth633 [ 1403.665167][ T7] batman_adv: batadv0: Removing interface: veth633 [ 1403.674773][ T7] batman_adv: batadv0: Removing interface: veth635 [ 1403.684159][ T7] batman_adv: batadv0: Removing interface: veth637 [ 1403.693819][ T7] batman_adv: batadv0: Interface deactivated: veth639 [ 1403.701036][ T7] batman_adv: batadv0: Removing interface: veth639 [ 1403.710413][ T7] batman_adv: batadv0: Removing interface: veth641 [ 1403.719508][ T7] batman_adv: batadv0: Removing interface: veth643 [ 1403.729094][ T7] batman_adv: batadv0: Interface deactivated: veth645 [ 1403.736557][ T7] batman_adv: batadv0: Removing interface: veth645 [ 1403.745147][ T7] batman_adv: batadv0: Interface deactivated: veth655 [ 1403.752459][ T7] batman_adv: batadv0: Removing interface: veth655 [ 1403.761904][ T7] batman_adv: batadv0: Interface deactivated: veth657 [ 1403.769305][ T7] batman_adv: batadv0: Removing interface: veth657 [ 1403.778750][ T7] batman_adv: batadv0: Interface deactivated: veth659 [ 1403.785786][ T7] batman_adv: batadv0: Removing interface: veth659 [ 1403.794281][ T7] batman_adv: batadv0: Interface deactivated: veth667 [ 1403.801550][ T7] batman_adv: batadv0: Removing interface: veth667 [ 1403.810230][ T7] batman_adv: batadv0: Interface deactivated: veth675 [ 1403.817587][ T7] batman_adv: batadv0: Removing interface: veth675 [ 1403.826127][ T7] batman_adv: batadv0: Interface deactivated: veth677 [ 1403.833198][ T7] batman_adv: batadv0: Removing interface: veth677 [ 1403.843724][ T7] batman_adv: batadv0: Interface deactivated: veth679 [ 1403.851078][ T7] batman_adv: batadv0: Removing interface: veth679 [ 1403.860465][ T7] batman_adv: batadv0: Interface deactivated: veth681 [ 1403.867689][ T7] batman_adv: batadv0: Removing interface: veth681 [ 1403.877305][ T7] batman_adv: batadv0: Interface deactivated: veth683 [ 1403.884436][ T7] batman_adv: batadv0: Removing interface: veth683 [ 1403.899196][ T7] batman_adv: batadv0: Interface deactivated: veth685 [ 1403.906424][ T7] batman_adv: batadv0: Removing interface: veth685 [ 1403.915672][ T7] batman_adv: batadv0: Interface deactivated: veth687 [ 1403.922893][ T7] batman_adv: batadv0: Removing interface: veth687 [ 1403.932178][ T7] batman_adv: batadv0: Interface deactivated: veth689 [ 1403.939405][ T7] batman_adv: batadv0: Removing interface: veth689 [ 1403.948963][ T7] batman_adv: batadv0: Interface deactivated: veth691 [ 1403.956649][ T7] batman_adv: batadv0: Removing interface: veth691 [ 1403.966575][ T7] batman_adv: batadv0: Interface deactivated: veth693 [ 1403.973672][ T7] batman_adv: batadv0: Removing interface: veth693 [ 1403.983284][ T7] batman_adv: batadv0: Interface deactivated: veth695 [ 1403.990443][ T7] batman_adv: batadv0: Removing interface: veth695 [ 1403.999686][ T7] batman_adv: batadv0: Interface deactivated: veth697 [ 1404.006905][ T7] batman_adv: batadv0: Removing interface: veth697 [ 1404.016351][ T7] batman_adv: batadv0: Interface deactivated: veth699 [ 1404.023462][ T7] batman_adv: batadv0: Removing interface: veth699 [ 1404.033057][ T7] batman_adv: batadv0: Interface deactivated: veth701 [ 1404.040265][ T7] batman_adv: batadv0: Removing interface: veth701 [ 1404.049759][ T7] batman_adv: batadv0: Interface deactivated: veth703 [ 1404.056969][ T7] batman_adv: batadv0: Removing interface: veth703 [ 1404.065549][ T7] batman_adv: batadv0: Interface deactivated: veth705 [ 1404.074471][ T7] batman_adv: batadv0: Removing interface: veth705 [ 1404.084143][ T7] batman_adv: batadv0: Interface deactivated: veth707 [ 1404.091362][ T7] batman_adv: batadv0: Removing interface: veth707 [ 1404.101036][ T7] batman_adv: batadv0: Interface deactivated: veth709 [ 1404.108179][ T7] batman_adv: batadv0: Removing interface: veth709 [ 1404.117440][ T7] batman_adv: batadv0: Interface deactivated: veth711 [ 1404.124506][ T7] batman_adv: batadv0: Removing interface: veth711 [ 1404.134021][ T7] batman_adv: batadv0: Interface deactivated: veth713 [ 1404.141170][ T7] batman_adv: batadv0: Removing interface: veth713 [ 1404.150510][ T7] batman_adv: batadv0: Interface deactivated: veth715 [ 1404.157698][ T7] batman_adv: batadv0: Removing interface: veth715 [ 1404.167208][ T7] batman_adv: batadv0: Interface deactivated: veth717 [ 1404.174315][ T7] batman_adv: batadv0: Removing interface: veth717 [ 1404.183656][ T7] batman_adv: batadv0: Interface deactivated: veth719 [ 1404.190866][ T7] batman_adv: batadv0: Removing interface: veth719 [ 1404.200549][ T7] batman_adv: batadv0: Interface deactivated: veth721 [ 1404.207724][ T7] batman_adv: batadv0: Removing interface: veth721 [ 1404.217074][ T7] batman_adv: batadv0: Interface deactivated: veth723 [ 1404.224153][ T7] batman_adv: batadv0: Removing interface: veth723 [ 1404.233443][ T7] batman_adv: batadv0: Interface deactivated: veth725 [ 1404.240624][ T7] batman_adv: batadv0: Removing interface: veth725 [ 1404.250328][ T7] batman_adv: batadv0: Interface deactivated: veth727 [ 1404.258487][ T7] batman_adv: batadv0: Removing interface: veth727 [ 1404.267848][ T7] batman_adv: batadv0: Interface deactivated: veth729 [ 1404.274932][ T7] batman_adv: batadv0: Removing interface: veth729 [ 1404.284754][ T7] batman_adv: batadv0: Interface deactivated: veth731 [ 1404.292358][ T7] batman_adv: batadv0: Removing interface: veth731 [ 1404.302662][ T7] batman_adv: batadv0: Interface deactivated: veth733 [ 1404.310149][ T7] batman_adv: batadv0: Removing interface: veth733 [ 1404.320017][ T7] batman_adv: batadv0: Interface deactivated: veth735 [ 1404.327686][ T7] batman_adv: batadv0: Removing interface: veth735 [ 1404.337444][ T7] batman_adv: batadv0: Interface deactivated: veth737 [ 1404.344536][ T7] batman_adv: batadv0: Removing interface: veth737 [ 1404.354257][ T7] batman_adv: batadv0: Interface deactivated: veth739 [ 1404.361812][ T7] batman_adv: batadv0: Removing interface: veth739 [ 1404.371759][ T7] batman_adv: batadv0: Interface deactivated: veth741 [ 1404.379354][ T7] batman_adv: batadv0: Removing interface: veth741 [ 1404.388615][ T7] batman_adv: batadv0: Interface deactivated: veth743 [ 1404.396149][ T7] batman_adv: batadv0: Removing interface: veth743 [ 1404.405811][ T7] batman_adv: batadv0: Interface deactivated: veth745 [ 1404.412961][ T7] batman_adv: batadv0: Removing interface: veth745 [ 1404.422814][ T7] batman_adv: batadv0: Interface deactivated: veth747 [ 1404.430219][ T7] batman_adv: batadv0: Removing interface: veth747 [ 1404.440025][ T7] batman_adv: batadv0: Interface deactivated: veth749 [ 1404.447209][ T7] batman_adv: batadv0: Removing interface: veth749 [ 1404.454226][T29021] kasan: CONFIG_KASAN_INLINE enabled [ 1404.460025][T29021] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1404.468205][T29021] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1404.475216][T29021] CPU: 1 PID: 29021 Comm: kworker/u4:4 Not tainted 5.4.0-rc4+ #0 [ 1404.482911][T29021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1404.493052][T29021] Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet [ 1404.500907][T29021] RIP: 0010:batadv_iv_ogm_queue_add+0x49/0x1120 [ 1404.507126][T29021] Code: 48 89 75 b8 48 89 4d c0 4c 89 45 b0 44 89 4d d0 e8 7c c0 45 fa 48 8d 7b 03 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 18 0d 00 00 [ 1404.526867][T29021] RSP: 0018:ffff8880306c7b80 EFLAGS: 00010246 [ 1404.532979][T29021] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffff8880590a6800 [ 1404.540946][T29021] RDX: 0000000000000000 RSI: ffffffff872d6134 RDI: 0000000000000003 [ 1404.548898][T29021] RBP: ffff8880306c7c18 R08: ffff8880590a6800 R09: 0000000000000001 [ 1404.556848][T29021] R10: ffffed10060d8f77 R11: 0000000000000003 R12: dffffc0000000000 [ 1404.564796][T29021] R13: ffffed100b214d0e R14: ffff8880590a6800 R15: 000000010001af39 [ 1404.572774][T29021] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1404.581677][T29021] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1404.588248][T29021] CR2: 00007f94ccabd140 CR3: 00000000a8de0000 CR4: 00000000001406e0 [ 1404.596210][T29021] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1404.604166][T29021] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1404.612117][T29021] Call Trace: [ 1404.615389][T29021] ? refcount_inc_not_zero_checked+0x144/0x200 [ 1404.621523][T29021] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1404.627306][T29021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1404.633550][T29021] batadv_iv_ogm_schedule+0xb0b/0xe50 [ 1404.638910][T29021] batadv_iv_send_outstanding_bat_ogm_packet+0x580/0x760 [ 1404.645906][T29021] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1404.651870][T29021] ? trace_hardirqs_on+0x67/0x240 [ 1404.656874][T29021] process_one_work+0x9af/0x1740 [ 1404.661792][T29021] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1404.667148][T29021] ? lock_acquire+0x190/0x410 [ 1404.671804][T29021] worker_thread+0x98/0xe40 [ 1404.676284][T29021] ? trace_hardirqs_on+0x67/0x240 [ 1404.681300][T29021] kthread+0x361/0x430 [ 1404.685358][T29021] ? process_one_work+0x1740/0x1740 [ 1404.690543][T29021] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 1404.696239][T29021] ret_from_fork+0x24/0x30 [ 1404.700628][T29021] Modules linked in: [ 1404.706090][T29021] ---[ end trace b1571eeaeb1f06bc ]--- [ 1404.711566][T29021] RIP: 0010:batadv_iv_ogm_queue_add+0x49/0x1120 [ 1404.718564][T29021] Code: 48 89 75 b8 48 89 4d c0 4c 89 45 b0 44 89 4d d0 e8 7c c0 45 fa 48 8d 7b 03 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 18 0d 00 00 [ 1404.738272][T29021] RSP: 0018:ffff8880306c7b80 EFLAGS: 00010246 [ 1404.744331][T29021] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffff8880590a6800 [ 1404.752335][T29021] RDX: 0000000000000000 RSI: ffffffff872d6134 RDI: 0000000000000003 [ 1404.760380][T29021] RBP: ffff8880306c7c18 R08: ffff8880590a6800 R09: 0000000000000001 [ 1404.768378][T29021] R10: ffffed10060d8f77 R11: 0000000000000003 R12: dffffc0000000000 [ 1404.776387][T29021] R13: ffffed100b214d0e R14: ffff8880590a6800 R15: 000000010001af39 [ 1404.784377][T29021] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1404.793386][T29021] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1404.800403][T29021] CR2: 00007f94ccabd140 CR3: 00000000a8de0000 CR4: 00000000001406e0 [ 1404.808456][T29021] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1404.816444][T29021] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1404.824392][T29021] Kernel panic - not syncing: Fatal exception [ 1404.831974][T29021] Kernel Offset: disabled [ 1404.836298][T29021] Rebooting in 86400 seconds..